Search dblp for Publications

export results for "toc:db/journals/cybersecurity/cybersecurity5.bht:"

 download as .bib file

@article{DBLP:journals/cybersecurity/BlytheSJ19,
  author       = {John M. Blythe and
                  Nissy Sombatruang and
                  Shane D. Johnson},
  title        = {What security features and crime prevention advice is communicated
                  in consumer IoT device manuals and support pages?},
  journal      = {J. Cybersecur.},
  volume       = {5},
  number       = {1},
  pages        = {tyz005},
  year         = {2019},
  url          = {https://doi.org/10.1093/cybsec/tyz005},
  doi          = {10.1093/CYBSEC/TYZ005},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/BlytheSJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/CartwrightHC19,
  author       = {Edward J. Cartwright and
                  Julio C. Hernandez{-}Castro and
                  Anna Cartwright},
  title        = {To pay or not: game theoretic models of ransomware},
  journal      = {J. Cybersecur.},
  volume       = {5},
  number       = {1},
  pages        = {tyz009},
  year         = {2019},
  url          = {https://doi.org/10.1093/cybsec/tyz009},
  doi          = {10.1093/CYBSEC/TYZ009},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/CartwrightHC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/CatotaMS19,
  author       = {Frankie E. Catota and
                  M. Granger Morgan and
                  Douglas C. Sicker},
  title        = {Cybersecurity education in a developing nation: the Ecuadorian environment},
  journal      = {J. Cybersecur.},
  volume       = {5},
  number       = {1},
  pages        = {tyz001},
  year         = {2019},
  url          = {https://doi.org/10.1093/cybsec/tyz001},
  doi          = {10.1093/CYBSEC/TYZ001},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/CatotaMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/ChoongTRP19,
  author       = {Yee{-}Yin Choong and
                  Mary Frances Theofanos and
                  Karen Renaud and
                  Suzanne Prior},
  title        = {"Passwords protect my stuff" - a study of children's password practices},
  journal      = {J. Cybersecur.},
  volume       = {5},
  number       = {1},
  pages        = {tyz015},
  year         = {2019},
  url          = {https://doi.org/10.1093/cybsec/tyz015},
  doi          = {10.1093/CYBSEC/TYZ015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/ChoongTRP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/Dupont19,
  author       = {Benoit Dupont},
  title        = {The cyber-resilience of financial institutions: significance and applicability},
  journal      = {J. Cybersecur.},
  volume       = {5},
  number       = {1},
  pages        = {tyz013},
  year         = {2019},
  url          = {https://doi.org/10.1093/cybsec/tyz013},
  doi          = {10.1093/CYBSEC/TYZ013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/Dupont19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/Gomez19,
  author       = {Miguel Alberto Gomez},
  title        = {Past behavior and future judgements: seizing and freezing in response
                  to cyber operations},
  journal      = {J. Cybersecur.},
  volume       = {5},
  number       = {1},
  pages        = {tyz012},
  year         = {2019},
  url          = {https://doi.org/10.1093/cybsec/tyz012},
  doi          = {10.1093/CYBSEC/TYZ012},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/Gomez19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/Healey19,
  author       = {Jason Healey},
  title        = {The implications of persistent (and permanent) engagement in cyberspace},
  journal      = {J. Cybersecur.},
  volume       = {5},
  number       = {1},
  pages        = {tyz008},
  year         = {2019},
  url          = {https://doi.org/10.1093/cybsec/tyz008},
  doi          = {10.1093/CYBSEC/TYZ008},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/Healey19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/Henriksen19,
  author       = {Anders Starcke Henriksen},
  title        = {The end of the road for the {UN} {GGE} process: The future regulation
                  of cyberspace},
  journal      = {J. Cybersecur.},
  volume       = {5},
  number       = {1},
  pages        = {tyy009},
  year         = {2019},
  url          = {https://doi.org/10.1093/cybsec/tyy009},
  doi          = {10.1093/CYBSEC/TYY009},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/Henriksen19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/KhaliliLR19,
  author       = {Mohammad Mahdi Khalili and
                  Mingyan Liu and
                  Sasha Romanosky},
  title        = {Embracing and controlling risk dependency in cyber-insurance policy
                  underwriting},
  journal      = {J. Cybersecur.},
  volume       = {5},
  number       = {1},
  pages        = {tyz010},
  year         = {2019},
  url          = {https://doi.org/10.1093/cybsec/tyz010},
  doi          = {10.1093/CYBSEC/TYZ010},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/KhaliliLR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/KrepsS19,
  author       = {Sarah Kreps and
                  Jacquelyn Schneider},
  title        = {Escalation firebreaks in the cyber, conventional, and nuclear domains:
                  moving beyond effects-based logics},
  journal      = {J. Cybersecur.},
  volume       = {5},
  number       = {1},
  pages        = {tyz007},
  year         = {2019},
  url          = {https://doi.org/10.1093/cybsec/tyz007},
  doi          = {10.1093/CYBSEC/TYZ007},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/KrepsS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/MermoudKHPD19,
  author       = {Alain Mermoud and
                  Marcus Matthias Keupp and
                  K{\'{e}}vin Huguenin and
                  Maximilian Palmi{\'{e}} and
                  Dimitri Percia David},
  title        = {To share or not to share: a behavioral perspective on human participation
                  in security information sharing},
  journal      = {J. Cybersecur.},
  volume       = {5},
  number       = {1},
  pages        = {tyz006},
  year         = {2019},
  url          = {https://doi.org/10.1093/cybsec/tyz006},
  doi          = {10.1093/CYBSEC/TYZ006},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/MermoudKHPD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/Paquet-Clouston19,
  author       = {Masarah Paquet{-}Clouston and
                  Bernhard Haslhofer and
                  Benoit Dupont},
  title        = {Ransomware payments in the Bitcoin ecosystem},
  journal      = {J. Cybersecur.},
  volume       = {5},
  number       = {1},
  pages        = {tyz003},
  year         = {2019},
  url          = {https://doi.org/10.1093/cybsec/tyz003},
  doi          = {10.1093/CYBSEC/TYZ003},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/Paquet-Clouston19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/RaoLMLB19,
  author       = {Malvika Rao and
                  Georg J. P. Link and
                  Don Marti and
                  Andy Leak and
                  Rich Bodo},
  title        = {A market for trading software issues},
  journal      = {J. Cybersecur.},
  volume       = {5},
  number       = {1},
  pages        = {tyz011},
  year         = {2019},
  url          = {https://doi.org/10.1093/cybsec/tyz011},
  doi          = {10.1093/CYBSEC/TYZ011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/RaoLMLB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/RomanoskyAKJ19,
  author       = {Sasha Romanosky and
                  Lillian Ablon and
                  Andreas Kuehn and
                  Therese Jones},
  title        = {Content analysis of cyber insurance policies: how do carriers price
                  cyber risk?},
  journal      = {J. Cybersecur.},
  volume       = {5},
  number       = {1},
  pages        = {tyz002},
  year         = {2019},
  url          = {https://doi.org/10.1093/cybsec/tyz002},
  doi          = {10.1093/CYBSEC/TYZ002},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/RomanoskyAKJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/Rueckert19,
  author       = {Christian R{\"{u}}ckert},
  title        = {Cryptocurrencies and fundamental rights},
  journal      = {J. Cybersecur.},
  volume       = {5},
  number       = {1},
  pages        = {tyz004},
  year         = {2019},
  url          = {https://doi.org/10.1093/cybsec/tyz004},
  doi          = {10.1093/CYBSEC/TYZ004},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/Rueckert19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics