


default search action
Journal of Cybersecurity, Volume 9
Volume 9, Number 1, January 2023
- Innocent Mbona
, Jan H. P. Eloff:
Classifying social media bots as malicious or benign using semi-supervised machine learning. - Mardianto Mardianto
, Niken Hartati, Farah Aulia, Zulian Fikry, Rahayu Hardianti Utami
, Elrisfa Magistarina
:
Contribution Threat Perception, School Climate and Prejudice as Mediator to Student's Cyber Aggression. - Pavel V. Shevchenko
, Jiwook Jang
, Matteo Malavasi
, Gareth W. Peters
, Georgy Sofronov
, Stefan Trück
:
The nature of losses from cyber-related events: risk categories and business sectors. - Kristen Csenkey
, Nina Bindel
:
Post-quantum cryptographic assemblages and the governance of the quantum threat. - Anne E. Boustead
, Matthew B. Kugler:
Juror interpretations of metadata and content information: implications for the going dark debate. - Adam N. Joinson
, Matt Dixon, Lynne M. Coventry, Pam Briggs
:
Development of a new 'human cyber-resilience scale'. - Josiah Dykstra, Lawrence A. Gordon, Martin P. Loeb
, Lei Zhou:
Maximizing the benefits from sharing cyber threat intelligence by government agencies and departments. - Timothy C. Haas
:
Adapting cybersecurity practice to reduce wildlife cybercrime. - Sandra Schmitz-Berndt
:
Defining the reporting threshold for a cybersecurity incident under the NIS Directive and the NIS 2 Directive. - Piers Fleming
, S. Gareth Edwards, Andrew P. Bayliss
, Charles R. Seger:
Tell me more, tell me more: repeated personal data requests increase disclosure. - Koen Schoenmakers, Daniel Greene
, Sarah Stutterheim
, Herbert Lin, Megan J. Palmer:
The security mindset: characteristics, development, and consequences. - Erica D. Lonergan
, Jacquelyn Schneider
:
The Power of Beliefs in US Cyber Strategy: The Evolving Role of Deterrence, Norms, and Escalation. - Md. Redowan Mahmud
, Joshua D. Scarsbrook
, Ryan K. L. Ko
, Omar Jarkas, Josh Hall, Stuart Smith, Jonathan Marshall:
Realizing credible remote agricultural auditing with trusted video technology. - Jack Cable
, Andrés Fábrega, Sunoo Park
, Michael A. Specter:
A systematization of voter registration security. - David Barrera, Christopher Bellman
, Paul C. van Oorschot:
A close look at a systematic method for analyzing sets of security advice. - Sergi D. Bray
, Shane D. Johnson, Bennett Kleinberg:
Testing human ability to detect 'deepfake' images of human faces. - Ruth Ikwu
, Luca Giommoni, Amir Javed, Pete Burnap, Matthew L. Williams:
Digital fingerprinting for identifying malicious collusive groups on Twitter. - Liudmyla Kormych
, Yuliia Zavhorodnia
:
The concept of modern political confrontation in cyber space. - Jing Rong Goh
, Shaun S. Wang, Yaniv Harel
, Gabriel Toh:
Predictive Taxonomy Analytics (LASSO): Predicting Outcome Types of Cyber Breach. - Simon Parkin
, Kristen Kuhn
, Siraj Ahmed Shaikh
:
Executive decision-makers: a scenario-based approach to assessing organizational cyber-risk perception. - Ugochukwu O. Etudo, Christopher Whyte
, Victoria Y. Yoon, Niam Yaraghi:
From Russia with fear: fear appeals and the patterns of cyber-enabled influence operations. - Anna Piazza, Srinidhi Vasudevan
, Madeline Carr
:
Cybersecurity in UK Universities: mapping (or managing) threat intelligence sharing within the higher education sector. - Baptiste Prébot
, Yinuo Du, Cleotilde Gonzalez
:
Learning about simulated adversaries from human defenders using interactive cyber-defense games. - Sébastien Gillard
, Dimitri Percia David
, Alain Mermoud
, Thomas Maillart
:
Efficient collective action for tackling time-critical cybersecurity threats.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.