|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 227 occurrences of 185 keywords
|
|
|
Results
Found 550 publication records. Showing 545 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
117 | Maggie Xiaoyan Cheng, Lu Ruan 0001, Weili Wu 0001 |
Coverage breach problems in bandwidth-constrained sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Sens. Networks ![In: ACM Trans. Sens. Networks 3(2), pp. 12, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
coverage breach, scheduling, Sensor networks, energy efficiency, coverage, network lifetime |
114 | Anne M. Payton |
Data security breach: seeking a prescription for adequate remedy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 162-167, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
data breach, data custodian, negligence, notification laws, identity theft, personal information, security breach |
84 | Lee T. Ayres, C. Matthew Curtin, Thomas A. Ng |
Standardizing Breach Incident Reporting: Introduction of a Key for Hierarchical Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SADFE ![In: Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2010, Oakland, CA, USA, May 20, 2010, pp. 79-83, 2010, IEEE Computer Society, 978-0-7695-4052-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
data breach, security incident analysis, breach analysis, breach classification |
82 | Maggie Xiaoyan Cheng, Lu Ruan 0001, Weili Wu 0001 |
Achieving minimum coverage breach under bandwidth constraints in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA, pp. 2638-2645, 2005, IEEE, 0-7803-8968-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
69 | Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Akarun |
Finding Breach Paths Using the Watershed Segmentation Algorithm in Surveillance Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2004, 19th International Symposium, Kemer-Antalya, Turkey, October 27-29, 2004. Proceedings, pp. 363-372, 2004, Springer, 3-540-23526-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
57 | Jan Muntermann, Heiko Roßnagel |
On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings, pp. 1-14, 2009, Springer, 978-3-642-04765-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy Breaches, Privacy Disclosure Regulation, Event Study |
57 | Anirvan DuttaGupta, Arijit Bishnu, Indranil Sengupta 0001 |
Maximal Breach in Wireless Sensor Networks: Geometric Characterization and Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ALGOSENSORS ![In: Algorithmic Aspects of Wireless Sensor Networks, Third International Workshop, ALGOSENSORS 2007, Wroclaw, Poland, July 14, 2007, Revised Selected Papers, pp. 126-137, 2007, Springer, 978-3-540-77870-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
57 | Anirvan DuttaGupta, Arijit Bishnu, Indranil Sengupta 0001 |
Optimisation Problems Based on the Maximal Breach Path Measure for Wireless Sensor Network Coverage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, Third International Conference, ICDCIT 2006, Bhubaneswar, India, December 20-23, 2006, Proceedings, pp. 27-40, 2006, Springer, 3-540-68379-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
53 | Jill Slay, Michael Miller |
Lessons Learned from the Maroochy Water Breach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 73-82, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SCADA security, Maroochy Water Services breach |
53 | Kjell Hausken |
Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 8(5), pp. 338-349, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Security investment, Information protection, Returns assumptions, Information security breach, Logistic function, Vulnerability, Linearity, Convexity, Concavity |
52 | Chen Wang, My T. Thai, Yingshu Li, Feng Wang 0002, Weili Wu 0001 |
Optimization scheme for sensor coverage scheduling with bandwidth constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Optim. Lett. ![In: Optim. Lett. 3(1), pp. 63-75, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
48 | Wendy Hui Wang, Laks V. S. Lakshmanan |
Probabilistic privacy analysis of published views. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006, pp. 81-84, 2006, ACM, 1-59593-556-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy breach, private association, published views, probabilistic analysis |
39 | Yinying Yang, Mihaela Cardei |
Sensor Deployment for Composite Event Detection in Mobile WSNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WASA ![In: Wireless Algorithms, Systems, and Applications, Third International Conference, WASA 2008, Dallas, TX, USA, October 26-28, 2008. Proceedings, pp. 249-260, 2008, Springer, 978-3-540-88581-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
composite event detection, sensor mobility, wireless sensor networks, reliability, sensor deployment |
