| 0 | -- | 0 | Jonathan Z. Bakdash, Steve Hutchinson, Erin G. Zaroukian, Laura R. Marusich, Saravanan Thirumuruganathan, Charmaine Sample, Blaine Hoffman, Gautam Das 0001. Malware in the future? Forecasting of analyst detection of cyber events |
| 0 | -- | 0 | Frankie E. Catota, M. Granger Morgan, Douglas C. Sicker. Cybersecurity incident response capabilities in the Ecuadorian financial sector |
| 0 | -- | 0 | Daniel G. Arce. Malware and market share |
| 0 | -- | 0 | Tarun Chaudhary, Jenna Jordan, Michael Salomone, Phil Baxter. Patchwork of confusion: the cybersecurity coordination problem |
| 0 | -- | 0 | Ioannis Agrafiotis, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese, David Upton. A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate |
| 0 | -- | 0 | Samvit Jain, Edward W. Felten, Steven Goldfeder. Determining an optimal threshold on the online reserves of a bitcoin exchange |
| 0 | -- | 0 | Eugenia A. Politou, Efthimios Alepis, Constantinos Patsakis. Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions |
| 0 | -- | 0 | Markus Riek, Rainer Böhme. The costs of consumer-facing cybercrime: an empirical exploration of measurement issues and estimates† |
| 0 | -- | 0 | Aviram Zrahia. Threat intelligence sharing between cybersecurity vendors: Network, dyadic, and agent views |