Browse by Journal
Jump to: Article
Number of items: 4.
Article
| Axon, Louise, Alahmadi, Bushra, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie (2020) Data Presentation in Security Operations Centres: Exploring the Potential for Sonification to Enhance Existing Practice. Journal of Cybersecurity, 6 (1). ISSN 2057-2085. E-ISSN 2057-2093. (doi:10.1093/cybsec/tyaa004) (KAR id:79587) |
| Casino, Fran, Hurley-Smith, Darren, Hernandez-Castro, Julio, Patsakis, Constantinos (2025) Not on my watch: ransomware detection through classification of high-entropy file segments. Journal of Cybersecurity, 11 (1). Article Number tyaf009. ISSN 2057-2085. (doi:10.1093/cybsec/tyaf009) (KAR id:110567) |
| Mott, Gareth, Turner, Sarah, Nurse, Jason R. C., Pattnaik, Nandita, MacColl, Jamie, Huesch, Pia, Sullivan, James (2024) “There was a bit of PTSD every time I walked through the office door”: Ransomware harms and the factors that influence the victim organisation’s experience. Journal of Cybersecurity, 10 (1). Article Number tyae013. ISSN 2057-2085. E-ISSN 2057-2093. (doi:10.1093/cybsec/tyae013) (KAR id:106485) |
| Agrafiotis, Ioannis, Nurse, Jason R. C., Goldsmith, Michael, Creese, Sadie, Upton, David (2018) A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, . ISSN 2057-2085. E-ISSN 2057-2093. (doi:10.1093/cybsec/tyy006) (KAR id:69076) |

Up a level