|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 227 occurrences of 185 keywords
|
|
|
Results
Found 550 publication records. Showing 545 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
117 | Maggie Xiaoyan Cheng, Lu Ruan 0001, Weili Wu 0001 |
Coverage breach problems in bandwidth-constrained sensor networks. |
ACM Trans. Sens. Networks |
2007 |
DBLP DOI BibTeX RDF |
coverage breach, scheduling, Sensor networks, energy efficiency, coverage, network lifetime |
114 | Anne M. Payton |
Data security breach: seeking a prescription for adequate remedy. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
data breach, data custodian, negligence, notification laws, identity theft, personal information, security breach |
84 | Lee T. Ayres, C. Matthew Curtin, Thomas A. Ng |
Standardizing Breach Incident Reporting: Introduction of a Key for Hierarchical Classification. |
SADFE |
2010 |
DBLP DOI BibTeX RDF |
data breach, security incident analysis, breach analysis, breach classification |
82 | Maggie Xiaoyan Cheng, Lu Ruan 0001, Weili Wu 0001 |
Achieving minimum coverage breach under bandwidth constraints in wireless sensor networks. |
INFOCOM |
2005 |
DBLP DOI BibTeX RDF |
|
69 | Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Akarun |
Finding Breach Paths Using the Watershed Segmentation Algorithm in Surveillance Wireless Sensor Networks. |
ISCIS |
2004 |
DBLP DOI BibTeX RDF |
|
57 | Jan Muntermann, Heiko Roßnagel |
On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market. |
NordSec |
2009 |
DBLP DOI BibTeX RDF |
Privacy Breaches, Privacy Disclosure Regulation, Event Study |
57 | Anirvan DuttaGupta, Arijit Bishnu, Indranil Sengupta 0001 |
Maximal Breach in Wireless Sensor Networks: Geometric Characterization and Algorithms. |
ALGOSENSORS |
2007 |
DBLP DOI BibTeX RDF |
|
57 | Anirvan DuttaGupta, Arijit Bishnu, Indranil Sengupta 0001 |
Optimisation Problems Based on the Maximal Breach Path Measure for Wireless Sensor Network Coverage. |
ICDCIT |
2006 |
DBLP DOI BibTeX RDF |
|
53 | Jill Slay, Michael Miller |
Lessons Learned from the Maroochy Water Breach. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
SCADA security, Maroochy Water Services breach |
53 | Kjell Hausken |
Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. |
Inf. Syst. Frontiers |
2006 |
DBLP DOI BibTeX RDF |
Security investment, Information protection, Returns assumptions, Information security breach, Logistic function, Vulnerability, Linearity, Convexity, Concavity |
52 | Chen Wang, My T. Thai, Yingshu Li, Feng Wang 0002, Weili Wu 0001 |
Optimization scheme for sensor coverage scheduling with bandwidth constraints. |
Optim. Lett. |
2009 |
DBLP DOI BibTeX RDF |
|
48 | Wendy Hui Wang, Laks V. S. Lakshmanan |
Probabilistic privacy analysis of published views. |
WPES |
2006 |
DBLP DOI BibTeX RDF |
privacy breach, private association, published views, probabilistic analysis |
39 | Yinying Yang, Mihaela Cardei |
Sensor Deployment for Composite Event Detection in Mobile WSNs. |
WASA |
2008 |
DBLP DOI BibTeX RDF |
composite event detection, sensor mobility, wireless sensor networks, reliability, sensor deployment |
39 | Jiexing Li, Yufei Tao 0001, Xiaokui Xiao |
Preservation of proximity privacy in publishing numerical sensitive data. |
SIGMOD Conference |
2008 |
DBLP DOI BibTeX RDF |
(?, m)-anonymity, privacy, anonymization, numeric |
39 | Lawrence A. Gordon, Martin P. Loeb |
The economics of information security investment. |
ACM Trans. Inf. Syst. Secur. |
2002 |
DBLP DOI BibTeX RDF |
Optimal security investment |
37 | Yuri Demchenko, Sonja Filiposka, Raimundas Tuminauskas, Anastas Mishev, Kurt Baumann, Damir Regvart, Tony Breach |
