2016
DOI: 10.1093/cybsec/tyw004
|View full text |Cite
|
Sign up to set email alerts
|

Risky business: Fine-grained data breach prediction using business profiles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 33 publications
(15 citation statements)
references
References 7 publications
0
9
0
1
Order By: Relevance
“…The sample of data breach incidents used in this study is drawn from the VCDB. Prior studies (Amir et al, 2018;Sarabi et al, 2016;Chernyshev et al, 2019) have used the VCDB to study data breaches in a variety of contexts. The VCDB is an open repository of publicly reported breach incidents developed by Verizon that standardizes how data breach incidents are recorded and reported.…”
Section: Data and Methodology Samplementioning
confidence: 99%
“…The sample of data breach incidents used in this study is drawn from the VCDB. Prior studies (Amir et al, 2018;Sarabi et al, 2016;Chernyshev et al, 2019) have used the VCDB to study data breaches in a variety of contexts. The VCDB is an open repository of publicly reported breach incidents developed by Verizon that standardizes how data breach incidents are recorded and reported.…”
Section: Data and Methodology Samplementioning
confidence: 99%
“…Predicting Security Incidents. Prior work studied the feasibility of predicting future computer-security incidents [34,42,51,69,71,72,76]. Soska and Christin showed that, using publicly available indicators, they could reliably predict whether websites would be compromised within one year [76].…”
Section: Related Workmentioning
confidence: 99%
“…There are several models in the literature related to forecasting incidents that can impact personal rights, such as the chance of cybersecurity breaches (Liu et al 2015, Sarabi et al 2016 or a proposal regarding litigation forecasting (Brown et al 2004). We focus on forecasting the number n p of personal identifiable information records exposed in an attack as a proxy.…”
Section: Personal Rightsmentioning
confidence: 99%