![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Journal of Cybersecurity, Volume 10
Volume 10, Number 1, January 2024
- Nur Ilzam Che mat
, Norziana Jamil, Yunus Yusoff, Miss Laiha Mat Kiah:
A systematic literature review on advanced persistent threat behaviors and its detection strategy. - Michelle Black
, Lana Obradovic
, Deanna House
:
Behind the curve: technology challenges facing the homeland intelligence and counterterrorism workforce. - Henry R. K. Skeoch
, Christos Ioannidis:
The barriers to sustainable risk transfer in the cyber-insurance market. - Monica T. Whitty
, Nour Moustafa, Marthie Grobler:
Cybersecurity when working from home during COVID-19: considering the human factors. - Harold Abelson, Ross J. Anderson, Steven M. Bellovin
, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our pockets: the risks of client-side scanning. - Daniel Kelly
, Frank G. Glavin
, Enda Barrett
:
DoWNet - classification of Denial-of-Wallet attacks on serverless application traffic. - Luca Viganò
:
The cybersecurity of fairy tales. - Aviram Zrahia
, Neil Gandal, Sarit Markovich, Michael Riordan:
The simple economics of an external shock to a bug bounty platform.
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.