Journal: J. Cybersecurity

Volume 7, Issue 1

0 -- 0Roxana Radu, Cedric Amon. The governance of 5G infrastructure: between path dependency and risk-based approaches
0 -- 0Monica Kaminska. Restraint under conditions of uncertainty: Why the United States tolerates cyberattacks
0 -- 0Elsa Rodríguez, Susanne Verstegen, Arman Noroozian, Daisuke Inoue, Takahiro Kasama, Michel van Eeten, Carlos Hernandez Gañán. User compliance and remediation success after IoT malware notifications
0 -- 0Justin K. Haner, Robert K. Knake. Breaking botnets: A quantitative analysis of individual, technical, isolationist, and multilateral approaches to cybersecurity
0 -- 0Sunoo Park, Michael A. Specter, Neha Narula, Ronald L. Rivest. Going from bad to worse: from Internet voting to blockchain voting
0 -- 0Bassant Hassib, James Shires. Manipulating uncertainty: cybersecurity politics in Egypt
0 -- 0Eirini Anthi, Lowri Williams, Pete Burnap, Kevin Jones. A three-tiered intrusion detection system for industrial control systems
0 -- 0Loqman Salamatian, Frédérick Douzet, Kavé Salamatian, Kévin Limonier. The geopolitics behind the routes data travel: a case study of Iran
0 -- 0Christos A. Makridis. Corrigendum to: do data breaches damage reputation? Evidence from 45 companies between 2002 and 2018
0 -- 0Lucas Kello. Cyber legalism: why it fails and what to do about it
0 -- 0Iwona Karasek-Wojciechowicz. Reconciliation of anti-money laundering instruments and European data protection requirements in permissionless blockchain spaces
0 -- 0Cezary Banasinski, Marcin Rojszczak. Cybersecurity of consumer products against the background of the EU model of cyberspace protection
0 -- 0Michel Benaroch. Third-party induced cyber incidents - much ado about nothing?
0 -- 0Rick Wash, Emilee Rader. Prioritizing security over usability: Strategies for how people choose passwords
0 -- 0Kiran Sridhar, Ming Ng. Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties
0 -- 0Jonathan S. A. Merlevede, Benjamin Johnson 0001, Jens Grossklags, Tom Holvoet. Exponential discounting in security games of timing
0 -- 0Yaman Roumani. Patching zero-day vulnerabilities: an empirical analysis
0 -- 0Hilda Hadan, Nicolás Serrano, L. Jean Camp. A holistic analysis of web-based public key infrastructure failures: comparing experts' perceptions and real-world incidents
0 -- 0Christos A. Makridis. Do data breaches damage reputation? Evidence from 45 companies between 2002 and 2018
0 -- 0Aaron F. Brantly. Risk and uncertainty can be analyzed in cyberspace
0 -- 0Chujiao Ma, Luis Colon, Joe Dera, Bahman Rashidi, Vaibhav Garg. CARAF: Crypto Agility Risk Assessment Framework
0 -- 0Dennis Broeders. Private active cyber defense and (international) cyber security - pushing the line?
0 -- 0Keren L. G. Snider, Ryan Shandler, Shay Zandani, Daphna Canetti. Cyberattacks, cyber threats, and attitudes toward cybersecurity policies
0 -- 0Hamdi Kavak, Jose J. Padilla, Daniele Vernon-Bido, Saikou Y. Diallo, Ross Gore, Sachin Shetty. Simulation for cybersecurity: state of the art and future directions
0 -- 0Max Boholm. Twenty-five years of cyber threats in the news: a study of Swedish newspaper coverage (1995-2019)
0 -- 0Nori Katagiri. Why international law and norms do little in preventing non-state cyber attacks
0 -- 0Florian J. Egloff, Myriam Dunn Cavelty. Attribution and Knowledge Creation Assemblages in Cybersecurity Politics
0 -- 0Sean Atkins, Chappell Lawson. Cooperation amidst competition: cybersecurity partnership in the US financial services sector