39 | Jiexing Li, Yufei Tao 0001, Xiaokui Xiao |
Preservation of proximity privacy in publishing numerical sensitive data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2008, Vancouver, BC, Canada, June 10-12, 2008, pp. 473-486, 2008, ACM, 978-1-60558-102-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
(?, m)-anonymity, privacy, anonymization, numeric |
39 | Lawrence A. Gordon, Martin P. Loeb |
The economics of information security investment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 5(4), pp. 438-457, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Optimal security investment |
37 | Yuri Demchenko, Sonja Filiposka, Raimundas Tuminauskas, Anastas Mishev, Kurt Baumann, Damir Regvart, Tony Breach |
Enabling Automated Network Services Provisioning for Cloud Based Applications Using Zero Touch Provisioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UCC ![In: 8th IEEE/ACM International Conference on Utility and Cloud Computing, UCC 2015, Limassol, Cyprus, December 7-10, 2015, pp. 458-464, 2015, IEEE Computer Society, 978-0-7695-5697-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
37 | C. D. Breach, F. Wulff |
A brief review of selected aspects of the materials science of ball bonding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microelectron. Reliab. ![In: Microelectron. Reliab. 50(1), pp. 1-20, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
37 | Michael R. Breach, Naseem Ansari |
Modeling non-ideal vapor-liquid phase equilibrium, mass and energy transfer in a binary system via augmentation of computational fluid dynamical methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Chem. Eng. ![In: Comput. Chem. Eng. 31(9), pp. 1047-1054, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | C. D. Breach, F. Wulff, C. W. Tok |
An unusual mechanical failure mode in gold ballbonds at 50mum pitch due to degradation at the Au-Au4Al interface during ageing in air at 175degreeC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microelectron. Reliab. ![In: Microelectron. Reliab. 46(2-4), pp. 543-557, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | C. D. Breach, F. Wulff |
Oxidation of Au4Al in un-moulded gold ballbonds after high temperature storage (HTS) in air at 175degreeC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microelectron. Reliab. ![In: Microelectron. Reliab. 46(12), pp. 2112-2121, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | C. D. Breach, F. Wulff |
New observations on intermetallic compound formation in gold ball bonds: general growth patterns and identification of two forms of Au4Al. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microelectron. Reliab. ![In: Microelectron. Reliab. 44(6), pp. 973-981, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
37 | Gurindar S. Sohi, Scott E. Breach, T. N. Vijaykumar |
Multiscalar Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
25 Years ISCA: Retrospectives and Reprints ![In: 25 Years of the International Symposia on Computer Architecture (Selected Papers)., pp. 521-532, 1998, ACM, 1-58113-058-9. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
37 | Andreas Moshovos, Scott E. Breach, T. N. Vijaykumar, Gurindar S. Sohi |
Dynamic Speculation and Synchronization of Data Dependences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCA ![In: Proceedings of the 24th International Symposium on Computer Architecture, Denver, Colorado, USA, June 2-4, 1997, pp. 181-193, 1997, ACM, 0-89791-901-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
37 | D. R. Breach, Christian Krattenthaler, Marcus Schorn |
Two Combinatorial Identities (Ma Xin-Bong and Wang Tian-Ming). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM Rev. ![In: SIAM Rev. 38(1), pp. 148-152, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
37 | Gurindar S. Sohi, Scott E. Breach, T. N. Vijaykumar |
Multiscalar Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCA ![In: Proceedings of the 22nd Annual International Symposium on Computer Architecture, ISCA '95, Santa Margherita Ligure, Italy, June 22-24, 1995, pp. 414-425, 1995, ACM, 0-89791-698-0. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
37 | Scott E. Breach, T. N. Vijaykumar, Gurindar S. Sohi |
The anatomy of the register file in a multiscalar processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: Proceedings of the 27th Annual International Symposium on Microarchitecture, San Jose, California, USA, November 30 - December 2, 1994, pp. 181-190, 1994, ACM / IEEE Computer Society, 0-89791-707-3. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
37 | Todd M. Austin, Scott E. Breach, Gurindar S. Sohi |
Efficient Detection of All Pointer and Array Access Errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: Proceedings of the ACM SIGPLAN'94 Conference on Programming Language Design and Implementation (PLDI), Orlando, Florida, USA, June 20-24, 1994, pp. 290-301, 1994, ACM, 0-89791-662-X. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
