A complete guide to the common vulnerability scoring system version 2.0 P Mell, K Scarfone, S Romanosky Published by FIRST-forum of incident response and security teams 1, 23, 2007 | 774 | 2007 |
Common vulnerability scoring system P Mell, K Scarfone, S Romanosky IEEE Security & Privacy 4 (6), 85-89, 2006 | 652 | 2006 |
Do data breach disclosure laws reduce identity theft? S Romanosky, R Telang, A Acquisti Journal of Policy Analysis and Management 30 (2), 256-286, 2011 | 415 | 2011 |
Examining the costs and causes of cyber incidents S Romanosky Journal of Cybersecurity 2 (2), 121-135, 2016 | 374 | 2016 |
Human selection of mnemonic phrase-based passwords C Kuo, S Romanosky, LF Cranor Proceedings of the second symposium on Usable privacy and security, 67-78, 2006 | 321 | 2006 |
Empirical analysis of data breach litigation S Romanosky, D Hoffman, A Acquisti Journal of Empirical Legal Studies 11 (1), 74-104, 2014 | 272 | 2014 |
Content analysis of cyber insurance policies: how do carriers price cyber risk? S Romanosky, L Ablon, A Kuehn, T Jones Journal of Cybersecurity 5 (1), tyz002, 2019 | 205 | 2019 |
Privacy costs and personal data protection: Economic and legal perspectives S Romanosky, A Acquisti Berkeley Tech. LJ 24, 1061, 2009 | 154 | 2009 |
Improving the common vulnerability scoring system P Mell, K Scarfone IET Information Security 1 (3), 119-127, 2007 | 132 | 2007 |
Consumer attitudes toward data breach notifications and loss of personal information L Ablon, P Heaton, DC Lavery, S Romanosky Rand Corporation, 2016 | 101 | 2016 |
Improving vulnerability remediation through better exploit prediction J Jacobs, S Romanosky, I Adjerid, W Baker Journal of Cybersecurity 6 (1), tyaa015, 2020 | 99 | 2020 |
Privacy patterns for online interactions S Romanosky, A Acquisti, J Hong, LF Cranor, B Friedman Proceedings of the 2006 conference on Pattern languages of programs, 1-9, 2006 | 98 | 2006 |
A complete guide to the common vulnerability scoring system P Mell, K Scarfone, S Romanosky FIRST-Forum of Incident Response and Security Teams 1, 6-19, 2007 | 96 | 2007 |
Exploit prediction scoring system (epss) J Jacobs, S Romanosky, B Edwards, I Adjerid, M Roytman Digital Threats: Research and Practice 2 (3), 1-17, 2021 | 95 | 2021 |
Content analysis of cyber insurance policies: How do carriers write policies and price cyber risk? S Romanosky, L Ablon, A Kuehn, T Jones Available at SSRN 2929137, 2017 | 69 | 2017 |
Security design patterns S Romanosky Proceedings of the Conference on Pattern Languages of Programs, 1-19, 2001 | 67 | 2001 |
CVSS: A common vulnerability scoring system M Schiffman, G Eschelbeck, D Ahmad, A Wright, S Romanosky National Infrastructure Advisory Council (NIAC), 2004 | 64 | 2004 |
J2EE Design Patterns Applied CA Berry (No Title), 2002 | 60 | 2002 |
Enterprise security patterns S Romanosky Information Systems Security Association Journal (March 2003), 2002 | 47 | 2002 |
Data breaches and identity theft: When is mandatory disclosure optimal? S Romanosky, A Acquisti, R Sharp TPRC, 2010 | 41 | 2010 |