Detecting Data Semantic: A Data Leakage Prevention Approach
暂无分享,去创建一个
Vallipuram Muthukkumarasamy | Sultan Alneyadi | Elankayer Sithirasenan | V. Muthukkumarasamy | E. Sithirasenan | Sultan Alneyadi
[1] Aristide Fattori,et al. Peering into the Muddy Waters of Pastebin , 2012, ERCIM News.
[2] Rob Johnson,et al. Text Classification for Data Loss Prevention , 2011, PETS.
[3] Hyunsoo Kim,et al. Dimension Reduction in Text Classification with Support Vector Machines , 2005, J. Mach. Learn. Res..
[4] Geoffrey E. Hinton,et al. Semantic hashing , 2009, Int. J. Approx. Reason..
[5] Vassil Roussev,et al. Data Fingerprinting with Similarity Digests , 2010, IFIP Int. Conf. Digital Forensics.
[6] Lior Rokach,et al. A Survey of Data Leakage Detection and Prevention Solutions , 2012, SpringerBriefs in Computer Science.
[7] Gerard Salton,et al. A vector space model for automatic indexing , 1975, CACM.
[8] Nicole Immorlica,et al. Locality-sensitive hashing scheme based on p-stable distributions , 2004, SCG '04.
[9] Gene H. Golub,et al. Singular value decomposition and least squares solutions , 1970, Milestones in Matrix Computation.
[10] Jonathan Oliver,et al. TLSH -- A Locality Sensitive Hash , 2013, 2013 Fourth Cybercrime and Trustworthy Computing Workshop.
[11] Asaf Shabtai,et al. Content-based data leakage detection using extended fingerprinting , 2013, ArXiv.
[12] Peter K. Pearson,et al. Fast hashing of variable-length text strings , 1990, CACM.
[13] W. B. Cavnar,et al. N-gram-based text categorization , 1994 .
[14] Gerard Salton,et al. Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..
[15] Michael S. Bernstein,et al. 4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community , 2011, ICWSM.