| 0 | -- | 0 | Miguel Alberto Gomez, Christopher Whyte. Unpacking strategic behavior in cyberspace: a schema-driven approach |
| 0 | -- | 0 | Yuxuan (cicilia) Zhang, Richard Frank, Noelle Warkentin, Naomi Zakimi. Accessible from the open web: a qualitative analysis of the available open-source information involving cyber security and critical infrastructure |
| 0 | -- | 0 | James Pavur, Ivan Martinovic. Building a launchpad for satellite cyber-security research: lessons from 60 years of spaceflight |
| 0 | -- | 0 | Masarah Paquet-Clouston, Serge-Olivier Paquette, Sebastián García, María José Erquiaga. Entanglement: cybercrime connections of a public forum population |
| 0 | -- | 0 | Agne Brilingaite, Linas Bukauskas, Ausrius Juozapavicius, Eduardas Kutka. Overcoming information-sharing challenges in cyber defence exercises |
| 0 | -- | 0 | Nori Katagiri. Two explanations for the paucity of cyber-military, cross-domain operations |
| 0 | -- | 0 | Sunil Chaudhary, Vasileios Gkioulos, Sokratis K. Katsikas. Developing metrics to assess the effectiveness of cybersecurity awareness program |
| 0 | -- | 0 | Carly E. Beckerman. Is there a cyber security dilemma? |
| 0 | -- | 0 | Mohamed Rasslan, Mahmoud M. Nasreldin, Heba Kamal Aslan. An IoT Privacy-Oriented selective disclosure credential system |
| 0 | -- | 0 | Fran Casino, Claudia Pina, Pablo López-Aguilar, Edgar Batista, Agusti Solanas, Constantinos Patsakis. SoK: cross-border criminal investigations and digital evidence |
| 0 | -- | 0 | Yudhistira Nugraha, Andrew Martin 0002. Cybersecurity service level agreements: understanding government data confidentiality requirements |
| 0 | -- | 0 | Justin Key Canfil. The illogic of plausible deniability: why proxy conflict in cyberspace may no longer pay |
| 0 | -- | 0 | Zhang Hao Goh, Minzheng Hou, Hichang Cho. The impact of a cause-effect elaboration procedure on information security risk perceptions: a construal fit perspective |
| 0 | -- | 0 | Panagiotis Chatzigiannis, Foteini Baldimtsi, Igor Griva, Jiasun Li. Diversification across mining pools: optimal mining strategies under PoW |