Author:
Liu Peng,Ammann Paul,Jajodia Sushil
Publisher
Springer Science and Business Media LLC
Subject
Information Systems and Management,Hardware and Architecture,Information Systems,Software
Cited by
47 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Database Recovery from Malicious Transactions: A Use of Provenance Information;Proceedings of the 10th International Conference on Data Science, Technology and Applications;2021
2. MIRES: Recovering Mobile Applications based on Backend-as-a-Service from Cyber Attacks;MobiQuitous 2020 - 17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services;2020-12-07
3. Recoverable Token: Recovering from Intrusions against Digital Assets in Ethereum;2020 IEEE 19th International Symposium on Network Computing and Applications (NCA);2020-11-24
4. WITHDRAWN: Risk analysis and damage assessment of financial institutions in cyber attacks between nations;Mathematical and Computer Modelling;2013-12
5. A Multi-version Database Damage Assessment Model;Proceedings of the 10th International Workshop on Security in Information Systems;2013