Follow
Sasha Romanosky
Title
Cited by
Cited by
Year
A complete guide to the common vulnerability scoring system version 2.0
P Mell, K Scarfone, S Romanosky
Published by FIRST-forum of incident response and security teams 1, 23, 2007
7702007
Common vulnerability scoring system
P Mell, K Scarfone, S Romanosky
IEEE Security & Privacy 4 (6), 85-89, 2006
6292006
Do data breach disclosure laws reduce identity theft?
S Romanosky, R Telang, A Acquisti
Journal of Policy Analysis and Management 30 (2), 256-286, 2011
4042011
Examining the costs and causes of cyber incidents
S Romanosky
Journal of Cybersecurity 2 (2), 121-135, 2016
3432016
Human selection of mnemonic phrase-based passwords
C Kuo, S Romanosky, LF Cranor
Proceedings of the second symposium on Usable privacy and security, 67-78, 2006
3172006
Empirical analysis of data breach litigation
S Romanosky, D Hoffman, A Acquisti
Journal of Empirical Legal Studies 11 (1), 74-104, 2014
2582014
Content analysis of cyber insurance policies: how do carriers price cyber risk?
S Romanosky, L Ablon, A Kuehn, T Jones
Journal of Cybersecurity 5 (1), tyz002, 2019
1862019
Privacy costs and personal data protection: Economic and legal perspectives
S Romanosky, A Acquisti
Berkeley Tech. LJ 24, 1061, 2009
1422009
Improving the common vulnerability scoring system
P Mell, K Scarfone
IET Information Security 1 (3), 119-127, 2007
1282007
Privacy patterns for online interactions
S Romanosky, A Acquisti, J Hong, LF Cranor, B Friedman
Proceedings of the 2006 conference on Pattern languages of programs, 1-9, 2006
992006
Consumer attitudes toward data breach notifications and loss of personal information
L Ablon, P Heaton, DC Lavery, S Romanosky
Rand Corporation, 2016
952016
A complete guide to the common vulnerability scoring system
P Mell, K Scarfone, S Romanosky
FIRST-Forum of Incident Response and Security Teams 1, 6-19, 2007
932007
Improving vulnerability remediation through better exploit prediction
J Jacobs, S Romanosky, I Adjerid, W Baker
Journal of Cybersecurity 6 (1), tyaa015, 2020
842020
Exploit prediction scoring system (epss)
J Jacobs, S Romanosky, B Edwards, I Adjerid, M Roytman
Digital Threats: Research and Practice 2 (3), 1-17, 2021
832021
Content analysis of cyber insurance policies: How do carriers write policies and price cyber risk?
S Romanosky, L Ablon, A Kuehn, T Jones
Available at SSRN 2929137, 2017
692017
CVSS: A common vulnerability scoring system
M Schiffman, G Eschelbeck, D Ahmad, A Wright, S Romanosky
National Infrastructure Advisory Council (NIAC), 2004
642004
Security design patterns
S Romanosky
Proceedings of the Conference on Pattern Languages of Programs, 1-19, 2001
642001
J2EE Design Patterns Applied
CA Berry
(No Title), 2002
592002
Enterprise security patterns
S Romanosky
Information Systems Security Association Journal (March 2003), 2002
472002
Data breaches and identity theft: When is mandatory disclosure optimal?
S Romanosky, A Acquisti, R Sharp
TPRC, 2010
392010
The system can't perform the operation now. Try again later.
Articles 1–20