


default search action
Journal of Cybersecurity, Volume 7
Volume 7, Number 1, February 2021
- Sunoo Park
, Michael A. Specter, Neha Narula, Ronald L. Rivest:
Going from bad to worse: from Internet voting to blockchain voting. - Bassant Hassib
, James Shires
:
Manipulating uncertainty: cybersecurity politics in Egypt. - Aaron F. Brantly
:
Risk and uncertainty can be analyzed in cyberspace. - Eirini Anthi
, Lowri Williams, Pete Burnap, Kevin Jones:
A three-tiered intrusion detection system for industrial control systems. - Monica Kaminska
:
Restraint under conditions of uncertainty: Why the United States tolerates cyberattacks. - Iwona Karasek-Wojciechowicz
:
Reconciliation of anti-money laundering instruments and European data protection requirements in permissionless blockchain spaces. - Nori Katagiri
:
Why international law and norms do little in preventing non-state cyber attacks. - Kiran Sridhar
, Ming Ng:
Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties. - Hamdi Kavak
, Jose J. Padilla
, Daniele Vernon-Bido, Saikou Y. Diallo, Ross Gore, Sachin Shetty
:
Simulation for cybersecurity: state of the art and future directions. - Jonathan S. A. Merlevede
, Benjamin Johnson
, Jens Grossklags
, Tom Holvoet
:
Exponential discounting in security games of timing. - Dennis Broeders
:
Private active cyber defense and (international) cyber security - pushing the line? - Justin K. Haner
, Robert K. Knake:
Breaking botnets: A quantitative analysis of individual, technical, isolationist, and multilateral approaches to cybersecurity. - Cezary Banasinski, Marcin Rojszczak
:
Cybersecurity of consumer products against the background of the EU model of cyberspace protection. - Florian J. Egloff
, Myriam Dunn Cavelty
:
Attribution and Knowledge Creation Assemblages in Cybersecurity Politics. - Roxana Radu
, Cedric Amon:
The governance of 5G infrastructure: between path dependency and risk-based approaches. - Elsa Turcios Rodriguez
, Susanne Verstegen, Arman Noroozian, Daisuke Inoue, Takahiro Kasama, Michel van Eeten, Carlos Hernandez Gañán:
User compliance and remediation success after IoT malware notifications. - Rick Wash
, Emilee Rader
:
Prioritizing security over usability: Strategies for how people choose passwords. - Lucas Kello
:
Cyber legalism: why it fails and what to do about it. - Loqman Salamatian, Frédérick Douzet
, Kavé Salamatian, Kévin Limonier:
The geopolitics behind the routes data travel: a case study of Iran. - Chujiao Ma, Luis Colon, Joe Dera, Bahman Rashidi, Vaibhav Garg
:
CARAF: Crypto Agility Risk Assessment Framework. - Max Boholm
:
Twenty-five years of cyber threats in the news: a study of Swedish newspaper coverage (1995-2019). - Christos A. Makridis
:
Do data breaches damage reputation? Evidence from 45 companies between 2002 and 2018. - Michel Benaroch
:
Third-party induced cyber incidents - much ado about nothing? - Christos A. Makridis
:
Corrigendum to: do data breaches damage reputation? Evidence from 45 companies between 2002 and 2018. - Keren L. G. Snider
, Ryan Shandler
, Shay Zandani, Daphna Canetti
:
Cyberattacks, cyber threats, and attitudes toward cybersecurity policies. - Yaman Roumani
:
Patching zero-day vulnerabilities: an empirical analysis. - Hilda Hadan
, Nicolás Serrano, L. Jean Camp:
A holistic analysis of web-based public key infrastructure failures: comparing experts' perceptions and real-world incidents. - Sean Atkins
, Chappell Lawson:
Cooperation amidst competition: cybersecurity partnership in the US financial services sector.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.