OCLC COPYRIGHT - A THREAT TO SHARING

被引:0
|
作者
BISHOP, DF
机构
来源
JOURNAL OF ACADEMIC LIBRARIANSHIP | 1985年 / 11卷 / 04期
关键词
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
引用
收藏
页码:202 / 203
页数:2
相关论文
共 50 条
  • [21] Threat sharing - A neighbourhood watch for security practitioners
    Kirk, Richard
    [J]. Network Security, 2015, 2015 (12) : 5 - 7
  • [22] Risk Assessment of Sharing Cyber Threat Intelligence
    Albakri, Adham
    Boiten, Eerke
    Smith, Richard
    [J]. COMPUTER SECURITY, ESORICS 2020 INTERNATIONAL WORKSHOPS, 2020, 12580 : 92 - 113
  • [23] Semantic Ontologies for Cyber Threat Sharing Standards
    Asgarli, Elchin
    Burger, Eric
    [J]. 2016 IEEE SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2016,
  • [24] The Role of Cyber Threat Intelligence Sharing in the Metaverse
    Dunnett, Kealan
    Pal, Shantanu
    Jadidi, Zahra
    Jurdak, Raja
    [J]. IEEE Internet of Things Magazine, 2023, 6 (01): : 154 - 160
  • [25] Sharing primary data: a threat or asset to discovery?
    Stephen H. Koslow
    [J]. Nature Reviews Neuroscience, 2002, 3 : 311 - 313
  • [26] A Model for Automated Cybersecurity Threat Remediation and Sharing
    Settanni, Francesco
    Regano, Leonardo
    Basile, Cataldo
    Lioy, Antonio
    [J]. 2023 IEEE 9TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION, NETSOFT, 2023, : 492 - 497
  • [27] Sharing primary data: a threat or asset to discovery?
    Koslow, SH
    [J]. NATURE REVIEWS NEUROSCIENCE, 2002, 3 (04) : 311 - 313
  • [28] QOI: ASSESSING PARTICIPATION IN THREAT INFORMATION SHARING
    Park, Jeman
    Alasmary, Hisham
    Al-Ibrahim, Omar
    Kamhoua, Charles
    Kwiat, Kevin
    Njilla, Laurent
    Mohaisen, Aziz
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2018, : 6951 - 6955
  • [29] Overview of Threat Intelligence Sharing and Exchange in Cybersecurity
    Lin, Yue
    Liu, Peng
    Wang, He
    Wang, Wenjie
    Zhang, Yuqing
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2052 - 2065
  • [30] Visual Secret Sharing for Copyright Protection and Authentication of Color Images
    Huang, Hsiang-Cheh
    Lin, Jiun
    Lu, Yuh-Yih
    [J]. 2015 THIRD INTERNATIONAL CONFERENCE ON ROBOT, VISION AND SIGNAL PROCESSING (RVSP), 2015, : 151 - 154