| 0 | -- | 0 | Roxana Radu, Cedric Amon. The governance of 5G infrastructure: between path dependency and risk-based approaches |
| 0 | -- | 0 | Monica Kaminska. Restraint under conditions of uncertainty: Why the United States tolerates cyberattacks |
| 0 | -- | 0 | Elsa Rodríguez, Susanne Verstegen, Arman Noroozian, Daisuke Inoue, Takahiro Kasama, Michel van Eeten, Carlos Hernandez Gañán. User compliance and remediation success after IoT malware notifications |
| 0 | -- | 0 | Justin K. Haner, Robert K. Knake. Breaking botnets: A quantitative analysis of individual, technical, isolationist, and multilateral approaches to cybersecurity |
| 0 | -- | 0 | Sunoo Park, Michael A. Specter, Neha Narula, Ronald L. Rivest. Going from bad to worse: from Internet voting to blockchain voting |
| 0 | -- | 0 | Bassant Hassib, James Shires. Manipulating uncertainty: cybersecurity politics in Egypt |
| 0 | -- | 0 | Eirini Anthi, Lowri Williams, Pete Burnap, Kevin Jones. A three-tiered intrusion detection system for industrial control systems |
| 0 | -- | 0 | Loqman Salamatian, Frédérick Douzet, Kavé Salamatian, Kévin Limonier. The geopolitics behind the routes data travel: a case study of Iran |
| 0 | -- | 0 | Christos A. Makridis. Corrigendum to: do data breaches damage reputation? Evidence from 45 companies between 2002 and 2018 |
| 0 | -- | 0 | Lucas Kello. Cyber legalism: why it fails and what to do about it |
| 0 | -- | 0 | Iwona Karasek-Wojciechowicz. Reconciliation of anti-money laundering instruments and European data protection requirements in permissionless blockchain spaces |
| 0 | -- | 0 | Cezary Banasinski, Marcin Rojszczak. Cybersecurity of consumer products against the background of the EU model of cyberspace protection |
| 0 | -- | 0 | Michel Benaroch. Third-party induced cyber incidents - much ado about nothing? |
| 0 | -- | 0 | Rick Wash, Emilee Rader. Prioritizing security over usability: Strategies for how people choose passwords |
| 0 | -- | 0 | Kiran Sridhar, Ming Ng. Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties |
| 0 | -- | 0 | Jonathan S. A. Merlevede, Benjamin Johnson 0001, Jens Grossklags, Tom Holvoet. Exponential discounting in security games of timing |
| 0 | -- | 0 | Yaman Roumani. Patching zero-day vulnerabilities: an empirical analysis |
| 0 | -- | 0 | Hilda Hadan, Nicolás Serrano, L. Jean Camp. A holistic analysis of web-based public key infrastructure failures: comparing experts' perceptions and real-world incidents |
| 0 | -- | 0 | Christos A. Makridis. Do data breaches damage reputation? Evidence from 45 companies between 2002 and 2018 |
| 0 | -- | 0 | Aaron F. Brantly. Risk and uncertainty can be analyzed in cyberspace |
| 0 | -- | 0 | Chujiao Ma, Luis Colon, Joe Dera, Bahman Rashidi, Vaibhav Garg. CARAF: Crypto Agility Risk Assessment Framework |
| 0 | -- | 0 | Dennis Broeders. Private active cyber defense and (international) cyber security - pushing the line? |
| 0 | -- | 0 | Keren L. G. Snider, Ryan Shandler, Shay Zandani, Daphna Canetti. Cyberattacks, cyber threats, and attitudes toward cybersecurity policies |
| 0 | -- | 0 | Hamdi Kavak, Jose J. Padilla, Daniele Vernon-Bido, Saikou Y. Diallo, Ross Gore, Sachin Shetty. Simulation for cybersecurity: state of the art and future directions |
| 0 | -- | 0 | Max Boholm. Twenty-five years of cyber threats in the news: a study of Swedish newspaper coverage (1995-2019) |
| 0 | -- | 0 | Nori Katagiri. Why international law and norms do little in preventing non-state cyber attacks |
| 0 | -- | 0 | Florian J. Egloff, Myriam Dunn Cavelty. Attribution and Knowledge Creation Assemblages in Cybersecurity Politics |
| 0 | -- | 0 | Sean Atkins, Chappell Lawson. Cooperation amidst competition: cybersecurity partnership in the US financial services sector |