Enabling Automated Network Services Provisioning for Cloud Based Applications Using Zero Touch Provisioning. |
UCC |
2015 |
DBLP DOI BibTeX RDF |
|
37 | C. D. Breach, F. Wulff |
A brief review of selected aspects of the materials science of ball bonding. |
Microelectron. Reliab. |
2010 |
DBLP DOI BibTeX RDF |
|
37 | Michael R. Breach, Naseem Ansari |
Modeling non-ideal vapor-liquid phase equilibrium, mass and energy transfer in a binary system via augmentation of computational fluid dynamical methods. |
Comput. Chem. Eng. |
2007 |
DBLP DOI BibTeX RDF |
|
37 | C. D. Breach, F. Wulff, C. W. Tok |
An unusual mechanical failure mode in gold ballbonds at 50mum pitch due to degradation at the Au-Au4Al interface during ageing in air at 175degreeC. |
Microelectron. Reliab. |
2006 |
DBLP DOI BibTeX RDF |
|
37 | C. D. Breach, F. Wulff |
Oxidation of Au4Al in un-moulded gold ballbonds after high temperature storage (HTS) in air at 175degreeC. |
Microelectron. Reliab. |
2006 |
DBLP DOI BibTeX RDF |
|
37 | C. D. Breach, F. Wulff |
New observations on intermetallic compound formation in gold ball bonds: general growth patterns and identification of two forms of Au4Al. |
Microelectron. Reliab. |
2004 |
DBLP DOI BibTeX RDF |
|
37 | Gurindar S. Sohi, Scott E. Breach, T. N. Vijaykumar |
Multiscalar Processors. |
25 Years ISCA: Retrospectives and Reprints |
1998 |
DBLP DOI BibTeX RDF |
|
37 | Andreas Moshovos, Scott E. Breach, T. N. Vijaykumar, Gurindar S. Sohi |
Dynamic Speculation and Synchronization of Data Dependences. |
ISCA |
1997 |
DBLP DOI BibTeX RDF |
|
37 | D. R. Breach, Christian Krattenthaler, Marcus Schorn |
Two Combinatorial Identities (Ma Xin-Bong and Wang Tian-Ming). |
SIAM Rev. |
1996 |
DBLP DOI BibTeX RDF |
|
37 | Gurindar S. Sohi, Scott E. Breach, T. N. Vijaykumar |
Multiscalar Processors. |
ISCA |
1995 |
DBLP DOI BibTeX RDF |
|
37 | Scott E. Breach, T. N. Vijaykumar, Gurindar S. Sohi |
The anatomy of the register file in a multiscalar processor. |
MICRO |
1994 |
DBLP DOI BibTeX RDF |
|
37 | Todd M. Austin, Scott E. Breach, Gurindar S. Sohi |
Efficient Detection of All Pointer and Array Access Errors. |
PLDI |
1994 |
DBLP DOI BibTeX RDF |
C |
37 | D. R. Breach, Anne Penfold Street |
In search of 4-(12, 6, 4) designs: Part III. |
Australas. J Comb. |
1993 |
DBLP BibTeX RDF |
|
37 | D. R. Breach, Martin J. Sharry, Anne Penfold Street |
In search of 4-(12, 6, 4) designs: Part I. |
Australas. J Comb. |
1993 |
DBLP BibTeX RDF |
|
37 | D. R. Breach |
In search of 4-(12, 6, 4) designs: Part II. |
Australas. J Comb. |
1993 |
DBLP BibTeX RDF |
|
37 | D. R. Breach |
Double Sum of Bessel Functions in Computer Music (A. Ronveaux, J. P. Palamin, and P. Palamin). |
SIAM Rev. |
1989 |
DBLP DOI BibTeX RDF |
|
37 | D. R. Breach |
The 2-(9, 4, 3) and 3-(10, 5, 3) Designs. |
J. Comb. Theory, Ser. A |
1979 |
DBLP DOI BibTeX RDF |
|
36 | Salma Banu Nazeer Khan, Debbie Richards 0001, Paul Formosa, Sarah Bankins |
To breach or not? Profiling students' likelihood of breaching university ICT Codes of Conduct: Student Profiling of Breach of ICT Codes of Conduct. |
ACSW |
2023 |
DBLP DOI BibTeX RDF |
|
36 | Ehsan Ul Haque, Mohammad Maifi Hasan Khan, Md Abdullah Al Fahim, Theodore Jensen |
Divergences in Blame Attribution after a Security Breach based on Compliance Behavior: Implications for Post-breach Risk Communication. |
EuroUSEC |
2023 |
DBLP DOI BibTeX RDF |
|
36 | Hartmut Hoehle, Jia Wei, Sebastian Walter Schuetz, Viswanath Venkatesh |
User compensation as a data breach recovery action: a methodological replication and investigation of generalizability based on the Home Depot breach. |
