7 papers:
- SEKE-2014-El-KharboutlyGF #analysis #security
- Industry-wise Analysis of Security Breaches in Data Loss Incidents (REK, SSG, LF), pp. 615–619.
- CSCW-2012-Poole #framework #research
- Interacting with infrastructure: a case for breaching experiments in home computing research (ESP), pp. 759–768.
- VLDB-2011-KaushikR #detection #named
- Whodunit: An Auditing Tool for Detecting Data Breaches (RK, RR), pp. 1410–1413.
- KMIS-2011-AinsworthM #approach #pervasive
- Breaching the Strongroom — A Pervasive Informatics Approach to Working with Medieval Manuscripts (PFA, MM), pp. 264–271.
- VLDB-2010-FabbriLZ #named #query
- PolicyReplay: Misconfiguration-Response Queries for Data Breach Reporting (DF, KL, QZ), pp. 36–47.
- CAV-2010-Donze #hybrid #parametricity #synthesis #verification
- Breach, A Toolbox for Verification and Parameter Synthesis of Hybrid Systems (AD), pp. 167–170.
- PODS-2003-EvfimievskiGS #data mining #mining #privacy
- Limiting privacy breaches in privacy preserving data mining (AVE, JG, RS), pp. 211–222.