The hidden threat of cyber-attacks–undermining public confidence in government R Shandler, MA Gomez Journal of Information Technology & Politics 20 (4), 359-374, 2023 | 71 | 2023 |
Fear, uncertainty, and dread: Cognitive heuristics and cyber threats MA Gomez, EB Villar Politics and Governance 6 (2), 61-72, 2018 | 63 | 2018 |
Breaking the myth of cyber doom: Securitization and normalization of novel threats MA Gomez, C Whyte International Studies Quarterly 65 (4), 1137-1150, 2021 | 48 | 2021 |
Challenges and opportunities for cyber norms in ASEAN C Tran Dai, MA Gomez Journal of Cyber Policy 3 (2), 2018 | 46 | 2018 |
Sound the alarm! Updating beliefs and degradative cyber operations MAN Gomez European Journal of International Security 4 (2), 190-208, 2019 | 32 | 2019 |
An automated malware detection system for android using behavior-based analysis AMDA KJ Abela, DK Angeles, JRD Alas, RJ Tolentino, MA Gomez International Journal of Cyber-Security and Digital Forensics (IJCSDF) 2 (2 …, 2013 | 30 | 2013 |
Past behavior and future judgements: seizing and freezing in response to cyber operations MA Gomez Journal of Cybersecurity 5 (1), 2019 | 22 | 2019 |
Arming Cyberspace: The Militarization of a Virtual Domain MAN Gomez Global Security and Intelligence Studies 1 (2), 42 - 65, 2016 | 18 | 2016 |
Unpacking strategic behavior in cyberspace: a schema-driven approach MA Gomez, C Whyte Journal of cybersecurity 8 (1), tyac005, 2022 | 14 | 2022 |
Overcoming uncertainty in cyberspace: strategic culture and cognitive schemas MA Gomez Defence Studies 21 (1), 25-46, 2021 | 13 | 2021 |
Cyber uncertainties: Observations from cross-national war games MA Gomez, C Whyte Cyber security politics, 111-127, 2022 | 12 | 2022 |
Cyber-Enabled Information Warfare and Influence Operations MA Gomez Information Warfare in the Age of Cyber Conflict, 132 - 146, 2020 | 9 | 2020 |
Awaken the cyber dragon: China’s cyber strategy and its impact on asean MA Gomez Journal of Communication and Computer 10, 796-805, 2013 | 7 | 2013 |
Trust at risk: The effect of proximity to cyberattacks MA Gomez, R Shandler Journal of Global Security Studies 9 (2), ogae002, 2024 | 6 | 2024 |
Tracing strategic preferences in cyberspace: The role of regional and domestic strategic culture MA Gomez Comparative Strategy 42 (1), 103-127, 2022 | 6 | 2022 |
Cyber Conflict and the Erosion of Trust MA Gomez, R Shandler Council on Foreign Relations, 2022 | 5 | 2022 |
Cyber Wargaming: Grappling with Uncertainty in a Complex Domain MA Gomez, C Whyte Defense Strategy & Assessment Journal 10 (1), 95-135, 2020 | 5 | 2020 |
Identifying cyber strategies vis-a-vis cyber power MA Gomez 2013 World Cyberspace Cooperation Summit IV (WCC4), 1-7, 2013 | 5 | 2013 |
Automated signature creator for a signature based intrusion detection system (pancakes) FB De Ocampo, TM Del Castillo, MA Gomez The Second International Conference on Cyber Security, Cyber Peacefare and …, 2013 | 5 | 2013 |
Automated signature creator for a signature based intrusion detection system with network attack detection capabilities (pancakes) FBC De Ocampo, TML Del Castillo, MAN Gomez International Journal of Cyber-Security and Digital Forensics (IJCSDF) 2 (1 …, 2013 | 5 | 2013 |