C |
37 | D. R. Breach, Anne Penfold Street |
In search of 4-(12, 6, 4) designs: Part III. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australas. J Comb. ![In: Australas. J Comb. 7, pp. 259-, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP BibTeX RDF |
|
37 | D. R. Breach, Martin J. Sharry, Anne Penfold Street |
In search of 4-(12, 6, 4) designs: Part I. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australas. J Comb. ![In: Australas. J Comb. 7, pp. 237-246, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP BibTeX RDF |
|
37 | D. R. Breach |
In search of 4-(12, 6, 4) designs: Part II. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australas. J Comb. ![In: Australas. J Comb. 7, pp. 247-258, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP BibTeX RDF |
|
37 | D. R. Breach |
Double Sum of Bessel Functions in Computer Music (A. Ronveaux, J. P. Palamin, and P. Palamin). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM Rev. ![In: SIAM Rev. 31(4), pp. 683-684, 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
37 | D. R. Breach |
The 2-(9, 4, 3) and 3-(10, 5, 3) Designs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comb. Theory, Ser. A ![In: J. Comb. Theory, Ser. A 27(1), pp. 50-63, 1979. The full citation details ...](Pics/full.jpeg) |
1979 |
DBLP DOI BibTeX RDF |
|
36 | Salma Banu Nazeer Khan, Debbie Richards 0001, Paul Formosa, Sarah Bankins |
To breach or not? Profiling students' likelihood of breaching university ICT Codes of Conduct: Student Profiling of Breach of ICT Codes of Conduct. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSW ![In: Proceedings of the 2023 Australasian Computer Science Week, ACSW 2023, Melbourne, VIC, Australia, 30 January 2023- 3 February 2023, pp. 50-57, 2023, ACM, 979-8-4007-0005-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
36 | Ehsan Ul Haque, Mohammad Maifi Hasan Khan, Md Abdullah Al Fahim, Theodore Jensen |
Divergences in Blame Attribution after a Security Breach based on Compliance Behavior: Implications for Post-breach Risk Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroUSEC ![In: Proceedings of the 2023 European Symposium on Usable Security, EuroUSEC 2023, Copenhagen, Denmark, October 16-17, 2023, pp. 27-47, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
36 | Hartmut Hoehle, Jia Wei, Sebastian Walter Schuetz, Viswanath Venkatesh |
User compensation as a data breach recovery action: a methodological replication and investigation of generalizability based on the Home Depot breach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Res. ![In: Internet Res. 31(3), pp. 765-781, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
36 | Stephen Jackson, Nadia Vanteeva, Colm Fearon |
An Investigation of the Impact of Data Breach Severity on the Readability of Mandatory Data Breach Notification Letters: Evidence From U.S. Firms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Assoc. Inf. Sci. Technol. ![In: J. Assoc. Inf. Sci. Technol. 70(11), pp. 1277-1289, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Desmond Eseoghene Ighravwe, Daniel J. Mashao |
Development of a Differential Evolution-based Fuzzy Cognitive Maps for Data Breach in Health-care Sector Fuzzy Cognitive Maps for Data Breach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICON ![In: 2019 IEEE AFRICON, Accra, Ghana, September 25-27, 2019, pp. 1-5, 2019, IEEE, 978-1-7281-3289-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Zahra Aivazpour, Rohit Valecha, Rajarshi Chakraborty |
The Impact of Data Breach Severity on Post-Breach Online Shopping Intention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the International Conference on Information Systems - Bridging the Internet of People, Data, and Things, ICIS 2018, San Francisco, CA, USA, December 13-16, 2018, 2018, Association for Information Systems. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
36 | Sigi Goode, Hartmut Hoehle, Viswanath Venkatesh, Susan A. Brown |
User Compensation as a Data Breach Recovery Action: An Investigation of the Sony PlayStation Network Breach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIS Q. ![In: MIS Q. 41(3), pp. 703-727, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
36 | Griselda Sinanaj, Humayun Zafar |
Who Wins in a Data Breach? - a Comparative Study on the Intangible Costs of Data Breach Incidents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACIS ![In: 20th Pacific Asia Conference on Information Systems, PACIS 2016, Chiayi, Taiwan, June 27 - July 1, 2016, pp. 60, 2016, 9789860491029. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
36 | Mark Kedgley |
