default search action
Journal of Cybersecurity, Volume 9
Volume 9, Number 1, January 2023
- Innocent Mbona, Jan H. P. Eloff:
Classifying social media bots as malicious or benign using semi-supervised machine learning. - Mardianto Mardianto, Niken Hartati, Farah Aulia, Zulian Fikry, Rahayu Hardianti Utami, Elrisfa Magistarina:
Contribution Threat Perception, School Climate and Prejudice as Mediator to Student's Cyber Aggression. - Pavel V. Shevchenko, Jiwook Jang, Matteo Malavasi, Gareth W. Peters, Georgy Sofronov, Stefan Trück:
The nature of losses from cyber-related events: risk categories and business sectors. - Kristen Csenkey, Nina Bindel:
Post-quantum cryptographic assemblages and the governance of the quantum threat. - Anne E. Boustead, Matthew B. Kugler:
Juror interpretations of metadata and content information: implications for the going dark debate. - Adam N. Joinson, Matt Dixon, Lynne M. Coventry, Pam Briggs:
Development of a new 'human cyber-resilience scale'. - Josiah Dykstra, Lawrence A. Gordon, Martin P. Loeb, Lei Zhou:
Maximizing the benefits from sharing cyber threat intelligence by government agencies and departments. - Timothy C. Haas:
Adapting cybersecurity practice to reduce wildlife cybercrime. - Sandra Schmitz-Berndt:
Defining the reporting threshold for a cybersecurity incident under the NIS Directive and the NIS 2 Directive. - Piers Fleming, S. Gareth Edwards, Andrew P. Bayliss, Charles R. Seger:
Tell me more, tell me more: repeated personal data requests increase disclosure. - Koen Schoenmakers, Daniel Greene, Sarah Stutterheim, Herbert Lin, Megan J. Palmer:
The security mindset: characteristics, development, and consequences. - Erica D. Lonergan, Jacquelyn Schneider:
The Power of Beliefs in US Cyber Strategy: The Evolving Role of Deterrence, Norms, and Escalation. - Md. Redowan Mahmud, Joshua D. Scarsbrook, Ryan K. L. Ko, Omar Jarkas, Josh Hall, Stuart Smith, Jonathan Marshall:
Realizing credible remote agricultural auditing with trusted video technology. - Jack Cable, Andrés Fábrega, Sunoo Park, Michael A. Specter:
A systematization of voter registration security. - David Barrera, Christopher Bellman, Paul C. van Oorschot:
A close look at a systematic method for analyzing sets of security advice. - Sergi D. Bray, Shane D. Johnson, Bennett Kleinberg:
Testing human ability to detect 'deepfake' images of human faces. - Ruth Ikwu, Luca Giommoni, Amir Javed, Pete Burnap, Matthew L. Williams:
Digital fingerprinting for identifying malicious collusive groups on Twitter. - Liudmyla Kormych, Yuliia Zavhorodnia:
The concept of modern political confrontation in cyber space. - Jing Rong Goh, Shaun S. Wang, Yaniv Harel, Gabriel Toh:
Predictive Taxonomy Analytics (LASSO): Predicting Outcome Types of Cyber Breach. - Simon Parkin, Kristen Kuhn, Siraj Ahmed Shaikh:
Executive decision-makers: a scenario-based approach to assessing organizational cyber-risk perception. - Ugochukwu O. Etudo, Christopher Whyte, Victoria Y. Yoon, Niam Yaraghi:
From Russia with fear: fear appeals and the patterns of cyber-enabled influence operations. - Anna Piazza, Srinidhi Vasudevan, Madeline Carr:
Cybersecurity in UK Universities: mapping (or managing) threat intelligence sharing within the higher education sector. - Baptiste Prébot, Yinuo Du, Cleotilde Gonzalez:
Learning about simulated adversaries from human defenders using interactive cyber-defense games. - Sébastien Gillard, Dimitri Percia David, Alain Mermoud, Thomas Maillart:
Efficient collective action for tackling time-critical cybersecurity threats.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.