Internet Res. |
2021 |
DBLP DOI BibTeX RDF |
|
36 | Stephen Jackson, Nadia Vanteeva, Colm Fearon |
An Investigation of the Impact of Data Breach Severity on the Readability of Mandatory Data Breach Notification Letters: Evidence From U.S. Firms. |
J. Assoc. Inf. Sci. Technol. |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Desmond Eseoghene Ighravwe, Daniel J. Mashao |
Development of a Differential Evolution-based Fuzzy Cognitive Maps for Data Breach in Health-care Sector Fuzzy Cognitive Maps for Data Breach. |
AFRICON |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Zahra Aivazpour, Rohit Valecha, Rajarshi Chakraborty |
The Impact of Data Breach Severity on Post-Breach Online Shopping Intention. |
ICIS |
2018 |
DBLP BibTeX RDF |
|
36 | Sigi Goode, Hartmut Hoehle, Viswanath Venkatesh, Susan A. Brown |
User Compensation as a Data Breach Recovery Action: An Investigation of the Sony PlayStation Network Breach. |
MIS Q. |
2017 |
DBLP DOI BibTeX RDF |
|
36 | Griselda Sinanaj, Humayun Zafar |
Who Wins in a Data Breach? - a Comparative Study on the Intangible Costs of Data Breach Incidents. |
PACIS |
2016 |
DBLP BibTeX RDF |
|
36 | Mark Kedgley |
If you can't stop the breach, at least spot the breach. |
Netw. Secur. |
2015 |
DBLP DOI BibTeX RDF |
|
36 | Fer O'Neil |
Target data breach: applying user-centered design principles to data breach notifications. |
SIGDOC |
2015 |
DBLP DOI BibTeX RDF |
|
35 | Neil Cooke, Lee Gillam, Ahmet M. Kondoz |
IP protection: Detecting Email based breaches of confidence. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
breach of confidence, outgoing email filters, Intellectual property, text analysis |
35 | Arunabha Mukhopadhyay, Samir Chatterjee, Debashis Saha, Ambuj Mahanti, Samir K. Sadhukhan |
e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
e-risk, premium, e-commerce, Bayesian Belief Network (BBN), copula, security breach |
35 | Ragib Hasan, William Yurcik |
A statistical analysis of disclosed storage security breaches. |
StorageSS |
2006 |
DBLP DOI BibTeX RDF |
breach disclosure laws, storage security, security breaches |
35 | Stephen S. Yau, Jun Zhu |
Intrusion ripple analysis in distributed information systems. |
FTDCS |
1997 |
DBLP DOI BibTeX RDF |
intrusion ripple analysis, security breach propagation, networked information system, internets, software maintenance, wide-area networks, distributed information systems, computer crime, ripple effect analysis |
26 | Yuan Hong, Xiaoyun He, Jaideep Vaidya, Nabil R. Adam, Vijayalakshmi Atluri |
Effective anonymization of query logs. |
CIKM |
2009 |
DBLP DOI BibTeX RDF |
privacy |
26 | Ting Wang 0006, Shicong Meng, Bhuvan Bamba, Ling Liu 0001, Calton Pu |
A General Proximity Privacy Principle. |
ICDE |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Srivatsava Ranjit Ganta, Shiva Prasad Kasiviswanathan, Adam D. Smith |
Composition attacks and auxiliary information in data privacy. |
KDD |
2008 |
DBLP DOI BibTeX RDF |
adversarial attacks, privacy, anonymization |
26 | Manolis Terrovitis, Nikos Mamoulis |
Privacy Preservation in the Publication of Trajectories. |
MDM |
2008 |
DBLP DOI BibTeX RDF |
spatial l-diversity, privacy, trajectories, spatiotemporal |
26 | Satoshi Hada, Kouichi Sakurai |
Ciphertext-Auditable Public Key Encryption. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Krishnaram Kenthapadi, Nina Mishra, Kobbi Nissim |
Simulatable auditing. |
PODS |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Supriya Singh, Margaret Jackson, Jenny Waycott, Jenine P. Beekhuyzen |