If you can't stop the breach, at least spot the breach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Secur. ![In: Netw. Secur. 2015(4), pp. 11-12, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
36 | Fer O'Neil |
Target data breach: applying user-centered design principles to data breach notifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGDOC ![In: Proceedings of the 33rd Annual International Conference on the Design of Communication, SIGDOC 2015, Limerick, Ireland, July 16-17, 2015, pp. 47:1-47:8, 2015, ACM, 978-1-4503-3648-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
35 | Neil Cooke, Lee Gillam, Ahmet M. Kondoz |
IP protection: Detecting Email based breaches of confidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 197-202, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
breach of confidence, outgoing email filters, Intellectual property, text analysis |
35 | Arunabha Mukhopadhyay, Samir Chatterjee, Debashis Saha, Ambuj Mahanti, Samir K. Sadhukhan |
e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
e-risk, premium, e-commerce, Bayesian Belief Network (BBN), copula, security breach |
35 | Ragib Hasan, William Yurcik |
A statistical analysis of disclosed storage security breaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
StorageSS ![In: Proceedings of the 2006 ACM Workshop On Storage Security And Survivability, StorageSS 2006, Alexandria, VA, USA, October 30, 2006, pp. 1-8, 2006, ACM, 1-59593-552-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
breach disclosure laws, storage security, security breaches |
35 | Stephen S. Yau, Jun Zhu |
Intrusion ripple analysis in distributed information systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 29-31 October 1997, Tunis, Tunisia, Proceedings, pp. 28-33, 1997, IEEE Computer Society, 0-8186-8153-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
intrusion ripple analysis, security breach propagation, networked information system, internets, software maintenance, wide-area networks, distributed information systems, computer crime, ripple effect analysis |
26 | Yuan Hong, Xiaoyun He, Jaideep Vaidya, Nabil R. Adam, Vijayalakshmi Atluri |
Effective anonymization of query logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 18th ACM Conference on Information and Knowledge Management, CIKM 2009, Hong Kong, China, November 2-6, 2009, pp. 1465-1468, 2009, ACM, 978-1-60558-512-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy |
26 | Ting Wang 0006, Shicong Meng, Bhuvan Bamba, Ling Liu 0001, Calton Pu |
A General Proximity Privacy Principle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 25th International Conference on Data Engineering, ICDE 2009, March 29 2009 - April 2 2009, Shanghai, China, pp. 1279-1282, 2009, IEEE Computer Society, 978-0-7695-3545-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Srivatsava Ranjit Ganta, Shiva Prasad Kasiviswanathan, Adam D. Smith |
Composition attacks and auxiliary information in data privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Las Vegas, Nevada, USA, August 24-27, 2008, pp. 265-273, 2008, ACM, 978-1-60558-193-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
adversarial attacks, privacy, anonymization |
26 | Manolis Terrovitis, Nikos Mamoulis |
Privacy Preservation in the Publication of Trajectories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MDM ![In: 9th International Conference on Mobile Data Management (MDM 2008), Beijing, China, April 27-30, 2008, pp. 65-72, 2008, IEEE, 978-0-7695-3154-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
spatial l-diversity, privacy, trajectories, spatiotemporal |
26 | Satoshi Hada, Kouichi Sakurai |
Ciphertext-Auditable Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings, pp. 308-321, 2006, Springer, 3-540-47699-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Krishnaram Kenthapadi, Nina Mishra, Kobbi Nissim |
Simulatable auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 13-15, 2005, Baltimore, Maryland, USA, pp. 118-127, 2005, ACM, 1-59593-062-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Supriya Singh, Margaret Jackson, Jenny Waycott, Jenine P. Beekhuyzen |
Downloading vs Purchase: Music Industry vs Consumers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DRMTICS ![In: Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers, pp. 52-65, 2005, Springer, 3-540-35998-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Cynthia Dwork, Kobbi Nissim |
Privacy-Preserving Datamining on Vertically Partitioned Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings, pp. 528-544, 2004, Springer, 3-540-22668-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Francis Kofi Andoh-Baidoo, Kwasi Amoako-Gyampah, Kweku-Muata Osei-Bryson |
How Internet Security Breaches Harm Market Value. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 8(1), pp. 36-42, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Internet security breach, abnormal returns, decision-tree induction, market value |
