| 0 | -- | 0 | Robert S. Gutzwiller, Sunny Fugate, Jamie Lukos, Karl Wiegand. A novel visual interface enables human detection of malware in portable document format |
| 0 | -- | 0 | Ziyuan Huang, Parinaz Naghizadeh, Mingyan Liu. Interdependent security games in the Stackelberg style: how first-mover advantage impacts free riding and security (under-)investment |
| 0 | -- | 0 | Henry R. K. Skeoch, Christos Ioannidis. The barriers to sustainable risk transfer in the cyber-insurance market |
| 0 | -- | 0 | Andrew Simpson. Into the unknown: the need to reframe risk analysis |
| 0 | -- | 0 | Matt Spencer, Lizzie Coles-Kemp, René Rydhof Hansen. Navigating the landscape of security modelling: the MORS grid |
| 0 | -- | 0 | Silvia Lucia Sanna, Diego Soi, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto. A risk estimation study of native code vulnerabilities in Android applications |
| 0 | -- | 0 | Luca Viganò 0001. The cybersecurity of fairy tales |
| 0 | -- | 0 | Gareth Mott, Sarah Turner, Jason R. C. Nurse, Nandita Pattnaik, Jamie MacColl, Pia Huesch, James Sullivan. 'There was a bit of PTSD every time I walked through the office door': Ransomware harms and the factors that influence the victim organization's experience |
| 0 | -- | 0 | Monica T. Whitty, Nour Moustafa, Marthie Grobler. Cybersecurity when working from home during COVID-19: considering the human factors |
| 0 | -- | 0 | Frederik A H. Pedersen, Jeppe Teglskov Jacobsen. Narrow windows of opportunity: the limited utility of cyber operations in war |
| 0 | -- | 0 | Geraldine Ray, Christopher D. McDermott, Mathew Nicho. Cyberbullying on Social Media: Definitions, Prevalence, and Impact Challenges |
| 0 | -- | 0 | Mostafa Abdelmoez Hassanin, Ivan Martinovic. CipherTrace: automatic detection of ciphers from execution traces to neutralize ransomware |
| 0 | -- | 0 | Austin Ebel, Debasis Mitra. Economics and optimal investment policies of Attackers and Defenders in cybersecurity |
| 0 | -- | 0 | Gerard Buckley, Tristan Caulfield, Ingolf Becker. GDPR and the indefinable effectiveness of privacy regulators: Can performance assessment be improved? |
| 0 | -- | 0 | Nur Ilzam Che mat, Norziana Jamil, Yunus Yusoff, Miss Laiha Mat Kiah. A systematic literature review on advanced persistent threat behaviors and its detection strategy |
| 0 | -- | 0 | Teodor Sommestad, Henrik Karlzén. The unpredictability of phishing susceptibility: results from a repeated measures experiment |
| 0 | -- | 0 | David D. Clark, Cecilia Testart, Matthew Luckie, kc claffy. A path forward: improving Internet routing security by enabling zones of trust |
| 0 | -- | 0 | Albesë Demjaha, David J. Pym, Tristan Caulfield, Simon Parkin. 'The trivial tickets build the trust': a co-design approach to understanding security support interactions in a large university |
| 0 | -- | 0 | Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau 0001, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso. Bugs in our pockets: the risks of client-side scanning |
| 0 | -- | 0 | Andrej Jerman-Blazic, Borka Jerman-Blazic. Toward effective learning of cybersecurity: new curriculum agenda and learning methods |
| 0 | -- | 0 | Michelle Black, Lana Obradovic, Deanna House. Behind the curve: technology challenges facing the homeland intelligence and counterterrorism workforce |
| 0 | -- | 0 | Aviram Zrahia, Neil Gandal, Sarit Markovich, Michael Riordan. The simple economics of an external shock to a bug bounty platform |
| 0 | -- | 0 | Miguel A Toro-Jarrin, Pilar Pazos, Miguel A. Padilla. It is not only about having good attitudes: factor exploration of the attitudes toward security recommendations |
| 0 | -- | 0 | Frank Cremer, Barry Sheehan, Martin Mullins, Michael Fortmann, Stefan Materne, Finbarr Murphy. Enhancing cyber insurance strategies: exploring reinsurance and alternative risk transfer approaches |
| 0 | -- | 0 | Heemeng Ho, Ryan Kok Leong Ko, Lorraine Mazerolle, John Gilmour, Cheng Miao. Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes |
| 0 | -- | 0 | Jie Du, Andrew J. Kalafut, Gregory Schymik. The health belief model and phishing: determinants of preventative security behaviors |
| 0 | -- | 0 | Daniel Kelly, Frank G. Glavin, Enda Barrett. DoWNet - classification of Denial-of-Wallet attacks on serverless application traffic |
| 0 | -- | 0 | Remco Spithoven, Anthonie Drenth. Who will take the bait? Using an embedded, experimental study to chart organization-specific phishing risk profiles and the effect of a voluntary microlearning among employees of a Dutch municipality |