A methodology for estimating the tangible cost of data breaches.
Robert LaytonPaul A. WattersPublished in: J. Inf. Secur. Appl. (2014)
Keyphrases
- data sets
- image data
- database
- data processing
- data structure
- synthetic data
- prior knowledge
- complex data
- raw data
- data collection
- high quality
- data sources
- small number
- end users
- data points
- data analysis
- training data
- high dimensional data
- website
- augmented reality
- feature selection
- original data
- data quality
- data mining