Three cyber-security strategies to mitigate the impact of a data breach

被引:10
|
作者
Densham, Ben
机构
关键词
D O I
10.1016/S1353-4858(15)70007-3
中图分类号
学科分类号
摘要
引用
收藏
页码:5 / 8
相关论文
共 50 条
  • [1] Data Analysis for Network Cyber-security
    Dietz, Sebastian
    JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES A-STATISTICS IN SOCIETY, 2016, 179 (03) : 878 - 878
  • [2] Impact of Cyber-Security Issues on Smart Grid
    Yang, Y.
    Littler, Tim
    Sezer, S.
    McLaughlin, K.
    Wang, H. F.
    2011 2ND IEEE PES INTERNATIONAL CONFERENCE AND EXHIBITION ON INNOVATIVE SMART GRID TECHNOLOGIES (ISGT EUROPE), 2011,
  • [3] An anomaly detection framework for cyber-security data
    Evangelou, Marina
    Adams, Niall M.
    COMPUTERS & SECURITY, 2020, 97
  • [4] Social Cyber-Security
    Carley, Kathleen M.
    Cervone, Guido
    Agarwal, Nitin
    Liu, Huan
    SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, SBP-BRIMS 2018, 2018, 10899 : 389 - 394
  • [5] REGULATING CYBER-SECURITY
    Sales, Nathan Alexander
    NORTHWESTERN UNIVERSITY LAW REVIEW, 2013, 107 (04) : 1503 - 1568
  • [6] Cyber-security threat
    Klebba, Jesse
    CHEMISTRY & INDUSTRY, 2017, 81 (10) : 9 - 9
  • [7] Cyber-Security and Privacy
    Lopez, Javier
    Martinelli, Fabio
    Samarati, Pierangela
    ERCIM NEWS, 2015, (100): : 10 - 11
  • [8] Public-private partnerships in national cyber-security strategies
    Carr, Madeline
    INTERNATIONAL AFFAIRS, 2016, 92 (01) : 43 - +
  • [9] Analysis and Parsing of Unstructured Cyber-Security Incident Data
    Ochoa, Armando J.
    Finlayson, Mark A.
    PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 345 - 346
  • [10] Balancing Cyber-Security and Privacy
    Patakyova, Maria T.
    BRATISLAVA LAW REVIEW, 2020, 4 (01): : 181 - 183