Data breach

Known as: Spill, Data spill, Data leak 
A data breach is the intentional or unintentional release of secure information to an untrusted environment. Other terms for this phenomenon include… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Nowadays, Cloud Computing services extend to all businesses due to their benefits and easy usability. The most important issue of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2015
2015
In this study we characterize the extent to which cyber security incidents, such as those referenced by Verizon in its annual… (More)
Is this relevant?
Highly Cited
2014
Highly Cited
2014
This paper focuses on the specific problem of Big Data classification of network intrusion traffic. It discusses the system… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2011
2011
Legal privacy scholarship has typically emphasized the various ways in which plaintiffs fail when bringing legal actions against… (More)
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 7
Is this relevant?
2010
2010
Recent legislation has increased the requirements of organizations to report data breaches, or unauthorized access to data. While… (More)
  • figure 1
  • figure 4
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Identity theft resulted in corporate and consumer l osses of $56 billion dollars in 2005, with about 30% of known identity thefts… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
  • figure 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
While the literature on information security economics has begun to investigate the stock market impact of security breaches and… (More)
  • figure 1
  • table 5
  • table 6
  • figure 2
  • table 7
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Finding clusters in data, especially high dimensional data, is challenging when the clusters are of widely differing shapes… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Unlike signature or misuse based intrusion detection techniques, anomaly detection is capable of detecting novel attacks. However… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
In this paper we describe the results achieved using the JAM distributed data mining system for the real world problem of fraud… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?