Articles with "security breaches" as a keyword



Photo by radowanrehan from unsplash

Should researchers use data from security breaches?

Sign Up to like & get
recommendations!
Published in 2019 at "Communications of the ACM"

DOI: 10.1145/3368091

Abstract: Evaluating the arguments for and against using digital data derived from security breaches. read more here.

Keywords: researchers use; security breaches; security; use data ... See more keywords
Photo by thisisengineering from unsplash

SECURITY BREACHES IN TRUST MANAGEMENT SCHEMES IN MOBILE AD-HOC NETWORKS.

Sign Up to like & get
recommendations!
Published in 2017 at "International Journal of Approximate Reasoning"

DOI: 10.21474/ijar01/4425

Abstract: Bindiya Bhatia 1 , Dr. M. K. Soni 2 and Dr. Parul Tomar 3 . 1. Research Scholar, Department of Computer Science & Engineering, Faculty of Engineering & Technology, Manav Rachna International University, Faridabad, 121001,… read more here.

Keywords: engineering; breaches trust; security breaches; faridabad 121001 ... See more keywords