Downloading vs Purchase: Music Industry vs Consumers. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Cynthia Dwork, Kobbi Nissim |
Privacy-Preserving Datamining on Vertically Partitioned Databases. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Francis Kofi Andoh-Baidoo, Kwasi Amoako-Gyampah, Kweku-Muata Osei-Bryson |
How Internet Security Breaches Harm Market Value. |
IEEE Secur. Priv. |
2010 |
DBLP DOI BibTeX RDF |
Internet security breach, abnormal returns, decision-tree induction, market value |
22 | Esmiralda Moradian |
System Engineering Security. |
KES (2) |
2009 |
DBLP DOI BibTeX RDF |
security, software development, control, risk management, System engineering, security breach |
22 | Gale D. Fritsche, Sara K. Rodgers |
Encryption technologies: testing and identifying campus needs. |
SIGUCCS |
2007 |
DBLP DOI BibTeX RDF |
breach, mandate, privacy, evaluation, protection, compliance, sensitive data |
22 | Arunabha Mukhopadhyay, Samir Chatterjee, Rahul Roy, Debashis Saha, Ambuj Mahanti, Samir K. Sadhukhan |
Insuring Big Losses Due to Security Breaches through Insurance: A Business Model. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
e-risk, E-risk insurance, cyber-insurance, re-insurance, e-commerce, security breach |
22 | Arunabha Mukhopadhyay, Binay Bhushan, Debashis Saha, Ambuj Mahanti |
E-Risk Management through Self Insurance: An Option Model. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
e-risk, option model, self-insurance, e-commerce, security breach |
22 | Seapahn Megerian, Farinaz Koushanfar, Miodrag Potkonjak, Mani B. Srivastava |
Worst and Best-Case Coverage in Sensor Networks. |
IEEE Trans. Mob. Comput. |
2005 |
DBLP DOI BibTeX RDF |
maximal breach, maximal support, best-case coverage, worst-case coverage, Sensor networks, coverage |
22 | Stuart E. Schechter |
Toward Econometric Models of the Security Risk from Remote Attack. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
breach rates, forecasting risk, security, risk models |
22 | Suan-Suan Chew, Kok-Leong Ng, Chye-Lin Chee |
IAuth: An authentication system for Internet applications. |
COMPSAC |
1997 |
DBLP DOI BibTeX RDF |
IAuth, authentication system, digital signing, Web application server, distributed computing, Internet applications, message authentication, client server, Web-based application, data encryption, security breach, cryptographic keys |
18 | |
RETRACTED: Yan et al. Forecasting the Landslide Blocking River Process and Cascading Dam Breach Flood Propagation by an Integrated Numerical Approach: A Reservoir Area Case Study. Remote Sens. 2023, 15, 4669. |
Remote. Sens. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Gabriel Arquelau Pimenta Rodrigues, André Luiz Marques Serrano, Amanda Nunes Lopes Espiñeira Lemos, Edna Dias Canedo, Fábio Lúcio Lopes de Mendonça, Robson de Oliveira Albuquerque, Ana Lucila Sandoval Orozco, Luis Javier García-Villalba |
Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review. |
Data |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Lilyan Leblanc, Elie Saghbini, Jimmy Da Silva, Antoine Harlé, Saman Vafadar, Thibault Chandanson, Raphaël Vialle, Guillaume Morel, Brahim Tamadazte |
Automatic Spinal Canal Breach Detection During Pedicle Screw Placement. |
IEEE Robotics Autom. Lett. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Kainat Ansar, Mansoor Ahmed, Saif Ur Rehman Malik, Markus Helfert, Jungsuk Kim |
Blockchain based general data protection regulation compliant data breach detection system. |
PeerJ Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Yuanyuan Guo, Chaoyou Wang, Xiaoting Chen |
