Similar Items: Process Theory of Supplier Cyber Risk Assessment
- Automating Cyber Risk Assessment With Public LLMs: An Expert-Validated Framework and Comparative Analysis
- Cyber Victimization in the Healthcare Industry: Analyzing Offender Motivations and Target Characteristics through Routine Activities Theory (RAT) and Cyber-Routine Activities Theory (Cyber-RAT)
- Reasoning about effects: from lists to cyber-physical agents
- Operationalizing Cyber-Routine Activities Theory for Senior Cybercrime Prevention: An Evaluation of the SHIELD Training-the-Trainer Program
- CRISP: Cyber-Resilient Intelligent Systems for Predicting Threats in Digital Ecosystems
- Enhancing Cyber Hygiene among Communities through Experiential Cyber-Security Awareness Programs