Works matching IS 20572093 AND DT 2023 AND VI 9 AND IP 1
Results: 24
Learning about simulated adversaries from human defenders using interactive cyber-defense games.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyad022
- By:
- Publication type:
- Article
Efficient collective action for tackling time-critical cybersecurity threats.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyad021
- By:
- Publication type:
- Article
Cybersecurity in UK Universities: mapping (or managing) threat intelligence sharing within the higher education sector.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyad019
- By:
- Publication type:
- Article
Executive decision-makers: a scenario-based approach to assessing organizational cyber-risk perception.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyad018
- By:
- Publication type:
- Article
The concept of modern political confrontation in cyber space.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyad017
- By:
- Publication type:
- Article
Testing human ability to detect 'deepfake' images of human faces.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyad011
- By:
- Publication type:
- Article
Predictive Taxonomy Analytics (LASSO): Predicting Outcome Types of Cyber Breach.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyad015
- By:
- Publication type:
- Article
Digital fingerprinting for identifying malicious collusive groups on Twitter.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyad014
- By:
- Publication type:
- Article
A close look at a systematic method for analyzing sets of security advice.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyad013
- By:
- Publication type:
- Article
Realizing credible remote agricultural auditing with trusted video technology.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyad012
- By:
- Publication type:
- Article
From Russia with fear: fear appeals and the patterns of cyber-enabled influence operations.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyad016
- By:
- Publication type:
- Article
The security mindset: characteristics, development, and consequences.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyad010
- By:
- Publication type:
- Article
Defining the reporting threshold for a cybersecurity incident under the NIS Directive and the NIS 2 Directive.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyad009
- By:
- Publication type:
- Article
A systematization of voter registration security.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyad008
- By:
- Publication type:
- Article
Development of a new 'human cyber-resilience scale'.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyad007
- By:
- Publication type:
- Article
The Power of Beliefs in US Cyber Strategy: The Evolving Role of Deterrence, Norms, and Escalation.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyad006
- By:
- Publication type:
- Article
Tell me more, tell me more: repeated personal data requests increase disclosure.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyad005
- By:
- Publication type:
- Article
Adapting cybersecurity practice to reduce wildlife cybercrime.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyad004
- By:
- Publication type:
- Article
Maximizing the benefits from sharing cyber threat intelligence by government agencies and departments.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyad003
- By:
- Publication type:
- Article
Juror interpretations of metadata and content information: implications for the going dark debate.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyad002
- By:
- Publication type:
- Article
Post-quantum cryptographic assemblages and the governance of the quantum threat.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyad001
- By:
- Publication type:
- Article
Contribution Threat Perception, School Climate and Prejudice as Mediator to Student's Cyber Aggression.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyac017
- By:
- Publication type:
- Article
The nature of losses from cyber-related events: risk categories and business sectors.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyac016
- By:
- Publication type:
- Article
Classifying social media bots as malicious or benign using semi-supervised machine learning.
- Published in:
- Journal of Cybersecurity, 2023, v. 9, n. 1, p. 1, doi. 10.1093/cybsec/tyac015
- By:
- Publication type:
- Article