Skip to content
- Attackers and Defenders in Cybersecurity and their Optimal Investment Decisions. Austin Ebel (New York University), Debasis Mitra (Columbia University).
- A Theory of Open Source Security: The Spillover of Security Knowledge in Vulnerability Disclosures through Software Supply Chains. Yu-Kai Lin (Georgia State University), Weifeng Li (University of Georgia).
- Argot as a Trust Signal: Slang, Jargon & Reputation on a Large Cybercrime Forum. Jack Hughes (University of Cambridge), Andrew Caines (University of Cambridge), Alice Hutchings (University of Cambridge).
- Birds of a Feather? A Comparative Analysis of DDoS Victimisation by IoT Botnet and Amplification Attacks. Swaathi Vetrivel (Delft University of Technology), Arman Noroozian (University of Amsterdam), Daisuke Makita (Yokohama National University), Katsunari Yoshioka (Yokohama National University), Michel van Eeten (Delft University of Technology), Carlos H. Gañán (Delft University of Technology).
- Cyberattacks, Media Coverage and Municipal Finance. Lefteris Andreadis (Cyprus University of Technology), Elena Kalotychou (Cyprus University of Technology), Christodoulos Louca (Cyprus University of Technology), Christian Lundblad (University of North Carolina, Chapel Hill), Christos Makridis (Stanford University).
- Does Decomposing Losses Improve Our Understanding of the Financial Impact of Data Breaches? Justin Theriot (RiskLens), Benjamin Gowan (RiskLens).
- Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights. Jay Jacobs (Cyentia), Sasha Romanosky (RAND Corporation), Octavian Suciu (University of Maryland), Ben Edwards (Cyentia Institute), Armin Sarabi (University of Michigan).
- Interdependent Security Games in the Stackelberg Style: How First-Mover Advantage Impacts Free-Riding and Security (Under-)Investment. Ziyuan Huang (University of Michigan, Ann Arbor), Parinaz Naghizadeh (The Ohio State University), Mingyan Liu (University of Michigan, Ann Arbor).
- M&A Effect on Data Breaches in Hospitals: 2010-2022. Nan Clement (University of Texas at Dallas).
- Municipal Cyber Risk. Jonathan Jensen (Massachusetts Institute of Technology), Fiona Paine (Massachusetts Institute of Technology).
- Secure and Efficient Networks. Oleh Stupak (University of Cambridge).
- The Potential of Self-Regulation for Front-Running Prevention on DEXes. Lioba Heimbach (ETH Zurich), Eric Schertenleib (ETH Zurich), Roger Wattenhofer (ETH Zurich).
- Time Dynamics of Cyber Risk. Dingchen Ning (University of St. Gallen), Martin Eling (University of St.Gallen), Rustam Ibragimov (Imperial College London).
- Trade-offs in Automating Platform Regulatory Compliance By Algorithm: Evidence from the COVID-19 Pandemic. Grazia Cecere (Institut Mines Telecom, Business School), Clara Jean (Grenoble Ecole de Management), Vincent Lefrere (Institut Mines Telecom, Business School), Catherine Tucker (MIT Sloan School of Management and NBER).
- You Can Tell a Cybercriminal by the Company they Keep: A Framework to Infer the Relevance of Underground Communities to the Threat Landscape. Michele Campobasso (Eindhoven University of Technology), Radu Rădulescu (Eindhoven University of Technology), Sylvan Brons (Eindhoven University of Technology), Luca Allodi (Eindhoven University of Technology).