Journal of Cybersecurity

短名J. Cybersecur.
Journal Impact3.03
国际分区SOCIAL SCIENCES, INTERDISCIPLINARY(Q1)
ISSN2057-2085, 2057-2093
h-index26

期刊主页
涉及主题计算机科学计算机安全政治学业务法学心理学操作系统互联网隐私经济哲学万维网数学社会学工程类互联网生物认识论语言学
出版信息出版商: Oxford University Press出版周期: 期刊类型: journal
基本数据创刊年份: 2015原创研究文献占比87.50%自引率:6.90%Gold OA占比: 98.51%
平均审稿周期 网友分享经验:18 Weeks

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

Cybersecurity when working from home during COVID-19: considering the human factors

2024-1-1

‘The trivial tickets build the trust’: a co-design approach to understanding security support interactions in a large university

2024-1-1

Who will take the bait? Using an embedded, experimental study to chart organization-specific phishing risk profiles and the effect of a voluntary microlearning among employees of a Dutch municipality

2024-1-1

‘There was a bit of PTSD every time I walked through the office door’: Ransomware harms and the factors that influence the victim organization’s experience

2024-1-1

The barriers to sustainable risk transfer in the cyber-insurance market

2024-1-1

The cybersecurity of fairy tales

2024-1-1

Behind the curve: technology challenges facing the homeland intelligence and counterterrorism workforce

2024-1-1

A systematic literature review on advanced persistent threat behaviors and its detection strategy

2024-1-1

The health belief model and phishing: determinants of preventative security behaviors

2024-1-1

Narrow windows of opportunity: the limited utility of cyber operations in war

2024-1-1

The simple economics of an external shock to a bug bounty platform

2024-1-1

Bugs in our pockets: the risks of client-side scanning

2024-1-1

DoWNet—classification of Denial-of-Wallet attacks on serverless application traffic

2024-1-1

Interdependent security games in the Stackelberg style: how first-mover advantage impacts free riding and security (under-)investment

2024-1-1

It is not only about having good attitudes: factor exploration of the attitudes toward security recommendations

2024-1-1

A close look at a systematic method for analyzing sets of security advice

2023-1-1

The concept of modern political confrontation in cyber space

2023-1-1

Classifying social media bots as malicious or benign using semi-supervised machine learning

2023-1-1

Development of a new ‘human cyber-resilience scale’

2023-1-1

Learning about simulated adversaries from human defenders using interactive cyber-defense games

2023-1-1

Realizing credible remote agricultural auditing with trusted video technology

2023-1-1

Defining the reporting threshold for a cybersecurity incident under the NIS Directive and the NIS 2 Directive

2023-1-1

Cybersecurity in UK Universities: mapping (or managing) threat intelligence sharing within the higher education sector

2023-1-1

Tell me more, tell me more: repeated personal data requests increase disclosure

2023-1-1

Contribution Threat Perception, School Climate and Prejudice as Mediator to Student’s Cyber Aggression

2023-1-1

Predictive Taxonomy Analytics (LASSO): Predicting Outcome Types of Cyber Breach

2023-1-1

Executive decision-makers: a scenario-based approach to assessing organizational cyber-risk perception

2023-1-1

The security mindset: characteristics, development, and consequences

2023-1-1

Adapting cybersecurity practice to reduce wildlife cybercrime

2023-1-1

From Russia with fear: fear appeals and the patterns of cyber-enabled influence operations

2023-1-1

Juror interpretations of metadata and content information: implications for the going dark debate

2023-1-1

Digital fingerprinting for identifying malicious collusive groups on Twitter

2023-1-1

Post-quantum cryptographic assemblages and the governance of the quantum threat

2023-1-1

The Power of Beliefs in US Cyber Strategy: The Evolving Role of Deterrence, Norms, and Escalation

2023-1-1

Testing human ability to detect ‘deepfake’ images of human faces

2023-1-1

The nature of losses from cyber-related events: risk categories and business sectors

2023-1-1

Maximizing the benefits from sharing cyber threat intelligence by government agencies and departments

2023-1-1

Efficient collective action for tackling time-critical cybersecurity threats

2023-1-1

A systematization of voter registration security

2023-1-1

The illogic of plausible deniability: why proxy conflict in cyberspace may no longer pay

2022-1-1

Cybersecurity service level agreements: understanding government data confidentiality requirements

2022-1-1

Is there a cyber security dilemma?

2022-1-1

Developing metrics to assess the effectiveness of cybersecurity awareness program

2022-1-1

Unpacking strategic behavior in cyberspace: a schema-driven approach

2022-1-1

SoK: cross-border criminal investigations and digital evidence

2022-1-1

Overcoming information-sharing challenges in cyber defence exercises

2022-1-1

An IoT Privacy-Oriented selective disclosure credential system

2022-1-1

Entanglement: cybercrime connections of a public forum population

2022-1-1

Building a launchpad for satellite cyber-security research: lessons from 60 years of spaceflight

2022-1-1

Accessible from the open web: a qualitative analysis of the available open-source information involving cyber security and critical infrastructure

2022-1-1

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司