Stop the war!
Остановите войну!
for scientists:
default search action
Journal of Cybersecurity, Volume 8
Volume 8, Number 1, January 2022
- Zhang Hao Goh, Minzheng Hou, Hichang Cho:
The impact of a cause-effect elaboration procedure on information security risk perceptions: a construal fit perspective. - Agne Brilingaite, Linas Bukauskas, Ausrius Juozapavicius, Eduardas Kutka:
Overcoming information-sharing challenges in cyber defence exercises. - Panagiotis Chatzigiannis, Foteini Baldimtsi, Igor Griva, Jiasun Li:
Diversification across mining pools: optimal mining strategies under PoW. - Yuxuan (Cicilia) Zhang, Richard Frank, Noelle Warkentin, Naomi Zakimi:
Accessible from the open web: a qualitative analysis of the available open-source information involving cyber security and critical infrastructure. - Miguel Alberto Gomez, Christopher Whyte:
Unpacking strategic behavior in cyberspace: a schema-driven approach. - Sunil Chaudhary, Vasileios Gkioulos, Sokratis K. Katsikas:
Developing metrics to assess the effectiveness of cybersecurity awareness program. - Yudhistira Nugraha, Andrew Martin:
Cybersecurity service level agreements: understanding government data confidentiality requirements. - Nori Katagiri:
Two explanations for the paucity of cyber-military, cross-domain operations. - James Pavur, Ivan Martinovic:
Building a launchpad for satellite cyber-security research: lessons from 60 years of spaceflight. - Masarah Paquet-Clouston, Serge-Olivier Paquette, Sebastián García, María José Erquiaga:
Entanglement: cybercrime connections of a public forum population. - Rogier Creemers:
China's emerging data protection framework. - Andrew Tomlinson, Simon Parkin, Siraj Ahmed Shaikh:
Drivers and barriers for secure hardware adoption across ecosystem stakeholders. - Justin Key Canfil:
The illogic of plausible deniability: why proxy conflict in cyberspace may no longer pay. - Carly E. Beckerman:
Is there a cyber security dilemma? - Mohamed Rasslan, Mahmoud M. Nasreldin, Heba Kamal Aslan:
An IoT Privacy-Oriented selective disclosure credential system. - Fran Casino, Claudia Pina, Pablo López-Aguilar, Edgar Batista, Agusti Solanas, Constantinos Patsakis:
SoK: cross-border criminal investigations and digital evidence.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.