Functional or financial remedies? The effectiveness of recovery strategies after a data breach. |
J. Enterp. Inf. Manag. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Zhiqiang Xiong, Guangcai Feng, Lijia He, Haiyan Wang, Jianchao Wei |
Reactivation/Acceleration of Landslides Caused by the 2018 Baige Landslide-Dammed Lake and its Breach Floods Revealed by InSAR and Optical Images. |
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Murat Ozer, Yasin Kose, Mehmet F. Bastug, Goksel Kucukkaya, Eva Ruhsar Varlioglu |
The Shifting Landscape of Cybersecurity: The Impact of Remote Work and COVID-19 on Data Breach Trends. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Rajiv Thummala, Gregory Falco |
Hacktivism Goes Orbital: Investigating NB65's Breach of ROSCOSMOS. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
18 | John N. Angelis, Rajendran Murthy, Tanya Beaulieu, Joseph C. Miller |
Better Angry Than Afraid: The Case of Post Data Breach Emotions on Customer Engagement. |
IEEE Trans. Engineering Management |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Yan Cheng, Shue Mei, Weijun Zhong, Xing Gao 0002 |
Managing consumer privacy risk: The effects of privacy breach insurance. |
Electron. Commer. Res. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Shaharyar Khan, Ilya Kabanov, Yunke Hua, Stuart E. Madnick |
A Systematic Analysis of the Capital One Data Breach: Critical Lessons Learned. |
ACM Trans. Priv. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Geir Helge Kiplesund, Fjola Gudrun Sigtryggsdottir, Leif Lia |
Breach Progression Observation in Rockfill Dam Models Using Photogrammetry. |
Remote. Sens. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | |
Forecasting the Landslide Blocking River Process and Cascading Dam Breach Flood Propagation by an Integrated Numerical Approach: A Reservoir Area Case Study. |
Remote. Sens. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Muhammad Zia, M. Faisal Amjad, Zafar Iqbal, Abdul Rehman Javed, Thippa Reddy Gadekallu |
Circumventing Google Play vetting policies: a stealthy cyberattack that uses incremental updates to breach privacy. |
J. Ambient Intell. Humaniz. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Arif Rahman Hakim, Kalamullah Ramli, Teddy Surya Gunawan, Susila Windarta |
A Novel Digital Forensic Framework for Data Breach Investigation. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Daeun Lee, Harjinder Singh Lallie 0001, Nadine Michaelides |
The impact of an employee's psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation. |
Cogn. Technol. Work. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Aidana Massalimova, Maikel Timmermans, Nicola Cavalcanti, Daniel Suter, Matthias Seibold, Fabio Carrillo, Christoph J. Laux, Reto Sutter, Mazda Farshad, Kathleen Denis, Philipp Fürnstahl |
Automatic breach detection during spine pedicle drilling based on vibroacoustic sensing. |
Artif. Intell. Medicine |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Sung J. Choi, Min Chen 0026, Xuan Tan |
Assessing the impact of health information exchange on hospital data breach risk. |
Int. J. Medical Informatics |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Dominik Molitor, Wullianallur Raghupathi, Aditya N. Saharia, Viju Raghupathi |
Exploring Key Issues in Cybersecurity Data Breaches: Analyzing Data Breach Litigation with ML-Based Text Analytics. |
Inf. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Tianxi Dong, Suning Zhu, Mauro Oliveira, Xin (Robert) Luo |
Making better IS security investment decisions: discovering the cost of data breach announcements during the COVID-19 pandemic. |
