OCLC COPYRIGHT - A THREAT TO SHARING

被引:0
|
作者
BISHOP, DF
机构
来源
JOURNAL OF ACADEMIC LIBRARIANSHIP | 1985年 / 11卷 / 04期
关键词
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
引用
收藏
页码:202 / 203
页数:2
相关论文
共 50 条
  • [41] Secure and Robust Cyber Security Threat Information Sharing
    Bkakria, Anis
    Yaich, Reda
    Arabi, Walid
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2021, 2022, 13291 : 3 - 18
  • [42] Classification and Sharing Method of Malware Based on Threat Intelligence
    Liu, Guangyuan
    Zhou, Jiting
    Ma, Xiaoyu
    [J]. PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 2203 - 2207
  • [43] Cyber Threat Information Sharing: Perceived Benefits and Barriers
    Zibak, Adam
    Simpson, Andrew
    [J]. 14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [44] Security Automation and Threat Information-Sharing Options
    Kampanakis, Panos
    [J]. IEEE SECURITY & PRIVACY, 2014, 12 (05) : 42 - 51
  • [45] ORCON creep: Information sharing and the threat to government accountability
    Roberts, A
    [J]. GOVERNMENT INFORMATION QUARTERLY, 2004, 21 (03) : 249 - 267
  • [46] Assessing Quality of Contribution in Information Sharing for Threat Intelligence
    Mohaisen, Aziz
    Al-Ibrahim, Omar
    Kamhoua, Charles
    Kwiat, Kevin
    Njilla, Laurent
    [J]. 2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2017, : 182 - 183
  • [47] Cyber threat intelligence sharing: Survey and research directions
    Wagner, Thomas D.
    Mahbub, Khaled
    Palomar, Esther
    Abdallah, Ali E.
    [J]. COMPUTERS & SECURITY, 2019, 87
  • [48] A Summary of the Development of Cyber Security Threat Intelligence Sharing
    Du, Lili
    Fan, Yaqin
    Zhang, Lvyang
    Wang, Lianying
    Sun, Tianhang
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2020, 12 (04) : 54 - 67
  • [49] A survey on cyber threat intelligence sharing based on Blockchain
    Ahmed El-Kosairy
    Nashwa Abdelbaki
    Heba Aslan
    [J]. Advances in Computational Intelligence, 2023, 3 (3):
  • [50] Sharing Susceptible Passwords as Cyber Threat Intelligence Feed
    Vakilinia, Iman
    Cheung, Sui
    Sengupta, Shamik
    [J]. 2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 767 - 772