Abstract | ||
---|---|---|
Advances in technology and a steady orientation of services toward the cloud are becoming increasingly popular with legitimate users and cybercriminals. How frequently is sensitive information leaked to the public? And how easy it is to identify it amongst the tangled maze of legitimate posts that are published daily? This underground bazaar is, after all, under the eyes of everyone. Do we have to worry about it and can we do anything to stop it? |
Year | Venue | Field |
---|---|---|
2012 | ERCIM NEWS | Telecommunications,Computer science,Computer security,Peering |
DocType | Volume | Issue |
Journal | 2012 | 90 |
ISSN | Citations | PageRank |
0926-4981 | 2 | 0.39 |
References | Authors | |
0 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Srdjan Matic | 1 | 2 | 0.73 |
Fattori, A. | 2 | 94 | 6.19 |
Danilo Bruschi | 3 | 771 | 70.35 |
Lorenzo Cavallaro | 4 | 886 | 52.85 |