Rule-based system for data leak threat estimation
暂无分享,去创建一个
[1] Jerry den Hartog,et al. A Hybrid Framework for Data Loss Prevention and Detection , 2016, 2016 IEEE Security and Privacy Workshops (SPW).
[2] Marco Vieira,et al. Integrated Intrusion Detection in Databases , 2007, LADC.
[3] Jerry den Hartog,et al. A white-box anomaly-based framework for database leakage detection , 2017, J. Inf. Secur. Appl..
[4] Elisa Bertino,et al. Detecting anomalous access patterns in relational databases , 2008, The VLDB Journal.
[5] D. Richard Kuhn,et al. Data Loss Prevention , 2010, IT Professional.
[6] Vallipuram Muthukkumarasamy,et al. Detecting Data Semantic: A Data Leakage Prevention Approach , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[7] Sotiris Ioannidis,et al. IRILD: An Information Retrieval Based Method for Information Leak Detection , 2011, 2011 Seventh European Conference on Computer Network Defense.
[8] Marin Vukovic,et al. Location Name Extraction for User Created Digital Content Services , 2007, KES.
[9] Lior Rokach,et al. A Survey of Data Leakage Detection and Prevention Solutions , 2012, SpringerBriefs in Computer Science.
[10] Rob Johnson,et al. Text Classification for Data Loss Prevention , 2011, PETS.
[11] Asaf Shabtai,et al. Content-based data leakage detection using extended fingerprinting , 2013, ArXiv.