Monitoring Leaked Confidential Data
暂无分享,去创建一个
[1] Slim Trabelsi,et al. Who Is Reusing Stolen Passwords? An Empirical Study on Stolen Passwords and Countermeasures , 2018, CSS.
[2] Christoph Meinel,et al. Gathering and Analyzing Identity Leaks for Security Awareness , 2014, PASSWORDS.
[3] Michael Meier,et al. Gathering and analyzing identity leaks for a proactive warning of affected users , 2018, CF.
[4] Barbara Hauer,et al. Data and Information Leakage Prevention Within the Scope of Information Security , 2015, IEEE Access.
[5] D. Richard Kuhn,et al. Data Loss Prevention , 2010, IT Professional.
[6] Hector Garcia-Molina,et al. Data Leakage Detection , 2011, IEEE Transactions on Knowledge and Data Engineering.
[7] Fang Liu,et al. Enterprise data breach: causes, challenges, prevention, and future directions , 2017, WIREs Data Mining Knowl. Discov..
[8] Julian Schütte,et al. AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.