BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
data (4)
privaci (2)
informat (1)
hybrid (1)
loss (1)

Stem breach$ (all stems)

7 papers:

SEKESEKE-2014-El-KharboutlyGF #analysis #security
Industry-wise Analysis of Security Breaches in Data Loss Incidents (REK, SSG, LF), pp. 615–619.
CSCWCSCW-2012-Poole #framework #research
Interacting with infrastructure: a case for breaching experiments in home computing research (ESP), pp. 759–768.
VLDBVLDB-2011-KaushikR #detection #named
Whodunit: An Auditing Tool for Detecting Data Breaches (RK, RR), pp. 1410–1413.
KMISKMIS-2011-AinsworthM #approach #pervasive
Breaching the Strongroom — A Pervasive Informatics Approach to Working with Medieval Manuscripts (PFA, MM), pp. 264–271.
VLDBVLDB-2010-FabbriLZ #named #query
PolicyReplay: Misconfiguration-Response Queries for Data Breach Reporting (DF, KL, QZ), pp. 36–47.
CAVCAV-2010-Donze #hybrid #parametricity #synthesis #verification
Breach, A Toolbox for Verification and Parameter Synthesis of Hybrid Systems (AD), pp. 167–170.
PODSPODS-2003-EvfimievskiGS #data mining #mining #privacy
Limiting privacy breaches in privacy preserving data mining (AVE, JG, RS), pp. 211–222.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.