Articles with "security breaches" as a keyword



Photo by radowanrehan from unsplash

Should researchers use data from security breaches?

Sign Up to like & get
recommendations!
Published in 2019 at "Communications of the ACM"

DOI: 10.1145/3368091

Abstract: Evaluating the arguments for and against using digital data derived from security breaches. read more here.

Keywords: researchers use; security breaches; security; use data ... See more keywords

EXPRESS: Network Structures, Audit Policies and the Cost of Security Breaches

Sign Up to like & get
recommendations!
Published in 2025 at "Production and Operations Management"

DOI: 10.1177/10591478251356431

Abstract: In the last decade and recently, a wide range of industries and organizations have been subject to IT-related security threats and cybersecurity breaches of varying degrees of severity at an alarming rate. A common practice… read more here.

Keywords: audit policies; security breaches; network; cost ... See more keywords

SECURITY BREACHES IN TRUST MANAGEMENT SCHEMES IN MOBILE AD-HOC NETWORKS.

Sign Up to like & get
recommendations!
Published in 2017 at "International Journal of Approximate Reasoning"

DOI: 10.21474/ijar01/4425

Abstract: Bindiya Bhatia 1 , Dr. M. K. Soni 2 and Dr. Parul Tomar 3 . 1. Research Scholar, Department of Computer Science & Engineering, Faculty of Engineering & Technology, Manav Rachna International University, Faridabad, 121001,… read more here.

Keywords: engineering; breaches trust; security breaches; faridabad 121001 ... See more keywords