Works matching IS 20572093 AND DT 2021 AND VI 7 AND IP 1
Results: 28
holistic analysis of web-based public key infrastructure failures: comparing experts' perceptions and real-world incidents.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab025
- By:
- Publication type:
- Article
Cooperation amidst competition: cybersecurity partnership in the US financial services sector.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab024
- By:
- Publication type:
- Article
Patching zero-day vulnerabilities: an empirical analysis.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab023
- By:
- Publication type:
- Article
Corrigendum to: do data breaches damage reputation? Evidence from 45 companies between 2002 and 2018.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab022
- By:
- Publication type:
- Article
Do data breaches damage reputation? Evidence from 45 companies between 2002 and 2018.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab021
- By:
- Publication type:
- Article
Third-party induced cyber incidents—much ado about nothing?
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab020
- By:
- Publication type:
- Article
Cyberattacks, cyber threats, and attitudes toward cybersecurity policies.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab019
- By:
- Publication type:
- Article
geopolitics behind the routes data travel: a case study of Iran.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab018
- By:
- Publication type:
- Article
governance of 5G infrastructure: between path dependency and risk-based approaches.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab017
- By:
- Publication type:
- Article
Twenty-five years of cyber threats in the news: a study of Swedish newspaper coverage (1995–2019).
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab016
- By:
- Publication type:
- Article
User compliance and remediation success after IoT malware notifications.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab015
- By:
- Publication type:
- Article
Cyber legalism: why it fails and what to do about it.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab014
- By:
- Publication type:
- Article
CARAF: Crypto Agility Risk Assessment Framework.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab013
- By:
- Publication type:
- Article
Prioritizing security over usability: Strategies for how people choose passwords.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab012
- By:
- Publication type:
- Article
Cybersecurity of consumer products against the background of the EU model of cyberspace protection.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab011
- By:
- Publication type:
- Article
Private active cyber defense and (international) cyber security—pushing the line?
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab010
- By:
- Publication type:
- Article
Why international law and norms do little in preventing non-state cyber attacks.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab009
- By:
- Publication type:
- Article
Restraint under conditions of uncertainty: Why the United States tolerates cyberattacks.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab008
- By:
- Publication type:
- Article
Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab007
- By:
- Publication type:
- Article
three-tiered intrusion detection system for industrial control systems.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab006
- By:
- Publication type:
- Article
Simulation for cybersecurity: state of the art and future directions.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab005
- By:
- Publication type:
- Article
Reconciliation of anti-money laundering instruments and European data protection requirements in permissionless blockchain spaces.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab004
- By:
- Publication type:
- Article
Breaking botnets: A quantitative analysis of individual, technical, isolationist, and multilateral approaches to cybersecurity.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab003
- By:
- Publication type:
- Article
Attribution and Knowledge Creation Assemblages in Cybersecurity Politics.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab002
- By:
- Publication type:
- Article
Risk and uncertainty can be analyzed in cyberspace.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyab001
- By:
- Publication type:
- Article
Manipulating uncertainty: cybersecurity politics in Egypt.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyaa026
- By:
- Publication type:
- Article
Going from bad to worse: from Internet voting to blockchain voting.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyaa025
- By:
- Publication type:
- Article
Exponential discounting in security games of timing.
- Published in:
- Journal of Cybersecurity, 2021, v. 7, n. 1, p. 1, doi. 10.1093/cybsec/tyaa008
- By:
- Publication type:
- Article