Cyber Security: A Peer-Reviewed Journal
2017 - 2025
From Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().
Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 1, issue 4, 2018
- Editorial pp. 292-293

- Simon Beckett
- Should cyber security be included in compliance training? pp. 294-300

- Piotr Chmiel
- Data breach litigation and regulatory enforcement: A survey of our present and how to prepare for the future pp. 301-315

- Behnam Dayanim and Edward George
- Identity crisis: Detecting account opening fraud in the age of identity commoditisation pp. 316-325

- Uri Rivner
- The human factor in cyber security pp. 326-330

- Nicola Sotira
- Normative restraints on cyber conflict pp. 331-342

- Joseph S. Nye
- Effective foundational security principles pp. 343-350

- Erich Kron
- Human aspects of cyber security: Behaviour or culture change? pp. 351-360

- Adam Joinson and Tommy Van Steen
- Chief Information Security Officer best practices for 2018: Proactive cyber security pp. 361-367

- Travis Rosiek
- Cyberattacks survival guide pp. 368-376

- Gadi Naveh
Volume 1, issue 3, 2017
- Editorial pp. 197-198

- Mike Carpenter
- Memory protection challenges: Attacks on memory encryption pp. 199-206

- Rodrigo Rubira Branco and Shay Gueron
- The NIST Risk Management Framework: Problems and recommendations pp. 207-217

- Don Maclean
- Strategic decision making in cyber security: Lessons learned pp. 218-226

- Helmut Habermayer
- Cyber defence capability development for common security and defence policy of the European Union: A critical look back and ahead pp. 227-240

- Wolfgang Röhrig
- Successfully tackling cybercrime at the local level pp. 241-250

- Andy Haslam
- Cyber insurance comes of age pp. 251-258

- Gareth Tungatt
- Protocol analysis and vulnerabilities of Cisco’s autonomic network pp. 259-272

- Omar Eissa
- ‘Imagine if …’: The power of storytelling in building business resilience pp. 273-284

- Nick Wilding
Volume 1, issue 2, 2017
- Editorial pp. 100-101

- Simon Beckett
- Cyber incidents: How best to work with law enforcement pp. 102-115

- David H. Laufman, Sean Newell, Stephen Reynolds and Mike Buchwald
- Is your information security ecosystem consuming poisonous information and putting your enterprise at risk? pp. 116-126

- Gordon Mackay
- How machine learning is catching up with the insider threat pp. 127-133

- Jamie Graves
- Cyber resilience: Leadership matters pp. 134-146

- Cathie Armour
- Protecting the crown jewels of the government through infrastructure resilience and the DHS Continuous Diagnostics and Mitigation programme pp. 147-155

- Kevin Cox and Mark Kneidinger
- Cyber security talks: A content analysis of online discussions on ransomware pp. 156-164

- Gianluca Riglietti
- NATO: Stepping up its game in cyber defence pp. 165-174

- Jamie Shea
- Node.js Security pp. 175-186

- Ilya Verbitskiy
Volume 1, issue 1, 2017
- Editorial pp. 4-5

- Unknown
- A security evolution driven by the Internet of Intelligent Things pp. 6-15

- Steve P. Williamson
- Changing the rules of the game: How can law enforcement deter criminals by increasing the risks of conducting cybercrime? pp. 16-27

- Philipp Amann, Aglika Klayn and Grégory Mounier
- Consider the consequences: A powerful approach for reducing ICS cyber risk pp. 28-43

- Richard Wyman
- The fight within encryption pp. 44-47

- Sammy Basu
- Cyber as NATO’s newest operational domain: The pathway to implementation pp. 48-60

- Christos Athanasiadis and Rizwan Ali
- Industry 4.0: Security imperatives for IoT — converging networks, increasing risks pp. 61-68

- Shaun Bligh-Wall
- Partner or perish: Research collaboration to secure cyberspace pp. 69-79

- Gareth Parker and Alex Zelinsky
- Multi-vector threats and the argument for greater convergence pp. 80-91

- Ron Chandler, Brent Hambly, Jason Holcomb, George Ressopoulos and Matthew Wharton
- Cyber risk valuation: Show me the money pp. 92-94

- John B. Sapp