4.6 Article

Enterprise data breach: causes, challenges, prevention, and future directions

Related references

Note: Only part of the references are listed.
Editorial Material Computer Science, Hardware & Architecture

Security Threats: Protecting the New Cyberfrontier

Elisa Bertino

COMPUTER (2016)

Article Computer Science, Information Systems

A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection

Anna L. Buczak et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Computer Science, Theory & Methods

Fast Detection of Transformed Data Leaks

Xiaokui Shu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Hardware & Architecture

A survey on data leakage prevention systems

Sultan Alneyadi et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Computer Science, Information Systems

Can Content-Based Data Loss Prevention Solutions Prevent Data Leakage in Web Traffic?

David Gugelmann et al.

IEEE SECURITY & PRIVACY (2015)

Article Computer Science, Theory & Methods

Privacy-Preserving Detection of Sensitive Data Exposure

Xiaokui Shu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Review Computer Science, Artificial Intelligence

Deep learning in neural networks: An overview

Juergen Schmidhuber

NEURAL NETWORKS (2015)

Article Computer Science, Information Systems

Data and Information Leakage Prevention Within the Scope of Information Security

Barbara Hauer

IEEE ACCESS (2015)

Article Computer Science, Theory & Methods

TM-Score: A Misuseability Weight Measure for Textual Content

Arik Vartanian et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)

Article Computer Science, Hardware & Architecture

M-Score: A Misuseability Weight Measure

Amir Harel et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2012)

Article Computer Science, Artificial Intelligence

Data Leakage Detection

Panagiotis Papadimitriou et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2011)

Article Computer Science, Hardware & Architecture

Mapreduce: Simplified data processing on large clusters

Jeffrey Dean et al.

COMMUNICATIONS OF THE ACM (2008)

Article Computer Science, Hardware & Architecture

Detecting anomalous access patterns in relational databases

Ashish Kamra et al.

VLDB JOURNAL (2008)