Search dblp for Publications

export results for "toc:db/journals/cybersecurity/cybersecurity1.bht:"

 download as .bib file

@article{DBLP:journals/cybersecurity/AbelsonABBBDGG015,
  author       = {Harold Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Whitfield Diffie and
                  John Gilmore and
                  Matthew Green and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Michael A. Specter and
                  Daniel J. Weitzner},
  title        = {Keys under doormats: mandating insecurity by requiring government
                  access to all data and communications},
  journal      = {J. Cybersecur.},
  volume       = {1},
  number       = {1},
  pages        = {69--79},
  year         = {2015},
  url          = {https://doi.org/10.1093/cybsec/tyv009},
  doi          = {10.1093/CYBSEC/TYV009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBDGG015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/AndersonKEJV15,
  author       = {Bonnie Brinton Anderson and
                  C. Brock Kirwan and
                  David Eargle and
                  Scott R. Jensen and
                  Anthony Vance},
  title        = {Neural correlates of gender differences and color in distinguishing
                  security warnings and legitimate websites: a neurosecurity study},
  journal      = {J. Cybersecur.},
  volume       = {1},
  number       = {1},
  pages        = {109--120},
  year         = {2015},
  url          = {https://doi.org/10.1093/cybsec/tyv005},
  doi          = {10.1093/CYBSEC/TYV005},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/AndersonKEJV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/CaulfieldF15,
  author       = {Tristan Caulfield and
                  Andrew Fielder},
  title        = {Optimizing time allocation for network defence},
  journal      = {J. Cybersecur.},
  volume       = {1},
  number       = {1},
  pages        = {37--51},
  year         = {2015},
  url          = {https://doi.org/10.1093/cybsec/tyv002},
  doi          = {10.1093/CYBSEC/TYV002},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/CaulfieldF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/GordonLLZ15,
  author       = {Lawrence A. Gordon and
                  Martin P. Loeb and
                  William Lucyshyn and
                  Lei Zhou},
  title        = {Increasing cybersecurity investments in private sector firms},
  journal      = {J. Cybersecur.},
  volume       = {1},
  number       = {1},
  pages        = {3--17},
  year         = {2015},
  url          = {https://doi.org/10.1093/cybsec/tyv011},
  doi          = {10.1093/CYBSEC/TYV011},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/GordonLLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/HallHC15,
  author       = {Peter Hall and
                  Claude Heath and
                  Lizzie Coles{-}Kemp},
  title        = {Critical visualization: a case for rethinking how we visualize risk
                  and security},
  journal      = {J. Cybersecur.},
  volume       = {1},
  number       = {1},
  pages        = {93--108},
  year         = {2015},
  url          = {https://doi.org/10.1093/cybsec/tyv004},
  doi          = {10.1093/CYBSEC/TYV004},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/HallHC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/LeontiadisH15,
  author       = {Nektarios Leontiadis and
                  Alice Hutchings},
  title        = {Scripting the crime commission process in the illicit online prescription
                  drug trade},
  journal      = {J. Cybersecur.},
  volume       = {1},
  number       = {1},
  pages        = {81--92},
  year         = {2015},
  url          = {https://doi.org/10.1093/cybsec/tyv006},
  doi          = {10.1093/CYBSEC/TYV006},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/LeontiadisH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/Lindsay15,
  author       = {Jon R. Lindsay},
  title        = {Tipping the scales: the attribution problem and the feasibility of
                  deterrence against cyberattack},
  journal      = {J. Cybersecur.},
  volume       = {1},
  number       = {1},
  pages        = {53--67},
  year         = {2015},
  url          = {https://doi.org/10.1093/cybsec/tyv003},
  doi          = {10.1093/CYBSEC/TYV003},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/Lindsay15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/MooreP15,
  author       = {Tyler Moore and
                  David J. Pym},
  title        = {Welcome from the Editors-in-Chief},
  journal      = {J. Cybersecur.},
  volume       = {1},
  number       = {1},
  pages        = {1--2},
  year         = {2015},
  url          = {https://doi.org/10.1093/cybsec/tyv010},
  doi          = {10.1093/CYBSEC/TYV010},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/MooreP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/RaderW15,
  author       = {Emilee J. Rader and
                  Rick Wash},
  title        = {Identifying patterns in informal sources of security information},
  journal      = {J. Cybersecur.},
  volume       = {1},
  number       = {1},
  pages        = {121--144},
  year         = {2015},
  url          = {https://doi.org/10.1093/cybsec/tyv008},
  doi          = {10.1093/CYBSEC/TYV008},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/RaderW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/SinhaNKBTJ15,
  author       = {Arunesh Sinha and
                  Thanh Hong Nguyen and
                  Debarun Kar and
                  Matthew Brown and
                  Milind Tambe and
                  Albert Xin Jiang},
  title        = {From physical security to cybersecurity},
  journal      = {J. Cybersecur.},
  volume       = {1},
  number       = {1},
  pages        = {19--35},
  year         = {2015},
  url          = {https://doi.org/10.1093/cybsec/tyv007},
  doi          = {10.1093/CYBSEC/TYV007},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/SinhaNKBTJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}