Author:
Wafo Soh C.,Njilla L. L.,Kwiat K. K.,Kamhoua C. A.
Funder
Air Force Research Laboratory
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computer Science Applications,Information Systems
Reference69 articles.
1. Barbaro M, Zeller T, Hansell S (2006) A face is exposed for AOL searcher no. 4417749. New York Times 9(2008)
2. Bishop M, Bhumiratana B, Crawford R, Levitt K (2004) How to sanitize data. In: Enabling technologies: infrastructure for collaborative enterprises. WET ICE 2004. 13th IEEE International Workshops. IEEE, pp 217–222
3. Bishop M, Cummins J, Peisert S, Singh A, Bhumiratana B, Agarwal D, Frincke D, Hogarth M (2010) Relationships and data sanitization: a study in scarlet. In: Proceedings of the 2010 New Security Paradigms Workshop. ACM, pp 151–164
4. Carey P, Gerver KM, Moreno JV, Rockwood E (2016) Potential Risks and Rewards of Cybersecurity Information Sharing Under CISA. The National Law Review
5. Carr M (2016) Public-private partnerships in national cyber-security strategies. Int Affairs 92(1):43–62
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献