


default search action
Journal of Cybersecurity, Volume 9
Volume 9, Number 1, January 2023
- Innocent Mbona

, Jan H. P. Eloff:
Classifying social media bots as malicious or benign using semi-supervised machine learning. - Mardianto Mardianto

, Niken Hartati, Farah Aulia, Zulian Fikry, Rahayu Hardianti Utami
, Elrisfa Magistarina
:
Contribution Threat Perception, School Climate and Prejudice as Mediator to Student's Cyber Aggression. - Pavel V. Shevchenko

, Jiwook Jang
, Matteo Malavasi
, Gareth W. Peters
, Georgy Sofronov
, Stefan Trück
:
The nature of losses from cyber-related events: risk categories and business sectors. - Kristen Csenkey

, Nina Bindel
:
Post-quantum cryptographic assemblages and the governance of the quantum threat. - Anne E. Boustead

, Matthew B. Kugler:
Juror interpretations of metadata and content information: implications for the going dark debate. - Adam N. Joinson

, Matt Dixon, Lynne M. Coventry, Pam Briggs
:
Development of a new 'human cyber-resilience scale'. - Josiah Dykstra, Lawrence A. Gordon, Martin P. Loeb

, Lei Zhou:
Maximizing the benefits from sharing cyber threat intelligence by government agencies and departments. - Timothy C. Haas

:
Adapting cybersecurity practice to reduce wildlife cybercrime. - Sandra Schmitz-Berndt

:
Defining the reporting threshold for a cybersecurity incident under the NIS Directive and the NIS 2 Directive. - Piers Fleming

, S. Gareth Edwards, Andrew P. Bayliss
, Charles R. Seger:
Tell me more, tell me more: repeated personal data requests increase disclosure. - Koen Schoenmakers, Daniel Greene

, Sarah Stutterheim
, Herbert Lin, Megan J. Palmer:
The security mindset: characteristics, development, and consequences. - Erica D. Lonergan

, Jacquelyn Schneider
:
The Power of Beliefs in US Cyber Strategy: The Evolving Role of Deterrence, Norms, and Escalation. - Md. Redowan Mahmud

, Joshua D. Scarsbrook
, Ryan K. L. Ko
, Omar Jarkas, Josh Hall, Stuart Smith, Jonathan Marshall:
Realizing credible remote agricultural auditing with trusted video technology. - Jack Cable

, Andrés Fábrega, Sunoo Park
, Michael A. Specter
:
A systematization of voter registration security. - David Barrera, Christopher Bellman

, Paul C. van Oorschot:
A close look at a systematic method for analyzing sets of security advice. - Sergi D. Bray

, Shane D. Johnson, Bennett Kleinberg:
Testing human ability to detect 'deepfake' images of human faces. - Ruth Ikwu

, Luca Giommoni, Amir Javed, Pete Burnap, Matthew L. Williams:
Digital fingerprinting for identifying malicious collusive groups on Twitter. - Liudmyla Kormych

, Yuliia Zavhorodnia
:
The concept of modern political confrontation in cyber space. - Jing Rong Goh

, Shaun S. Wang, Yaniv Harel
, Gabriel Toh:
Predictive Taxonomy Analytics (LASSO): Predicting Outcome Types of Cyber Breach. - Simon Parkin

, Kristen Kuhn
, Siraj Ahmed Shaikh
:
Executive decision-makers: a scenario-based approach to assessing organizational cyber-risk perception. - Ugochukwu O. Etudo, Christopher Whyte

, Victoria Y. Yoon, Niam Yaraghi:
From Russia with fear: fear appeals and the patterns of cyber-enabled influence operations. - Anna Piazza, Srinidhi Vasudevan

, Madeline Carr
:
Cybersecurity in UK Universities: mapping (or managing) threat intelligence sharing within the higher education sector. - Baptiste Prébot

, Yinuo Du, Cleotilde Gonzalez
:
Learning about simulated adversaries from human defenders using interactive cyber-defense games. - Sébastien Gillard

, Dimitri Percia David
, Alain Mermoud
, Thomas Maillart
:
Efficient collective action for tackling time-critical cybersecurity threats.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