22 | Esmiralda Moradian |
System Engineering Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based and Intelligent Information and Engineering Systems, 13th International Conference, KES 2009, Santiago, Chile, September 28-30, 2009, Proceedings, Part II, pp. 821-828, 2009, Springer, 978-3-642-04591-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, software development, control, risk management, System engineering, security breach |
22 | Gale D. Fritsche, Sara K. Rodgers |
Encryption technologies: testing and identifying campus needs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 35th Annual ACM SIGUCCS Conference on User Services 2007, Orlando, Florida, USA, October 7-10, 2007, pp. 109-112, 2007, ACM, 978-1-59593-634-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
breach, mandate, privacy, evaluation, protection, compliance, sensitive data |
22 | Arunabha Mukhopadhyay, Samir Chatterjee, Rahul Roy, Debashis Saha, Ambuj Mahanti, Samir K. Sadhukhan |
Insuring Big Losses Due to Security Breaches through Insurance: A Business Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 158, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
e-risk, E-risk insurance, cyber-insurance, re-insurance, e-commerce, security breach |
22 | Arunabha Mukhopadhyay, Binay Bhushan, Debashis Saha, Ambuj Mahanti |
E-Risk Management through Self Insurance: An Option Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 158, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
e-risk, option model, self-insurance, e-commerce, security breach |
22 | Seapahn Megerian, Farinaz Koushanfar, Miodrag Potkonjak, Mani B. Srivastava |
Worst and Best-Case Coverage in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 4(1), pp. 84-92, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
maximal breach, maximal support, best-case coverage, worst-case coverage, Sensor networks, coverage |
22 | Stuart E. Schechter |
Toward Econometric Models of the Security Risk from Remote Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(1), pp. 40-44, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
breach rates, forecasting risk, security, risk models |
22 | Suan-Suan Chew, Kok-Leong Ng, Chye-Lin Chee |
IAuth: An authentication system for Internet applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 21st International Computer Software and Applications Conference (COMPSAC '97), 11-15 August 1997, Washington, DC, USA, pp. 654-659, 1997, IEEE Computer Society, 0-8186-8105-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
IAuth, authentication system, digital signing, Web application server, distributed computing, Internet applications, message authentication, client server, Web-based application, data encryption, security breach, cryptographic keys |
18 | |
RETRACTED: Yan et al. Forecasting the Landslide Blocking River Process and Cascading Dam Breach Flood Propagation by an Integrated Numerical Approach: A Reservoir Area Case Study. Remote Sens. 2023, 15, 4669. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 16(6), pp. 934, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Gabriel Arquelau Pimenta Rodrigues, André Luiz Marques Serrano, Amanda Nunes Lopes Espiñeira Lemos, Edna Dias Canedo, Fábio Lúcio Lopes de Mendonça, Robson de Oliveira Albuquerque, Ana Lucila Sandoval Orozco, Luis Javier García-Villalba |
Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data ![In: Data 9(2), pp. 27, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Lilyan Leblanc, Elie Saghbini, Jimmy Da Silva, Antoine Harlé, Saman Vafadar, Thibault Chandanson, Raphaël Vialle, Guillaume Morel, Brahim Tamadazte |
Automatic Spinal Canal Breach Detection During Pedicle Screw Placement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Robotics Autom. Lett. ![In: IEEE Robotics Autom. Lett. 9(2), pp. 1915-1922, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Kainat Ansar, Mansoor Ahmed, Saif Ur Rehman Malik, Markus Helfert, Jungsuk Kim |
Blockchain based general data protection regulation compliant data breach detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PeerJ Comput. Sci. ![In: PeerJ Comput. Sci. 10, pp. e1882, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Yuanyuan Guo, Chaoyou Wang, Xiaoting Chen |
Functional or financial remedies? The effectiveness of recovery strategies after a data breach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Enterp. Inf. Manag. ![In: J. Enterp. Inf. Manag. 37(1), pp. 148-169, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Zhiqiang Xiong, Guangcai Feng, Lijia He, Haiyan Wang, Jianchao Wei |
