[Raw
data] [50 most cited papers]
[50 most relevant papers]
[cites used to compute IF]
[Recent
citations ][Frequent citing
series ] [more data in
EconPapers]
[
trace new citations] [Missing
citations? Add them now]
[Incorrect content? Let us
know]
| IF: | Two years Impact Factor: C2Y / D2Y |
| AIF: | Average Impact Factor for all series in RePEc in year y |
| CIF: | Cumulative impact factor |
| IF5: | Five years Impact Factor: C5Y / D5Y |
| DOC: | Number of documents published in year y |
| CDO: | Cumulative number of documents published until year y |
| CIT: | Number of citations to papers published in year y |
| NCI: | Number of citations in year y |
| CCU: | Cumulative number of citations to papers published until year y |
| D2Y: | Number of articles published in y-1 plus y-2 |
| C2Y: | Cites in y to articles published in y-1 plus y-2 |
| D5Y: | Number of articles published in y-1 until y-5 |
| C5Y: | Cites in y to articles published in y-1 until y-5 |
| SC: | selft citations in y to articles published in y-1 plus y-2 |
| %SC: | Percentage of selft citations in y to articles published in y-1 plus y-2 |
| CiY: | Cites in year y to documents published in year y |
| II: | Immediacy Index: CiY / Documents. |
| AII: | Average Immediacy Index for series in RePEc in year y |
| # | Year | Title | Cited |
|---|---|---|---|
| 1 | 2023 | Beyond detection: Uncovering unknown threats. (2023). Chen, George. In: Cyber Security: A Peer-Reviewed Journal. RePEc:aza:csj000:y:2023:v:7:i:1:p:6-15. Full description at Econpapers || Download paper | 1 |
| 2 | 2018 | Small and medium enterprises: Analysing the cyber challenge. (2018). Alcantara, Patrick ; Aguada, Lucila ; Riglietti, Gianluca. In: Cyber Security: A Peer-Reviewed Journal. RePEc:aza:csj000:y:2018:v:2:i:2:p:163-172. Full description at Econpapers || Download paper | 1 |
| 3 | 2023 | Dangers of succumbing to bias in cyber security : An evaluation of the impact of cognitive biases on threat assessments and cyber security strategies. (2023). Darley, Hanah-Marie. In: Cyber Security: A Peer-Reviewed Journal. RePEc:aza:csj000:y:2023:v:6:i:3:p:211-219. Full description at Econpapers || Download paper | 1 |
| 4 | 2018 | âReasonable securityâ: A moving target. (2018). , Margo ; Shreve, James ; McGinn, Elizabeth E. In: Cyber Security: A Peer-Reviewed Journal. RePEc:aza:csj000:y:2018:v:2:i:1:p:90-97. Full description at Econpapers || Download paper | 1 |
| 5 | 2022 | The new offensive cyber security: Strategically using asymmetrical tactics to promote information security. (2022). Ott, Christopher. In: Cyber Security: A Peer-Reviewed Journal. RePEc:aza:csj000:y:2022:v:5:i:4:p:286-293. Full description at Econpapers || Download paper | 1 |
| 6 | 2020 | Non-traditional cyber adversaries: Combatting human trafficking through data science. (2020). Caltagirone, Sherrie ; Borrelli, Danielle. In: Cyber Security: A Peer-Reviewed Journal. RePEc:aza:csj000:y:2020:v:4:i:1:p:77-90. Full description at Econpapers || Download paper | 1 |
| 7 | 2024 | Why crisis leadership competencies matter in the effective management of a cyber crisis. (2024). Sapriel, Caroline. In: Cyber Security: A Peer-Reviewed Journal. RePEc:aza:csj000:y:2024:v:8:i:2:p:160-168. Full description at Econpapers || Download paper | 1 |
| 8 | 2019 | Impersonation fraud scenarios: How to protect, detect and respond. (2019). Bruno, Mario. In: Cyber Security: A Peer-Reviewed Journal. RePEc:aza:csj000:y:2019:v:3:i:1:p:6-13. Full description at Econpapers || Download paper | 1 |
| # | Year | Title | Cited |
|---|
| Year | Title |
|---|
| Year | Citing document |
|---|