- Neil W. Kirk. Vigilance towards AI voices can be nudged through a change in 'MINDSET'. J. Cybersecurity, 12(1), 2026.
- Megha Quamara, Luca Viganò 0001, Viktor Schmuck, Oya Çeliktutan. Formal methods for socio-technical security in eXtended Reality (XR): state-of-the-art and research agenda. J. Cybersecurity, 12(1), 2026.
- Kati Sein, Stefan Sütterlin, Tanel Mällo. Cybersecurity-related support needs and challenges incurred by informal support: a study among Estonian home users. J. Cybersecurity, 12(1), 2026.
- Nurullah Demir, Christian Böttger, Henry Hosseini, Meryem Demir, Christian Wressnegger, Norbert Pohlmann, Tobias Urban. Four decades of security and privacy research: evolution of topics, impact, and the community. J. Cybersecurity, 12(1), 2026.
- Peter Jones, Lowri Williams, Eirini Anthi. The anatomy of an access control reader: a cybersecurity perspective. J. Cybersecurity, 12(1), 2026.
- Michal Rampásek, Jozef Andrasko, Pavol Sokol, Ondrej Hamulák. Hunting for vulnerabilities: call for European protection of security researchers. J. Cybersecurity, 12(1), 2026.
- Vincent Brussee. Conceptualizing the reverse great firewall: cybersecurity and the logics of government geo-blocking in China. J. Cybersecurity, 12(1), 2026.
- Ayse Nur Asyali, Muriel Frank, Pol Hölzmer. Fake it till you make it: the psychological and communication tactics behind "Pig Butchering" scams. J. Cybersecurity, 12(1), 2026.
- Sam Whitt, Vitali Shkliarov, Vera Mironova. Going public about cyber attacks: public threat sensitivity and support for escalation in the United States and Russia. J. Cybersecurity, 11(1), 2025.
- Daniel W. Woods, Josephine Wolff. A history of cyber risk transfer. J. Cybersecurity, 11(1), 2025.