Ind. Manag. Data Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Muhammad Waseem Bari, Qurrahtulain Khan, Asad Waqas |
Person related workplace bullying and knowledge hiding behaviors: relational psychological contract breach as an underlying mechanism. |
J. Knowl. Manag. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Chris Zhijian He, Tianpei Li, Robert E. Pinsker |
Firm-Level Pay Disparity and Breach Risk. |
J. Inf. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Barri Litt, Paul Tanyi, Marcia Weidenmier Watson |
Cybersecurity Breach at a Big 4 Accounting Firm: Effects on Auditor Reputation. |
J. Inf. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Hussein Aly 0001, Abdulaziz Al-Ali 0001, Abdullah Al-Ali, Qutaibah M. Malluhi |
A Blackbox Model Is All You Need to Breach Privacy: Smart Grid Forecasting Models as a Use Case. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Robert Lee Poe |
Why Fair Automated Hiring Systems Breach EU Non-Discrimination Law. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Shreyansh Padarha |
Data-Driven Dystopia: an uninterrupted breach of ethics. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Aidana Massalimova, Maikel Timmermans, Nicola Cavalcanti, Daniel Suter, Matthias Seibold, Fabio Carrillo, Christoph J. Laux, Reto Sutter, Mazda Farshad, Kathleen Denis, Philipp Fürnstahl |
Automatic breach detection during spine pedicle drilling based on vibroacoustic sensing. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Svetlana Abramova, Rainer Böhme |
Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet Case. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Daeun Lee, Harjinder Singh Lallie 0001, Nadine Michaelides |
The impact of an employee's psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Hung-Chung Su, Manus Johnny Rungtusanatham, Kevin W. Linderman |
Retail inventory shrinkage, sensing weak security breach signals, and organizational structure. |
Decis. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Emmanuel W. Ayaburi |
Understanding online information disclosure: examination of data breach victimization experience effect. |
Inf. Technol. People |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Giuseppe Persiano, Kevin Yeo |
Limits of Breach-Resistant and Snapshot-Oblivious RAMs. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
18 | Dario Pasquini, Danilo Francati, Giuseppe Ateniese, Evgenios M. Kornaropoulos |
Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
18 | Jing Rong Goh, Shaun S. Wang, Yaniv Harel, Gabriel Toh |
Predictive Taxonomy Analytics (LASSO): Predicting Outcome Types of Cyber Breach. |
J. Cybersecur. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Zareef A. Mohammed, Gurvirender P. Tejay |
How to Compensate After a Data Breach?: Investigating Compensation Types and Role of Fairness in Customer Repatronage Intentions. |
ACM SIGMIS Database |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Meirong Zhou, Miao Hu, Shenyang Jiang |
Impact of Data Breach on IT Investment: Moderating Role of Buyer-Supplier Relationship. |
WHICEB (1) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Harshvardhan J. Pandit, Paul Ryan, Georg Philip Krog, Martin Crane, Rob Brennan |
Towards a Semantic Specification for GDPR Data Breach Reporting. |
JURIX |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Meenu Rani Dey, Moumita Patra |
Hand it Over Carefully: Security Breach during Handover in 5G-V2X. |
COMSNETS |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 545 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ >>] |
|