| 0 | -- | 0 | Sam Whitt, Vitali Shkliarov, Vera Mironova. Going public about cyber attacks: public threat sensitivity and support for escalation in the United States and Russia |
| 0 | -- | 0 | Daniel W. Woods, Josephine Wolff. A history of cyber risk transfer |
| 0 | -- | 0 | Karl Grindal, Milton Mueller, Vagisha Srivastava. Non-governmental governance of trust on the internet: WebPKI as public good |
| 0 | -- | 0 | Ammar Zafar. Reconciling blockchain technology and data protection laws: regulatory challenges, technical solutions, and practical pathways |
| 0 | -- | 0 | Ben Collier, Richard Clayton 0001. Peer(ing) pressure: a cybersecurity intervention at global scale in the internet infrastructure |
| 0 | -- | 0 | Hala Assal, Srivathsan G. Morkonda, Muhammad Zaid Arif, Sonia Chiasson. Software security in practice: knowledge and motivation |
| 0 | -- | 0 | Yaniv Harel, Abraham Carmeli. A strategic cybersecurity oversight framework: a board's imperative |
| 0 | -- | 0 | Junli Jiang, Pavel Naumov. De re/de dicto distinction: a logicians' perspective on data anonymity |
| 0 | -- | 0 | Fran Casino, Darren Hurley-Smith, Julio César Hernández Castro, Constantinos Patsakis. Not on my watch: ransomware detection through classification of high-entropy file segments |
| 0 | -- | 0 | Francesco Casaril, Letterio Galletta. Space cybersecurity governance: assessing policies and frameworks in view of the future European space legislation |
| 0 | -- | 0 | Catherine Carpentier-Desjardins, Masarah Paquet-Clouston, Stefan Kitzler, Bernhard Haslhofer. Mapping the DeFi crime landscape: an evidence-based picture |
| 0 | -- | 0 | Veerle van Harten, Carlos Hernandez Gañán, Michel van Eeten, Simon Parkin. Unfit for purpose? Assessing the applicability of country-level IoT security advice |
| 0 | -- | 0 | Rachiyta Jain, Temima Hrle, Daniel W. Woods. Insurance versus digital harm: a content analysis of home and cyber insurance policies in the USA and UK |
| 0 | -- | 0 | Marte Marjorie Søgnen, Adam Szekeres, Einar Arthur Snekkenes. Implementing information security controls: now or later? Delay discounting of losses and gains |
| 0 | -- | 0 | Freya Gassmann, Janina Beck, Nora Gourmelon, Zinaida Benenson. Valuation of confidentiality and availability in a personal ransomware attack scenario |
| 0 | -- | 0 | Harry Halpin. The adversary: the philosophy of cryptography |
| 0 | -- | 0 | Anna Oriishi. What has the U.S. Government gained by formalizing Team Telecom?: Team Telecom and the FCC's dual security approach |
| 0 | -- | 0 | Marc K. Peter, Khondker Mohammad Zobair, Johan P. Lindeque, Karin Mändli lerch, Luke Houghton. How much more will it need? Determinants of risk-driven cybersecurity adoption in Swiss SMEs: a structural equation modelling approach |
| 0 | -- | 0 | Marina Liu, Malcolm Shore, William Yeoh 0002, Frank Jiang 0001, Sherali Zeadally. Toward effective cybersecurity management: a hierarchical process model with performance assessment |
| 0 | -- | 0 | Gregor Petric, John N. Just. Information security culture and phishing-reporting model: structural equivalence across Germany, UK, and USA |
| 0 | -- | 0 | Edwin J. Beggs, John V. Tucker, Victoria Wang. On human-centred security: a new systems model based on modes and mode transitions |
| 0 | -- | 0 | Edward Yellakuor Baagyere, Emmanuel B. Batowise, Peter Awon-Natemi Agbedemnab, Gideon E. Wenya, Regina Esi Turkson. An RNS-based all-or-nothing transform for CP-ABE in IoT distributed systems |
| 0 | -- | 0 | Eman Salem Alashwali, Joanne C. Peca, Mandy Lanyon, Lorrie Faith Cranor. Work from home and privacy challenges: what do workers face and what are they doing about it? |
| 0 | -- | 0 | Dominika Kuznicka-Blaszkowska, Nadiya Kostyuk. Emerging need to regulate deepfakes in international law: the Russo-Ukrainian war as an example |
| 0 | -- | 0 | Syed Shubeena Yaqoob, Aasif Hussain Sheikh. Unmasking the silent threat: understanding cybercrimes targeting female students of Kashmir university - a mixed-method analysis |
| 0 | -- | 0 | Chon Abraham, France Bélanger, Sally Daultrey. Promoting research on cyber threat intelligence sharing in ecosystems |
| 0 | -- | 0 | Laura D. Osburn. Telling stories about vendors: narrative practices to negotiate risk and establish an organizational cybersecurity culture |
| 0 | -- | 0 | Nico Ebert, Thierry Schaltegger, Benjamin Ambuehl, Tim Geppert, Ariane Trammell, Melanie Knieps, Verena Zimmermann. Learning from safety science: designing incident reporting systems in cybersecurity |
| 0 | -- | 0 | Charles Harry, Ido Sivan Sevilla, Mark McDermott. Measuring the size and severity of the integrated cyber attack surface across US county governments |
| 0 | -- | 0 | Miroslaw Kutylowski, Gabriel Wechta. Pseudonymization and reporters' protection by design in the EU whistleblower directive |
| 0 | -- | 0 | Sadra Fathenojavan, Ali Moeini, Hamid Haj Seyyed Javadi. A post-quantum lattice-based lightweight anonymous authentication scheme for IoT |
| 0 | -- | 0 | Mazaher Kianpour, Ulrik Franke. The use of simulations in economic cybersecurity decision-making |
| 0 | -- | 0 | Marius-Constantin Ilau, Tristan Caulfield, David J. Pym. Co-designing heterogeneous models: a distributed systems approach |