Critical visualization- a case for rethinking how we visualize risk and security
(Login to Download)
From physical security to cybersecurity
(Login to Download)
Identifying patterns in informal sources of security infromation
(Login to Download)
Increasing cybersecurity investments in private sector firms
(Login to Download)
Keys under doormats- mandating insecurity by requiring government access to all data and communications
(Login to Download)
Neural correlates of gender differences and color in distinguishing security warnings and legitimate websites- a neurosecurity study
(Login to Download)
Optimizing time allocation for network defence
(Login to Download)
Scripting the crime commission process in the illicit online prescription drug trade
(Login to Download)
Tipping the scales - the attribution problem and the feasibility of deterrence against cyberattack
(Login to Download)