Journal of Cybersecurity
短名 | J. Cybersecur. |
Journal Impact | 3.03 |
国际分区 | SOCIAL SCIENCES, INTERDISCIPLINARY(Q1) |
ISSN | 2057-2085, 2057-2093 |
h-index | 26 |
涉及主题 | 计算机科学计算机安全政治学业务法学心理学操作系统互联网隐私经济哲学万维网数学社会学工程类互联网生物认识论语言学 |
出版信息 | 出版商: Oxford University Press,出版周期: ,期刊类型: journal |
基本数据 | 创刊年份: 2015,原创研究文献占比: 87.50%,自引率:6.90%, Gold OA占比: 98.51% |
平均审稿周期 | 网友分享经验:18 Weeks |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
最新文章
Cybersecurity when working from home during COVID-19: considering the human factors
2024-1-1
‘The trivial tickets build the trust’: a co-design approach to understanding security support interactions in a large university
2024-1-1
Who will take the bait? Using an embedded, experimental study to chart organization-specific phishing risk profiles and the effect of a voluntary microlearning among employees of a Dutch municipality
2024-1-1
‘There was a bit of PTSD every time I walked through the office door’: Ransomware harms and the factors that influence the victim organization’s experience
2024-1-1
The barriers to sustainable risk transfer in the cyber-insurance market
2024-1-1
The cybersecurity of fairy tales
2024-1-1
Behind the curve: technology challenges facing the homeland intelligence and counterterrorism workforce
2024-1-1
A systematic literature review on advanced persistent threat behaviors and its detection strategy
2024-1-1
The health belief model and phishing: determinants of preventative security behaviors
2024-1-1
Narrow windows of opportunity: the limited utility of cyber operations in war
2024-1-1
The simple economics of an external shock to a bug bounty platform
2024-1-1
Bugs in our pockets: the risks of client-side scanning
2024-1-1
DoWNet—classification of Denial-of-Wallet attacks on serverless application traffic
2024-1-1
Interdependent security games in the Stackelberg style: how first-mover advantage impacts free riding and security (under-)investment
2024-1-1
It is not only about having good attitudes: factor exploration of the attitudes toward security recommendations
2024-1-1
A close look at a systematic method for analyzing sets of security advice
2023-1-1
The concept of modern political confrontation in cyber space
2023-1-1
Classifying social media bots as malicious or benign using semi-supervised machine learning
2023-1-1
Development of a new ‘human cyber-resilience scale’
2023-1-1
Learning about simulated adversaries from human defenders using interactive cyber-defense games
2023-1-1
Realizing credible remote agricultural auditing with trusted video technology
2023-1-1
Defining the reporting threshold for a cybersecurity incident under the NIS Directive and the NIS 2 Directive
2023-1-1
Cybersecurity in UK Universities: mapping (or managing) threat intelligence sharing within the higher education sector
2023-1-1
Tell me more, tell me more: repeated personal data requests increase disclosure
2023-1-1
Contribution Threat Perception, School Climate and Prejudice as Mediator to Student’s Cyber Aggression
2023-1-1
Predictive Taxonomy Analytics (LASSO): Predicting Outcome Types of Cyber Breach
2023-1-1
Executive decision-makers: a scenario-based approach to assessing organizational cyber-risk perception
2023-1-1
The security mindset: characteristics, development, and consequences
2023-1-1
Adapting cybersecurity practice to reduce wildlife cybercrime
2023-1-1
From Russia with fear: fear appeals and the patterns of cyber-enabled influence operations
2023-1-1
Juror interpretations of metadata and content information: implications for the going dark debate
2023-1-1
Digital fingerprinting for identifying malicious collusive groups on Twitter
2023-1-1
Post-quantum cryptographic assemblages and the governance of the quantum threat
2023-1-1
The Power of Beliefs in US Cyber Strategy: The Evolving Role of Deterrence, Norms, and Escalation
2023-1-1
Testing human ability to detect ‘deepfake’ images of human faces
2023-1-1
The nature of losses from cyber-related events: risk categories and business sectors
2023-1-1
Maximizing the benefits from sharing cyber threat intelligence by government agencies and departments
2023-1-1
Efficient collective action for tackling time-critical cybersecurity threats
2023-1-1
A systematization of voter registration security
2023-1-1
The illogic of plausible deniability: why proxy conflict in cyberspace may no longer pay
2022-1-1
Cybersecurity service level agreements: understanding government data confidentiality requirements
2022-1-1
Is there a cyber security dilemma?
2022-1-1
Developing metrics to assess the effectiveness of cybersecurity awareness program
2022-1-1
Unpacking strategic behavior in cyberspace: a schema-driven approach
2022-1-1
SoK: cross-border criminal investigations and digital evidence
2022-1-1
Overcoming information-sharing challenges in cyber defence exercises
2022-1-1
An IoT Privacy-Oriented selective disclosure credential system
2022-1-1
Entanglement: cybercrime connections of a public forum population
2022-1-1
Building a launchpad for satellite cyber-security research: lessons from 60 years of spaceflight
2022-1-1
Accessible from the open web: a qualitative analysis of the available open-source information involving cyber security and critical infrastructure
2022-1-1
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远