![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Journal of Cybersecurity, Volume 3
Volume 3, Number 1, 2017
- Herbert Lin, Amy Zegart:
Introduction to the special issue on strategic dimensions of offensive cyber operations. 1-5
- Henry Farrell, Charles L. Glaser:
The role of effects, saliencies and norms in US Cyberwar doctrine. 7-17 - Austin Long:
A cyber SIOP? Operational considerations for strategic offensive cyber planning. 19-28 - Martin Libicki:
Second acts in cyberspace. 29-35 - Erik Gartzke, Jon R. Lindsay:
Thermonuclear cyberwar. 37-48 - Michael L. Gross, Daphna Canetti, Dana Randall:
Cyberterrorism: its effects on psychological well-being, public confidence and political attitudes. 49-58 - Steven M. Bellovin, Susan Landau, Herbert S. Lin:
Limiting the undesired impact of cyber weapons: technical requirements and policy implications. 59-68 - C. Robert Kehler, Herbert Lin, Michael Sulmeyer:
Rules of engagement for cyberspace operations: a view from the USA. JCyberSecur(2017)3(1)
Volume 3, Number 2, June 2017
Research Articles
- Thomas Maillart
, Mingyi Zhao, Jens Grossklags, John Chuang:
Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs. 81-90 - Sébastien Gay:
Strategic news bundling and privacy breach disclosures. 91-108 - Ingolf Becker
, Alice Hutchings
, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Steven J. Murdoch
, M. Angela Sasse, Gianluca Stringhini:
International comparison of bank fraud reimbursement: customer perceptions and contractual terms. 109-125 - Malte Möser, Rainer Böhme:
The price of anonymity: empirical evidence from a market for Bitcoin anonymization. 127-135 - Amir Feder, Neil Gandal, J. T. Hamrick, Tyler Moore
:
The impact of DDoS and other security shocks on Bitcoin currency exchanges: evidence from Mt. Gox. 137-144
Volume 3, Number 3, November 2017
- Victoria Wang
, John V. Tucker:
Surveillance and identity: conceptual framework and formal models. 145-158 - Kenneth D. Nguyen, Heather Rosoff, Richard S. John:
Valuing information security from a phishing attack. 159-171 - Steven Weber:
Coercion in cybersecurity: What public health models reveal. 173-183 - Jonathan M. Spring, Eric Hatleback
:
Thinking about intrusion kill chains as mechanisms. 185-197
- Corrigendum to: Introduction to the special issue on strategic dimensions of offensive cyber operations. 199
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.