Reactivation/Acceleration of Landslides Caused by the 2018 Baige Landslide-Dammed Lake and its Breach Floods Revealed by InSAR and Optical Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. ![In: IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 17, pp. 1656-1672, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Murat Ozer, Yasin Kose, Mehmet F. Bastug, Goksel Kucukkaya, Eva Ruhsar Varlioglu |
The Shifting Landscape of Cybersecurity: The Impact of Remote Work and COVID-19 on Data Breach Trends. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.06650, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Rajiv Thummala, Gregory Falco |
Hacktivism Goes Orbital: Investigating NB65's Breach of ROSCOSMOS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.10324, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | John N. Angelis, Rajendran Murthy, Tanya Beaulieu, Joseph C. Miller |
Better Angry Than Afraid: The Case of Post Data Breach Emotions on Customer Engagement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Engineering Management ![In: IEEE Trans. Engineering Management 71, pp. 2593-2605, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Yan Cheng, Shue Mei, Weijun Zhong, Xing Gao 0002 |
Managing consumer privacy risk: The effects of privacy breach insurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Commer. Res. ![In: Electron. Commer. Res. 23(2), pp. 807-841, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Shaharyar Khan, Ilya Kabanov, Yunke Hua, Stuart E. Madnick |
A Systematic Analysis of the Capital One Data Breach: Critical Lessons Learned. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Priv. Secur. ![In: ACM Trans. Priv. Secur. 26(1), pp. 3:1-3:29, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Geir Helge Kiplesund, Fjola Gudrun Sigtryggsdottir, Leif Lia |
Breach Progression Observation in Rockfill Dam Models Using Photogrammetry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 15(6), pp. 1715, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | |
Forecasting the Landslide Blocking River Process and Cascading Dam Breach Flood Propagation by an Integrated Numerical Approach: A Reservoir Area Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 15(19), pp. 4669, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Muhammad Zia, M. Faisal Amjad, Zafar Iqbal, Abdul Rehman Javed, Thippa Reddy Gadekallu |
Circumventing Google Play vetting policies: a stealthy cyberattack that uses incremental updates to breach privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 14(5), pp. 4785-4794, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Arif Rahman Hakim, Kalamullah Ramli, Teddy Surya Gunawan, Susila Windarta |
A Novel Digital Forensic Framework for Data Breach Investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 42644-42659, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Daeun Lee, Harjinder Singh Lallie 0001, Nadine Michaelides |
The impact of an employee's psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cogn. Technol. Work. ![In: Cogn. Technol. Work. 25(2-3), pp. 273-289, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Aidana Massalimova, Maikel Timmermans, Nicola Cavalcanti, Daniel Suter, Matthias Seibold, Fabio Carrillo, Christoph J. Laux, Reto Sutter, Mazda Farshad, Kathleen Denis, Philipp Fürnstahl |
Automatic breach detection during spine pedicle drilling based on vibroacoustic sensing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Medicine ![In: Artif. Intell. Medicine 144, pp. 102641, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Sung J. Choi, Min Chen 0026, Xuan Tan |
Assessing the impact of health information exchange on hospital data breach risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Medical Informatics ![In: Int. J. Medical Informatics 177, pp. 105149, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Dominik Molitor, Wullianallur Raghupathi, Aditya N. Saharia, Viju Raghupathi |
Exploring Key Issues in Cybersecurity Data Breaches: Analyzing Data Breach Litigation with ML-Based Text Analytics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. ![In: Inf. 14(11), pp. 600, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Tianxi Dong, Suning Zhu, Mauro Oliveira, Xin (Robert) Luo |
Making better IS security investment decisions: discovering the cost of data breach announcements during the COVID-19 pandemic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ind. Manag. Data Syst. ![In: Ind. Manag. Data Syst. 123(2), pp. 630-652, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Muhammad Waseem Bari, Qurrahtulain Khan, Asad Waqas |
Person related workplace bullying and knowledge hiding behaviors: relational psychological contract breach as an underlying mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Knowl. Manag. ![In: J. Knowl. Manag. 27(5), pp. 1299-1318, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Chris Zhijian He, Tianpei Li, Robert E. Pinsker |
