- Neil W. Kirk. Vigilance towards AI voices can be nudged through a change in 'MINDSET'. J. Cybersecurity, 12(1), 2026.
- Michal Rampásek, Jozef Andrasko, Pavol Sokol, Ondrej Hamulák. Hunting for vulnerabilities: call for European protection of security researchers. J. Cybersecurity, 12(1), 2026.
- Vincent Brussee. Conceptualizing the reverse great firewall: cybersecurity and the logics of government geo-blocking in China. J. Cybersecurity, 12(1), 2026.
- Ayse Nur Asyali, Muriel Frank, Pol Hölzmer. Fake it till you make it: the psychological and communication tactics behind "Pig Butchering" scams. J. Cybersecurity, 12(1), 2026.
- Sam Whitt, Vitali Shkliarov, Vera Mironova. Going public about cyber attacks: public threat sensitivity and support for escalation in the United States and Russia. J. Cybersecurity, 11(1), 2025.
- Daniel W. Woods, Josephine Wolff. A history of cyber risk transfer. J. Cybersecurity, 11(1), 2025.
- Karl Grindal, Milton Mueller, Vagisha Srivastava. Non-governmental governance of trust on the internet: WebPKI as public good. J. Cybersecurity, 11(1), 2025.
- Ammar Zafar. Reconciling blockchain technology and data protection laws: regulatory challenges, technical solutions, and practical pathways. J. Cybersecurity, 11(1), 2025.
- Aleksi Kajander, Rain Liivoja, Maarja Naagel. Cybersecurity of weapon systems: international law requirements and technical standards. J. Cybersecurity, 11(1), 2025.
- Ausma Bernot, Muhammad Arif Khan, Khurram Shahzad, Mert Karakaya, Conor Healy. Cyber vulnerabilities and technical regulation of China-made CCTV IoT surveillance cameras in Australia. J. Cybersecurity, 11(1), 2025.