default search action
Search dblp for Publications
export results for "toc:db/journals/cybersecurity/cybersecurity1.bht:"
@article{DBLP:journals/cybersecurity/AbelsonABBBDGG015, author = {Harold Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Whitfield Diffie and John Gilmore and Matthew Green and Susan Landau and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier and Michael A. Specter and Daniel J. Weitzner}, title = {Keys under doormats: mandating insecurity by requiring government access to all data and communications}, journal = {J. Cybersecur.}, volume = {1}, number = {1}, pages = {69--79}, year = {2015}, url = {https://doi.org/10.1093/cybsec/tyv009}, doi = {10.1093/CYBSEC/TYV009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBDGG015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/AndersonKEJV15, author = {Bonnie Brinton Anderson and C. Brock Kirwan and David Eargle and Scott R. Jensen and Anthony Vance}, title = {Neural correlates of gender differences and color in distinguishing security warnings and legitimate websites: a neurosecurity study}, journal = {J. Cybersecur.}, volume = {1}, number = {1}, pages = {109--120}, year = {2015}, url = {https://doi.org/10.1093/cybsec/tyv005}, doi = {10.1093/CYBSEC/TYV005}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/AndersonKEJV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/CaulfieldF15, author = {Tristan Caulfield and Andrew Fielder}, title = {Optimizing time allocation for network defence}, journal = {J. Cybersecur.}, volume = {1}, number = {1}, pages = {37--51}, year = {2015}, url = {https://doi.org/10.1093/cybsec/tyv002}, doi = {10.1093/CYBSEC/TYV002}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/CaulfieldF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/GordonLLZ15, author = {Lawrence A. Gordon and Martin P. Loeb and William Lucyshyn and Lei Zhou}, title = {Increasing cybersecurity investments in private sector firms}, journal = {J. Cybersecur.}, volume = {1}, number = {1}, pages = {3--17}, year = {2015}, url = {https://doi.org/10.1093/cybsec/tyv011}, doi = {10.1093/CYBSEC/TYV011}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecurity/GordonLLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/HallHC15, author = {Peter Hall and Claude Heath and Lizzie Coles{-}Kemp}, title = {Critical visualization: a case for rethinking how we visualize risk and security}, journal = {J. Cybersecur.}, volume = {1}, number = {1}, pages = {93--108}, year = {2015}, url = {https://doi.org/10.1093/cybsec/tyv004}, doi = {10.1093/CYBSEC/TYV004}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/HallHC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/LeontiadisH15, author = {Nektarios Leontiadis and Alice Hutchings}, title = {Scripting the crime commission process in the illicit online prescription drug trade}, journal = {J. Cybersecur.}, volume = {1}, number = {1}, pages = {81--92}, year = {2015}, url = {https://doi.org/10.1093/cybsec/tyv006}, doi = {10.1093/CYBSEC/TYV006}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/LeontiadisH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/Lindsay15, author = {Jon R. Lindsay}, title = {Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack}, journal = {J. Cybersecur.}, volume = {1}, number = {1}, pages = {53--67}, year = {2015}, url = {https://doi.org/10.1093/cybsec/tyv003}, doi = {10.1093/CYBSEC/TYV003}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/Lindsay15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/MooreP15, author = {Tyler Moore and David J. Pym}, title = {Welcome from the Editors-in-Chief}, journal = {J. Cybersecur.}, volume = {1}, number = {1}, pages = {1--2}, year = {2015}, url = {https://doi.org/10.1093/cybsec/tyv010}, doi = {10.1093/CYBSEC/TYV010}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/MooreP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/RaderW15, author = {Emilee J. Rader and Rick Wash}, title = {Identifying patterns in informal sources of security information}, journal = {J. Cybersecur.}, volume = {1}, number = {1}, pages = {121--144}, year = {2015}, url = {https://doi.org/10.1093/cybsec/tyv008}, doi = {10.1093/CYBSEC/TYV008}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/RaderW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/SinhaNKBTJ15, author = {Arunesh Sinha and Thanh Hong Nguyen and Debarun Kar and Matthew Brown and Milind Tambe and Albert Xin Jiang}, title = {From physical security to cybersecurity}, journal = {J. Cybersecur.}, volume = {1}, number = {1}, pages = {19--35}, year = {2015}, url = {https://doi.org/10.1093/cybsec/tyv007}, doi = {10.1093/CYBSEC/TYV007}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecurity/SinhaNKBTJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.