Firm-Level Pay Disparity and Breach Risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Syst. ![In: J. Inf. Syst. 37(3), pp. 11-32, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Barri Litt, Paul Tanyi, Marcia Weidenmier Watson |
Cybersecurity Breach at a Big 4 Accounting Firm: Effects on Auditor Reputation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Syst. ![In: J. Inf. Syst. 37(2), pp. 77-100, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Hussein Aly 0001, Abdulaziz Al-Ali 0001, Abdullah Al-Ali, Qutaibah M. Malluhi |
A Blackbox Model Is All You Need to Breach Privacy: Smart Grid Forecasting Models as a Use Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.01523, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Robert Lee Poe |
Why Fair Automated Hiring Systems Breach EU Non-Discrimination Law. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.03900, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Shreyansh Padarha |
Data-Driven Dystopia: an uninterrupted breach of ethics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.07934, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Aidana Massalimova, Maikel Timmermans, Nicola Cavalcanti, Daniel Suter, Matthias Seibold, Fabio Carrillo, Christoph J. Laux, Reto Sutter, Mazda Farshad, Kathleen Denis, Philipp Fürnstahl |
Automatic breach detection during spine pedicle drilling based on vibroacoustic sensing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.15114, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Svetlana Abramova, Rainer Böhme |
Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.00375, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Daeun Lee, Harjinder Singh Lallie 0001, Nadine Michaelides |
The impact of an employee's psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.02916, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Hung-Chung Su, Manus Johnny Rungtusanatham, Kevin W. Linderman |
Retail inventory shrinkage, sensing weak security breach signals, and organizational structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Decis. Sci. ![In: Decis. Sci. 54(1), pp. 8-28, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Emmanuel W. Ayaburi |
Understanding online information disclosure: examination of data breach victimization experience effect. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Technol. People ![In: Inf. Technol. People 36(1), pp. 95-114, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Giuseppe Persiano, Kevin Yeo |
Limits of Breach-Resistant and Snapshot-Oblivious RAMs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 811, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Dario Pasquini, Danilo Francati, Giuseppe Ateniese, Evgenios M. Kornaropoulos |
Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1848, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Jing Rong Goh, Shaun S. Wang, Yaniv Harel, Gabriel Toh |
Predictive Taxonomy Analytics (LASSO): Predicting Outcome Types of Cyber Breach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cybersecur. ![In: J. Cybersecur. 9(1), January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Zareef A. Mohammed, Gurvirender P. Tejay |
How to Compensate After a Data Breach?: Investigating Compensation Types and Role of Fairness in Customer Repatronage Intentions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGMIS Database ![In: ACM SIGMIS Database 54(1), pp. 110-127, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Meirong Zhou, Miao Hu, Shenyang Jiang |
Impact of Data Breach on IT Investment: Moderating Role of Buyer-Supplier Relationship. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WHICEB (1) ![In: E-Business. Digital Empowerment for an Intelligent Future - 22nd Wuhan International Conference, WHICEB 2023, Wuhan, China, May 26-28, 2023, Proceedings, Part I, pp. 108-119, 2023, Springer, 978-3-031-32298-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Harshvardhan J. Pandit, Paul Ryan, Georg Philip Krog, Martin Crane, Rob Brennan |
Towards a Semantic Specification for GDPR Data Breach Reporting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JURIX ![In: Legal Knowledge and Information Systems - JURIX 2023: The Thirty-sixth Annual Conference, Maastricht, The Netherlands, 18-20 December 2023, pp. 131-136, 2023, IOS Press, 978-1-64368-472-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Meenu Rani Dey, Moumita Patra |
Hand it Over Carefully: Security Breach during Handover in 5G-V2X. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSNETS ![In: 15th International Conference on COMmunication Systems & NETworkS, COMSNETS 2023, Bangalore, India, January 3-8, 2023, pp. 360-363, 2023, IEEE, 978-1-6654-7706-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 545 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ >>] |
|