Works matching IS 20572093 AND DT 2022 AND VI 8 AND IP 1
Results: 16
SoK: cross-border criminal investigations and digital evidence.
- Published in:
- Journal of Cybersecurity, 2022, v. 8, n. 1, p. 1, doi. 10.1093/cybsec/tyac014
- By:
- Publication type:
- Article
IoT Privacy-Oriented selective disclosure credential system.
- Published in:
- Journal of Cybersecurity, 2022, v. 8, n. 1, p. 1, doi. 10.1093/cybsec/tyac013
- By:
- Publication type:
- Article
Is there a cyber security dilemma?
- Published in:
- Journal of Cybersecurity, 2022, v. 8, n. 1, p. 1, doi. 10.1093/cybsec/tyac012
- By:
- Publication type:
- Article
China's emerging data protection framework.
- Published in:
- Journal of Cybersecurity, 2022, v. 8, n. 1, p. 1, doi. 10.1093/cybsec/tyac011
- By:
- Publication type:
- Article
Entanglement: cybercrime connections of a public forum population.
- Published in:
- Journal of Cybersecurity, 2022, v. 8, n. 1, p. 1, doi. 10.1093/cybsec/tyac010
- By:
- Publication type:
- Article
Drivers and barriers for secure hardware adoption across ecosystem stakeholders.
- Published in:
- Journal of Cybersecurity, 2022, v. 8, n. 1, p. 1, doi. 10.1093/cybsec/tyac009
- By:
- Publication type:
- Article
Building a launchpad for satellite cyber-security research: lessons from 60 years of spaceflight.
- Published in:
- Journal of Cybersecurity, 2022, v. 8, n. 1, p. 1, doi. 10.1093/cybsec/tyac008
- By:
- Publication type:
- Article
illogic of plausible deniability: why proxy conflict in cyberspace may no longer pay.
- Published in:
- Journal of Cybersecurity, 2022, v. 8, n. 1, p. 1, doi. 10.1093/cybsec/tyac007
- By:
- Publication type:
- Article
Developing metrics to assess the effectiveness of cybersecurity awareness program.
- Published in:
- Journal of Cybersecurity, 2022, v. 8, n. 1, p. 1, doi. 10.1093/cybsec/tyac006
- By:
- Publication type:
- Article
Unpacking strategic behavior in cyberspace: a schema-driven approach.
- Published in:
- Journal of Cybersecurity, 2022, v. 8, n. 1, p. 1, doi. 10.1093/cybsec/tyac005
- By:
- Publication type:
- Article
Cybersecurity service level agreements: understanding government data confidentiality requirements.
- Published in:
- Journal of Cybersecurity, 2022, v. 8, n. 1, p. 1, doi. 10.1093/cybsec/tyac004
- By:
- Publication type:
- Article
Accessible from the open web: a qualitative analysis of the available open-source information involving cyber security and critical infrastructure.
- Published in:
- Journal of Cybersecurity, 2022, v. 8, n. 1, p. 1, doi. 10.1093/cybsec/tyac003
- By:
- Publication type:
- Article
Two explanations for the paucity of cyber-military, cross-domain operations.
- Published in:
- Journal of Cybersecurity, 2022, v. 8, n. 1, p. 1, doi. 10.1093/cybsec/tyac002
- By:
- Publication type:
- Article
Overcoming information-sharing challenges in cyber defence exercises.
- Published in:
- Journal of Cybersecurity, 2022, v. 8, n. 1, p. 1, doi. 10.1093/cybsec/tyac001
- By:
- Publication type:
- Article
Diversification across mining pools: optimal mining strategies under PoW.
- Published in:
- Journal of Cybersecurity, 2022, v. 8, n. 1, p. 1, doi. 10.1093/cybsec/tyab027
- By:
- Publication type:
- Article
impact of a cause–effect elaboration procedure on information security risk perceptions: a construal fit perspective.
- Published in:
- Journal of Cybersecurity, 2022, v. 8, n. 1, p. 1, doi. 10.1093/cybsec/tyab026
- By:
- Publication type:
- Article