• Berghel H. The Equifax Hack Revisited and Repurposed. Computer. 10.1109/MC.2020.2979525. 53:5. (85-90).

    https://ieeexplore.ieee.org/document/9089077/

  • Hoffman A. Moral Hazards in Cyber Vulnerability Markets. Computer. 10.1109/MC.2019.2936635. 52:12. (83-88).

    https://ieeexplore.ieee.org/document/8909925/

  • Berghel H. (2019). Vehicle Telematics. Computer. 52:1. (66-70). Online publication date: 1-Jan-2019.

    https://doi.org/10.1109/MC.2019.2891334

  • Berghel H. (2017). On the Problem of (Cyber) Attribution. Computer. 50:3. (84-89). Online publication date: 1-Mar-2017.

    https://doi.org/10.1109/MC.2017.74

  • Berghel H. A Farewell to Air Gaps, Part 1. Computer. 10.1109/MC.2015.179. 48:6. (64-68).

    http://ieeexplore.ieee.org/document/7122176/

  • Berghel H. (2015). TSA: Mission Creep Meets Waste. Computer. 48:8. (90-94). Online publication date: 1-Aug-2015.

    https://doi.org/10.1109/MC.2015.227

  • Asher C, Aumasson J and Phan R. (2009). Security and Privacy Preservation in Human-Involved Networks. iNetSec 2009 – Open Research Problems in Network Security. 10.1007/978-3-642-05437-2_13. (139-148).

    http://link.springer.com/10.1007/978-3-642-05437-2_13