Works matching IS 20572093 AND DT 2020 AND VI 6 AND IP 1
Results: 24
Exploring user perceptions of deletion in mobile instant messaging applications.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyz016
- By:
- Publication type:
- Article
Malware and market share: a comment on Arce.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa024
- By:
- Publication type:
- Article
An empirical study of ransomware attacks on organizations: an assessment of severity and salient factors affecting vulnerability.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa023
- By:
- Publication type:
- Article
Has the GDPR hype affected users' reaction to cookie disclaimers?
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa022
- By:
- Publication type:
- Article
Low-cost fitness and activity trackers for biometric authentication.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa021
- By:
- Publication type:
- Article
Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa020
- By:
- Publication type:
- Article
What (if any) behaviour change techniques do government-led cybersecurity awareness campaigns use?
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa019
- By:
- Publication type:
- Article
Efficient distributed network covert channels for Internet of things environments.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa018
- By:
- Publication type:
- Article
An analysis of perceptions and support for Windows 10 Home Edition update features.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa017
- By:
- Publication type:
- Article
Erratum to: A market for trading software issues.
- Published in:
- 2020
- Publication type:
- Correction Notice
Improving vulnerability remediation through better exploit prediction.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa015
- By:
- Publication type:
- Article
Predicting smartphone location-sharing decisions through self-reflection on past privacy behavior.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa014
- By:
- Publication type:
- Article
Cyber conflict or democracy "hacked"? How cyber operations enhance information warfare.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa013
- By:
- Publication type:
- Article
Public attribution of cyber intrusions.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa012
- By:
- Publication type:
- Article
Exploring the security narrative in the work context.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa011
- By:
- Publication type:
- Article
Deploying authentication in the wild: towards greater ecological validity in security usability studies.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa010
- By:
- Publication type:
- Article
Categorizing human phishing difficulty: a Phish Scale.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa009
- By:
- Publication type:
- Article
Challenging software developers: dialectic as a foundation for security assurance techniques.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa007
- By:
- Publication type:
- Article
Privacy threats in intimate relationships.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa006
- By:
- Publication type:
- Article
Integrating cost–benefit analysis into the NIST Cybersecurity Framework via the Gordon–Loeb Model.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa005
- By:
- Publication type:
- Article
Data presentation in security operations centres: exploring the potential for sonification to enhance existing practice.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa004
- By:
- Publication type:
- Article
SMART: security model adversarial risk-based tool for systems security design evaluation.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa003
- By:
- Publication type:
- Article
Update now or later? Effects of experience, cost, and risk preference on update decisions.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa002
- By:
- Publication type:
- Article
Developing a measure of information seeking about phishing.
- Published in:
- Journal of Cybersecurity, 2020, v. 6, n. 1, p. 1, doi. 10.1093/cybsec/tyaa001
- By:
- Publication type:
- Article