Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/cybersecurity/cybersecurity5.bht:"
@article{DBLP:journals/cybersecurity/BlytheSJ19, author = {John M. Blythe and Nissy Sombatruang and Shane D. Johnson}, title = {What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages?}, journal = {J. Cybersecur.}, volume = {5}, number = {1}, pages = {tyz005}, year = {2019}, url = {https://doi.org/10.1093/cybsec/tyz005}, doi = {10.1093/CYBSEC/TYZ005}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/BlytheSJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/CartwrightHC19, author = {Edward J. Cartwright and Julio C. Hernandez{-}Castro and Anna Cartwright}, title = {To pay or not: game theoretic models of ransomware}, journal = {J. Cybersecur.}, volume = {5}, number = {1}, pages = {tyz009}, year = {2019}, url = {https://doi.org/10.1093/cybsec/tyz009}, doi = {10.1093/CYBSEC/TYZ009}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/CartwrightHC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/CatotaMS19, author = {Frankie E. Catota and M. Granger Morgan and Douglas C. Sicker}, title = {Cybersecurity education in a developing nation: the Ecuadorian environment}, journal = {J. Cybersecur.}, volume = {5}, number = {1}, pages = {tyz001}, year = {2019}, url = {https://doi.org/10.1093/cybsec/tyz001}, doi = {10.1093/CYBSEC/TYZ001}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecurity/CatotaMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/ChoongTRP19, author = {Yee{-}Yin Choong and Mary Frances Theofanos and Karen Renaud and Suzanne Prior}, title = {"Passwords protect my stuff" - a study of children's password practices}, journal = {J. Cybersecur.}, volume = {5}, number = {1}, pages = {tyz015}, year = {2019}, url = {https://doi.org/10.1093/cybsec/tyz015}, doi = {10.1093/CYBSEC/TYZ015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/ChoongTRP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/Dupont19, author = {Benoit Dupont}, title = {The cyber-resilience of financial institutions: significance and applicability}, journal = {J. Cybersecur.}, volume = {5}, number = {1}, pages = {tyz013}, year = {2019}, url = {https://doi.org/10.1093/cybsec/tyz013}, doi = {10.1093/CYBSEC/TYZ013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/Dupont19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/Gomez19, author = {Miguel Alberto Gomez}, title = {Past behavior and future judgements: seizing and freezing in response to cyber operations}, journal = {J. Cybersecur.}, volume = {5}, number = {1}, pages = {tyz012}, year = {2019}, url = {https://doi.org/10.1093/cybsec/tyz012}, doi = {10.1093/CYBSEC/TYZ012}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/Gomez19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/Healey19, author = {Jason Healey}, title = {The implications of persistent (and permanent) engagement in cyberspace}, journal = {J. Cybersecur.}, volume = {5}, number = {1}, pages = {tyz008}, year = {2019}, url = {https://doi.org/10.1093/cybsec/tyz008}, doi = {10.1093/CYBSEC/TYZ008}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/Healey19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/Henriksen19, author = {Anders Starcke Henriksen}, title = {The end of the road for the {UN} {GGE} process: The future regulation of cyberspace}, journal = {J. Cybersecur.}, volume = {5}, number = {1}, pages = {tyy009}, year = {2019}, url = {https://doi.org/10.1093/cybsec/tyy009}, doi = {10.1093/CYBSEC/TYY009}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/Henriksen19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/KhaliliLR19, author = {Mohammad Mahdi Khalili and Mingyan Liu and Sasha Romanosky}, title = {Embracing and controlling risk dependency in cyber-insurance policy underwriting}, journal = {J. Cybersecur.}, volume = {5}, number = {1}, pages = {tyz010}, year = {2019}, url = {https://doi.org/10.1093/cybsec/tyz010}, doi = {10.1093/CYBSEC/TYZ010}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/KhaliliLR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/KrepsS19, author = {Sarah Kreps and Jacquelyn Schneider}, title = {Escalation firebreaks in the cyber, conventional, and nuclear domains: moving beyond effects-based logics}, journal = {J. Cybersecur.}, volume = {5}, number = {1}, pages = {tyz007}, year = {2019}, url = {https://doi.org/10.1093/cybsec/tyz007}, doi = {10.1093/CYBSEC/TYZ007}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/KrepsS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/MermoudKHPD19, author = {Alain Mermoud and Marcus Matthias Keupp and K{\'{e}}vin Huguenin and Maximilian Palmi{\'{e}} and Dimitri Percia David}, title = {To share or not to share: a behavioral perspective on human participation in security information sharing}, journal = {J. Cybersecur.}, volume = {5}, number = {1}, pages = {tyz006}, year = {2019}, url = {https://doi.org/10.1093/cybsec/tyz006}, doi = {10.1093/CYBSEC/TYZ006}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/MermoudKHPD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/Paquet-Clouston19, author = {Masarah Paquet{-}Clouston and Bernhard Haslhofer and Benoit Dupont}, title = {Ransomware payments in the Bitcoin ecosystem}, journal = {J. Cybersecur.}, volume = {5}, number = {1}, pages = {tyz003}, year = {2019}, url = {https://doi.org/10.1093/cybsec/tyz003}, doi = {10.1093/CYBSEC/TYZ003}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/Paquet-Clouston19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/RaoLMLB19, author = {Malvika Rao and Georg J. P. Link and Don Marti and Andy Leak and Rich Bodo}, title = {A market for trading software issues}, journal = {J. Cybersecur.}, volume = {5}, number = {1}, pages = {tyz011}, year = {2019}, url = {https://doi.org/10.1093/cybsec/tyz011}, doi = {10.1093/CYBSEC/TYZ011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/RaoLMLB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/RomanoskyAKJ19, author = {Sasha Romanosky and Lillian Ablon and Andreas Kuehn and Therese Jones}, title = {Content analysis of cyber insurance policies: how do carriers price cyber risk?}, journal = {J. Cybersecur.}, volume = {5}, number = {1}, pages = {tyz002}, year = {2019}, url = {https://doi.org/10.1093/cybsec/tyz002}, doi = {10.1093/CYBSEC/TYZ002}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/RomanoskyAKJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/Rueckert19, author = {Christian R{\"{u}}ckert}, title = {Cryptocurrencies and fundamental rights}, journal = {J. Cybersecur.}, volume = {5}, number = {1}, pages = {tyz004}, year = {2019}, url = {https://doi.org/10.1093/cybsec/tyz004}, doi = {10.1093/CYBSEC/TYZ004}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/Rueckert19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.