Three cyber-security strategies to mitigate the impact of a data breach

被引:9
|
作者
Densham, Ben
机构
关键词
D O I
10.1016/S1353-4858(15)70007-3
中图分类号
学科分类号
摘要
引用
收藏
页码:5 / 8
相关论文
共 50 条
  • [1] Data Analysis for Network Cyber-security
    Dietz, Sebastian
    [J]. JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES A-STATISTICS IN SOCIETY, 2016, 179 (03) : 878 - 878
  • [2] Impact of Cyber-Security Issues on Smart Grid
    Yang, Y.
    Littler, Tim
    Sezer, S.
    McLaughlin, K.
    Wang, H. F.
    [J]. 2011 2ND IEEE PES INTERNATIONAL CONFERENCE AND EXHIBITION ON INNOVATIVE SMART GRID TECHNOLOGIES (ISGT EUROPE), 2011,
  • [3] An anomaly detection framework for cyber-security data
    Evangelou, Marina
    Adams, Niall M.
    [J]. COMPUTERS & SECURITY, 2020, 97
  • [4] Social Cyber-Security
    Carley, Kathleen M.
    Cervone, Guido
    Agarwal, Nitin
    Liu, Huan
    [J]. SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, SBP-BRIMS 2018, 2018, 10899 : 389 - 394
  • [5] REGULATING CYBER-SECURITY
    Sales, Nathan Alexander
    [J]. NORTHWESTERN UNIVERSITY LAW REVIEW, 2013, 107 (04) : 1503 - 1568
  • [6] Cyber-security threat
    Klebba, Jesse
    [J]. CHEMISTRY & INDUSTRY, 2017, 81 (10) : 9 - 9
  • [7] Cyber-Security and Privacy
    Lopez, Javier
    Martinelli, Fabio
    Samarati, Pierangela
    [J]. ERCIM NEWS, 2015, (100): : 10 - 11
  • [8] Public-private partnerships in national cyber-security strategies
    Carr, Madeline
    [J]. INTERNATIONAL AFFAIRS, 2016, 92 (01) : 43 - +
  • [9] Analysis and Parsing of Unstructured Cyber-Security Incident Data
    Ochoa, Armando J.
    Finlayson, Mark A.
    [J]. PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 345 - 346
  • [10] Balancing Cyber-Security and Privacy
    Patakyova, Maria T.
    [J]. BRATISLAVA LAW REVIEW, 2020, 4 (01): : 181 - 183