


default search action
Journal of Cybersecurity, Volume 10
Volume 10, Number 1, January 2024
- Nur Ilzam Che mat
, Norziana Jamil
, Yunus Yusoff, Miss Laiha Mat Kiah:
A systematic literature review on advanced persistent threat behaviors and its detection strategy. - Michelle Black
, Lana Obradovic
, Deanna House
:
Behind the curve: technology challenges facing the homeland intelligence and counterterrorism workforce. - Henry R. K. Skeoch
, Christos Ioannidis:
The barriers to sustainable risk transfer in the cyber-insurance market. - Monica T. Whitty
, Nour Moustafa, Marthie Grobler
:
Cybersecurity when working from home during COVID-19: considering the human factors. - Harold Abelson, Ross J. Anderson, Steven M. Bellovin
, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our pockets: the risks of client-side scanning. - Daniel Kelly
, Frank G. Glavin
, Enda Barrett
:
DoWNet - classification of Denial-of-Wallet attacks on serverless application traffic. - Luca Viganò
:
The cybersecurity of fairy tales. - Aviram Zrahia
, Neil Gandal, Sarit Markovich, Michael Riordan:
The simple economics of an external shock to a bug bounty platform. - Mostafa Abdelmoez Hassanin
, Ivan Martinovic:
CipherTrace: automatic detection of ciphers from execution traces to neutralize ransomware. - Ziyuan Huang
, Parinaz Naghizadeh
, Mingyan Liu:
Interdependent security games in the Stackelberg style: how first-mover advantage impacts free riding and security (under-)investment. - Remco Spithoven
, Anthonie Drenth:
Who will take the bait? Using an embedded, experimental study to chart organization-specific phishing risk profiles and the effect of a voluntary microlearning among employees of a Dutch municipality. - Albesë Demjaha
, David J. Pym, Tristan Caulfield
, Simon Parkin
:
'The trivial tickets build the trust': a co-design approach to understanding security support interactions in a large university. - Gareth Mott, Sarah Turner
, Jason R. C. Nurse
, Nandita Pattnaik
, Jamie MacColl, Pia Huesch, James Sullivan:
'There was a bit of PTSD every time I walked through the office door': Ransomware harms and the factors that influence the victim organization's experience. - Miguel A Toro-Jarrin
, Pilar Pazos, Miguel A. Padilla:
It is not only about having good attitudes: factor exploration of the attitudes toward security recommendations. - Jie Du, Andrew J. Kalafut, Gregory Schymik
:
The health belief model and phishing: determinants of preventative security behaviors. - Frederik A H. Pedersen
, Jeppe Teglskov Jacobsen
:
Narrow windows of opportunity: the limited utility of cyber operations in war. - Gerard Buckley
, Tristan Caulfield
, Ingolf Becker
:
GDPR and the indefinable effectiveness of privacy regulators: Can performance assessment be improved? - Austin Ebel, Debasis Mitra:
Economics and optimal investment policies of Attackers and Defenders in cybersecurity. - Matt Spencer
, Lizzie Coles-Kemp, René Rydhof Hansen
:
Navigating the landscape of security modelling: the MORS grid. - Andrew Simpson
:
Into the unknown: the need to reframe risk analysis. - Teodor Sommestad, Henrik Karlzén:
The unpredictability of phishing susceptibility: results from a repeated measures experiment. - Andrej Jerman-Blazic
, Borka Jerman Blazic:
Toward effective learning of cybersecurity: new curriculum agenda and learning methods. - Heemeng Ho
, Ryan Kok Leong Ko
, Lorraine Mazerolle
, John Gilmour, Cheng Miao
:
Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes. - Silvia Lucia Sanna
, Diego Soi
, Davide Maiorca, Giorgio Fumera
, Giorgio Giacinto
:
A risk estimation study of native code vulnerabilities in Android applications. - Frank Cremer
, Barry Sheehan, Martin Mullins, Michael Fortmann, Stefan Materne, Finbarr Murphy:
Enhancing cyber insurance strategies: exploring reinsurance and alternative risk transfer approaches. - Robert S. Gutzwiller, Sunny Fugate
, Jamie Lukos, Karl Wiegand
:
A novel visual interface enables human detection of malware in portable document format. - Geraldine Ray
, Christopher D. McDermott
, Mathew Nicho:
Cyberbullying on Social Media: Definitions, Prevalence, and Impact Challenges. - David D. Clark
, Cecilia Testart, Matthew Luckie, kc claffy
:
A path forward: improving Internet routing security by enabling zones of trust.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
