Author:
Pieters Wolter,Hadžiosmanović Dina,Dechesne Francien
Publisher
Springer Science and Business Media LLC
Subject
Management of Technology and Innovation,Health Policy,Issues, ethics and legal aspects,Health(social science)
Reference54 articles.
1. Bilge, L., & Dumitras, T. (2012). Before we knew it: An empirical study of zero-day attacks in the real world. In Proceedings of the 2012 ACM conference on computer and communications security (pp. 833–844). New York, NY, USA: ACM. doi: 10.1145/2382196.2382284 .
2. Böhme, R. (2006). A comparison of market approaches to software vulnerability disclosure. In G. Müller (Ed.), Emerging trends in information and communication security (Vol. 3995, pp. 298–311). Berlin: Springer. doi: 10.1007/11766155_21 .
3. Bullée, J.-W. H., Montoya, L., Pieters, W., Junger, M., & Hartel, P. H. (2015). The persuasion and security awareness experiment: Reducing the success of social engineering attacks. Journal of Experimental Criminology. doi: 10.1007/s11292-014-9222-7 .
4. Cavusoglu, H., Cavusoglu, H., & Raghunathan, S. (2005). Emerging issues in responsible vulnerability disclosure. In Proceedings of the workshop on the economics of information security (WEIS).
5. Commissie onderzoek elektronisch stemmen in het stemlokaal. (2013). Elke stem telt: Elektronisch stemmen en tellen. http://tinyurl.com/nkg5m2s . Ministerie van Binnenlandse Zaken en Koninkrijksrelaties.
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献