7 papers:
SEKE-2014-El-KharboutlyGF #analysis #security- Industry-wise Analysis of Security Breaches in Data Loss Incidents (REK, SSG, LF), pp. 615–619.
CSCW-2012-Poole #framework #research- Interacting with infrastructure: a case for breaching experiments in home computing research (ESP), pp. 759–768.
VLDB-2011-KaushikR #detection #named- Whodunit: An Auditing Tool for Detecting Data Breaches (RK, RR), pp. 1410–1413.
KMIS-2011-AinsworthM #approach #pervasive- Breaching the Strongroom — A Pervasive Informatics Approach to Working with Medieval Manuscripts (PFA, MM), pp. 264–271.
VLDB-2010-FabbriLZ #named #query- PolicyReplay: Misconfiguration-Response Queries for Data Breach Reporting (DF, KL, QZ), pp. 36–47.
CAV-2010-Donze #hybrid #parametricity #synthesis #verification- Breach, A Toolbox for Verification and Parameter Synthesis of Hybrid Systems (AD), pp. 167–170.
PODS-2003-EvfimievskiGS #data mining #mining #privacy- Limiting privacy breaches in privacy preserving data mining (AVE, JG, RS), pp. 211–222.