has been cited by the following article(s):
[1]
|
Decision-Makers’ Understanding of Cyber-Security’s Systemic and Dynamic Complexity: Insights from a Board Game for Bank Managers
Systems,
2022
DOI:10.3390/systems10020049
|
|
|
[2]
|
Cybersecurity For Defense Economists
Defence and Peace Economics,
2022
DOI:10.1080/10242694.2022.2138122
|
|
|
[3]
|
Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties
Journal of Cybersecurity,
2021
DOI:10.1093/cybsec/tyab007
|
|
|
[4]
|
Ten years of attacks on companies using visual impersonation of domain names
2020 APWG Symposium on Electronic Crime Research (eCrime),
2020
DOI:10.1109/eCrime51433.2020.9493251
|
|
|
[5]
|
Software Security Investment: The Right Amount of a Good Thing
2016 IEEE Cybersecurity Development (SecDev),
2016
DOI:10.1109/SecDev.2016.020
|
|
|