Journal: J. Cybersecurity

Volume 8, Issue 1

0 -- 0Miguel Alberto Gomez, Christopher Whyte. Unpacking strategic behavior in cyberspace: a schema-driven approach
0 -- 0Yuxuan (cicilia) Zhang, Richard Frank, Noelle Warkentin, Naomi Zakimi. Accessible from the open web: a qualitative analysis of the available open-source information involving cyber security and critical infrastructure
0 -- 0James Pavur, Ivan Martinovic. Building a launchpad for satellite cyber-security research: lessons from 60 years of spaceflight
0 -- 0Masarah Paquet-Clouston, Serge-Olivier Paquette, Sebastián García, María José Erquiaga. Entanglement: cybercrime connections of a public forum population
0 -- 0Agne Brilingaite, Linas Bukauskas, Ausrius Juozapavicius, Eduardas Kutka. Overcoming information-sharing challenges in cyber defence exercises
0 -- 0Nori Katagiri. Two explanations for the paucity of cyber-military, cross-domain operations
0 -- 0Sunil Chaudhary, Vasileios Gkioulos, Sokratis K. Katsikas. Developing metrics to assess the effectiveness of cybersecurity awareness program
0 -- 0Carly E. Beckerman. Is there a cyber security dilemma?
0 -- 0Mohamed Rasslan, Mahmoud M. Nasreldin, Heba Kamal Aslan. An IoT Privacy-Oriented selective disclosure credential system
0 -- 0Fran Casino, Claudia Pina, Pablo López-Aguilar, Edgar Batista, Agusti Solanas, Constantinos Patsakis. SoK: cross-border criminal investigations and digital evidence
0 -- 0Yudhistira Nugraha, Andrew Martin 0002. Cybersecurity service level agreements: understanding government data confidentiality requirements
0 -- 0Justin Key Canfil. The illogic of plausible deniability: why proxy conflict in cyberspace may no longer pay
0 -- 0Zhang Hao Goh, Minzheng Hou, Hichang Cho. The impact of a cause-effect elaboration procedure on information security risk perceptions: a construal fit perspective
0 -- 0Panagiotis Chatzigiannis, Foteini Baldimtsi, Igor Griva, Jiasun Li. Diversification across mining pools: optimal mining strategies under PoW