Measuring Privacy Compliance with Process Specifications, 2011 Third International Workshop on Security Measurements and Metrics, pp.41-50, 2011. ,
DOI : 10.1109/Metrisec.2011.10
Automatic Discovery and Quantification of Information Leaks, 2009 30th IEEE Symposium on Security and Privacy, pp.141-153, 2009. ,
DOI : 10.1109/SP.2009.18
Quantifying Information Leaks in Outbound Web Traffic, 2009 30th IEEE Symposium on Security and Privacy, pp.129-140, 2009. ,
DOI : 10.1109/SP.2009.9
On the Foundations of Quantitative Information Flow, FOSSACS, pp.288-302, 2009. ,
DOI : 10.1137/060651380
M-Score: A Misuseability Weight Measure, IEEE Transactions on Dependable and Secure Computing, vol.9, issue.3, pp.414-428, 2012. ,
DOI : 10.1109/TDSC.2012.17
Preventing Insider Information Leakage for Enterprises, 2008 Second International Conference on Emerging Security Information, Systems and Technologies, pp.99-106, 2008. ,
DOI : 10.1109/SECURWARE.2008.14
A Survey of Insider Attack Detection Research, Adv. Inf. Secur, vol.39, pp.69-90, 2008. ,
DOI : 10.1007/978-0-387-77322-3_5
Data loss prevention technologies, Fujitsu Scientific and Technical Journal, vol.46, issue.1, pp.47-55, 2010. ,
Towards next-generation intrusion detection, pp.1-18, 2011. ,
IRILD: An Information Retrieval Based Method for Information Leak Detection, 2011 Seventh European Conference on Computer Network Defense, pp.33-40, 2011. ,
DOI : 10.1109/EC2ND.2011.21
Data Leak Prevention through Named Entity Recognition, 2010 IEEE Second International Conference on Social Computing, pp.1129-1134, 2010. ,
DOI : 10.1109/SocialCom.2010.167
Text Classification for Data Loss Prevention, Privacy Enhancing Technologies, pp.18-37, 2011. ,
DOI : 10.1007/978-3-642-22263-4_2
Managing vulnerabilities of information systems to security incidents, Proceedings of the 5th international conference on Electronic commerce , ICEC '03, pp.348-354, 2003. ,
DOI : 10.1145/948005.948050
Quantifying the financial impact of IT security breaches, Information Management & Computer Security, vol.11, issue.2, pp.74-83, 2003. ,
DOI : 10.1108/09685220310468646
Information security is information risk management, Proceedings of the 2001 workshop on New security paradigms , NSPW '01, pp.97-104, 2001. ,
DOI : 10.1145/508171.508187
Privacy analysis of user behavior using alignments, it -Information Technology, vol.55, issue.6, pp.255-260 ,
Toward principles for the design of ontologies used for knowledge sharing?, International Journal of Human-Computer Studies, vol.43, issue.5-6, pp.907-928, 1995. ,
DOI : 10.1006/ijhc.1995.1081
GalenOWL: Ontology-based drug recommendations discovery, Journal of Biomedical Semantics, vol.3, issue.1, p.14, 2012. ,
DOI : 10.5121/ijwest.2011.2403