https://i0.wp.com/hyslip.net/wp-content/uploads/2024/07/Navy-And-Blue-Modern-Cyber-Security-Service-Facebook-Cover.png?fit=1230%2C693&ssl=1

 

Hyslip, T., & Holt, T. “Assessing the Correlates of Job Stress and Satisfaction Among Federal Law Enforcement Officers.” Public Personnel Management. https://doi.org/10.1177/00910260241309143

Smirnova, O., Hyslip, T., & Holt, T. “Are active users the most central to hacker social networks? A comparative analysis of public and private online network structures among hackers.” Deviant Behavior, 1–17. https://doi.org/10.1080/01639625.2024.2373356

Hyslip, T., & Holt, T. “Examining the Correlates of Failed DRDoS Attacks.” Journal of Digital Forensic, Security and Law, 14(2),1-12.

Hyslip, T., & Holt, T. “Assessing the Capacity of DRDoS-For-Hire Services in Cybercrime Markets.” Deviant Behavior, 40(12), 1-17.

Hyslip, T., Lancelot, J, & Pelletier, R. “Department of Homeland Security Declares U.S. Election System Critical Infrastructure.” PA Times, American Society for Public Administration, 4(3), 64-65.

Hyslip, T., & Holt, T. “Defining the Profiles of Potential Cyber Criminals.” Homeland Defense and Security Journal, 5(2),24-29.

Horner, M., & Hyslip, T.SQL Injection: The Longest Running Sequel in Programming History.” Journal of Digital Forensic, Security and Law. 12(2), 97-108.

Holt, T,. & Hyslip, T.Combating Crime On-Line.” ACJS Today, Academy of Criminal Justice Sciences, 61(1), 32-36.

Hyslip, T., & Pittman, J. “A Survey of Botnet Detection Techniques by Command and Control Infrastructure.” Journal of Digital Forensic, Security and Law. 10(1), 7-26.

Book Chapters
Hyslip, Thomas & Burruss, George. “Ransomware” in The Handbook on Crime and Technology. James Byrne and Don Hummer, eds. Northampton: Edward Elgar.

Hyslip, Thomas.Cybercrime as-a-service operations.” in The Palgrave Handbook of International Cybercrime and Cyberdeviance, Thomas J. Holt and Adam Bossler, eds. New York: Palgrave MacMillan. https://doi.org/10.1007/978-3-319-78440-3_36