![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Journal of Cybersecurity, Volume 7
Volume 7, Number 1, February 2021
- Sunoo Park
, Michael A. Specter, Neha Narula, Ronald L. Rivest:
Going from bad to worse: from Internet voting to blockchain voting. - Bassant Hassib, James Shires
:
Manipulating uncertainty: cybersecurity politics in Egypt. - Aaron F. Brantly
:
Risk and uncertainty can be analyzed in cyberspace. - Eirini Anthi
, Lowri Williams, Pete Burnap, Kevin Jones:
A three-tiered intrusion detection system for industrial control systems. - Monica Kaminska
:
Restraint under conditions of uncertainty: Why the United States tolerates cyberattacks. - Iwona Karasek-Wojciechowicz
:
Reconciliation of anti-money laundering instruments and European data protection requirements in permissionless blockchain spaces. - Nori Katagiri
:
Why international law and norms do little in preventing non-state cyber attacks. - Kiran Sridhar
, Ming Ng:
Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties. - Hamdi Kavak
, Jose J. Padilla
, Daniele Vernon-Bido, Saikou Y. Diallo, Ross Gore, Sachin Shetty
:
Simulation for cybersecurity: state of the art and future directions. - Jonathan S. A. Merlevede
, Benjamin Johnson
, Jens Grossklags
, Tom Holvoet
:
Exponential discounting in security games of timing. - Dennis Broeders
:
Private active cyber defense and (international) cyber security - pushing the line? - Justin K. Haner
, Robert K. Knake:
Breaking botnets: A quantitative analysis of individual, technical, isolationist, and multilateral approaches to cybersecurity. - Cezary Banasinski, Marcin Rojszczak
:
Cybersecurity of consumer products against the background of the EU model of cyberspace protection. - Florian J. Egloff
, Myriam Dunn Cavelty
:
Attribution and Knowledge Creation Assemblages in Cybersecurity Politics. - Roxana Radu
, Cedric Amon:
The governance of 5G infrastructure: between path dependency and risk-based approaches. - Elsa Turcios Rodriguez
, Susanne Verstegen, Arman Noroozian, Daisuke Inoue, Takahiro Kasama, Michel van Eeten, Carlos Hernandez Gañán:
User compliance and remediation success after IoT malware notifications. - Rick Wash
, Emilee Rader
:
Prioritizing security over usability: Strategies for how people choose passwords. - Lucas Kello
:
Cyber legalism: why it fails and what to do about it. - Loqman Salamatian, Frédérick Douzet
, Kavé Salamatian, Kévin Limonier:
The geopolitics behind the routes data travel: a case study of Iran. - Chujiao Ma, Luis Colon, Joe Dera, Bahman Rashidi, Vaibhav Garg
:
CARAF: Crypto Agility Risk Assessment Framework. - Max Boholm
:
Twenty-five years of cyber threats in the news: a study of Swedish newspaper coverage (1995-2019). - Christos A. Makridis
:
Do data breaches damage reputation? Evidence from 45 companies between 2002 and 2018. - Michel Benaroch
:
Third-party induced cyber incidents - much ado about nothing? - Christos A. Makridis
:
Corrigendum to: do data breaches damage reputation? Evidence from 45 companies between 2002 and 2018. - Keren L. G. Snider
, Ryan Shandler
, Shay Zandani, Daphna Canetti
:
Cyberattacks, cyber threats, and attitudes toward cybersecurity policies. - Yaman Roumani
:
Patching zero-day vulnerabilities: an empirical analysis. - Hilda Hadan
, Nicolás Serrano, L. Jean Camp:
A holistic analysis of web-based public key infrastructure failures: comparing experts' perceptions and real-world incidents. - Sean Atkins
, Chappell Lawson:
Cooperation amidst competition: cybersecurity partnership in the US financial services sector.
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.