Journal: J. Cybersecurity

Volume 10, Issue 1

0 -- 0Robert S. Gutzwiller, Sunny Fugate, Jamie Lukos, Karl Wiegand. A novel visual interface enables human detection of malware in portable document format
0 -- 0Ziyuan Huang, Parinaz Naghizadeh, Mingyan Liu. Interdependent security games in the Stackelberg style: how first-mover advantage impacts free riding and security (under-)investment
0 -- 0Henry R. K. Skeoch, Christos Ioannidis. The barriers to sustainable risk transfer in the cyber-insurance market
0 -- 0Andrew Simpson. Into the unknown: the need to reframe risk analysis
0 -- 0Matt Spencer, Lizzie Coles-Kemp, René Rydhof Hansen. Navigating the landscape of security modelling: the MORS grid
0 -- 0Silvia Lucia Sanna, Diego Soi, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto. A risk estimation study of native code vulnerabilities in Android applications
0 -- 0Luca Viganò 0001. The cybersecurity of fairy tales
0 -- 0Gareth Mott, Sarah Turner, Jason R. C. Nurse, Nandita Pattnaik, Jamie MacColl, Pia Huesch, James Sullivan. 'There was a bit of PTSD every time I walked through the office door': Ransomware harms and the factors that influence the victim organization's experience
0 -- 0Monica T. Whitty, Nour Moustafa, Marthie Grobler. Cybersecurity when working from home during COVID-19: considering the human factors
0 -- 0Frederik A H. Pedersen, Jeppe Teglskov Jacobsen. Narrow windows of opportunity: the limited utility of cyber operations in war
0 -- 0Geraldine Ray, Christopher D. McDermott, Mathew Nicho. Cyberbullying on Social Media: Definitions, Prevalence, and Impact Challenges
0 -- 0Mostafa Abdelmoez Hassanin, Ivan Martinovic. CipherTrace: automatic detection of ciphers from execution traces to neutralize ransomware
0 -- 0Austin Ebel, Debasis Mitra. Economics and optimal investment policies of Attackers and Defenders in cybersecurity
0 -- 0Gerard Buckley, Tristan Caulfield, Ingolf Becker. GDPR and the indefinable effectiveness of privacy regulators: Can performance assessment be improved?
0 -- 0Nur Ilzam Che mat, Norziana Jamil, Yunus Yusoff, Miss Laiha Mat Kiah. A systematic literature review on advanced persistent threat behaviors and its detection strategy
0 -- 0Teodor Sommestad, Henrik Karlzén. The unpredictability of phishing susceptibility: results from a repeated measures experiment
0 -- 0David D. Clark, Cecilia Testart, Matthew Luckie, kc claffy. A path forward: improving Internet routing security by enabling zones of trust
0 -- 0Albesë Demjaha, David J. Pym, Tristan Caulfield, Simon Parkin. 'The trivial tickets build the trust': a co-design approach to understanding security support interactions in a large university
0 -- 0Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau 0001, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso. Bugs in our pockets: the risks of client-side scanning
0 -- 0Andrej Jerman-Blazic, Borka Jerman-Blazic. Toward effective learning of cybersecurity: new curriculum agenda and learning methods
0 -- 0Michelle Black, Lana Obradovic, Deanna House. Behind the curve: technology challenges facing the homeland intelligence and counterterrorism workforce
0 -- 0Aviram Zrahia, Neil Gandal, Sarit Markovich, Michael Riordan. The simple economics of an external shock to a bug bounty platform
0 -- 0Miguel A Toro-Jarrin, Pilar Pazos, Miguel A. Padilla. It is not only about having good attitudes: factor exploration of the attitudes toward security recommendations
0 -- 0Frank Cremer, Barry Sheehan, Martin Mullins, Michael Fortmann, Stefan Materne, Finbarr Murphy. Enhancing cyber insurance strategies: exploring reinsurance and alternative risk transfer approaches
0 -- 0Heemeng Ho, Ryan Kok Leong Ko, Lorraine Mazerolle, John Gilmour, Cheng Miao. Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes
0 -- 0Jie Du, Andrew J. Kalafut, Gregory Schymik. The health belief model and phishing: determinants of preventative security behaviors
0 -- 0Daniel Kelly, Frank G. Glavin, Enda Barrett. DoWNet - classification of Denial-of-Wallet attacks on serverless application traffic
0 -- 0Remco Spithoven, Anthonie Drenth. Who will take the bait? Using an embedded, experimental study to chart organization-specific phishing risk profiles and the effect of a voluntary microlearning among employees of a Dutch municipality