Related references
Note: Only part of the references are listed.Security Threats: Protecting the New Cyberfrontier
Elisa Bertino
COMPUTER (2016)
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
Anna L. Buczak et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)
Fast Detection of Transformed Data Leaks
Xiaokui Shu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
A survey on data leakage prevention systems
Sultan Alneyadi et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)
Can Content-Based Data Loss Prevention Solutions Prevent Data Leakage in Web Traffic?
David Gugelmann et al.
IEEE SECURITY & PRIVACY (2015)
Privacy-Preserving Detection of Sensitive Data Exposure
Xiaokui Shu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Deep learning in neural networks: An overview
Juergen Schmidhuber
NEURAL NETWORKS (2015)
Data and Information Leakage Prevention Within the Scope of Information Security
Barbara Hauer
IEEE ACCESS (2015)
TM-Score: A Misuseability Weight Measure for Textual Content
Arik Vartanian et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)
M-Score: A Misuseability Weight Measure
Amir Harel et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2012)
Data Leakage Detection
Panagiotis Papadimitriou et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2011)
Mapreduce: Simplified data processing on large clusters
Jeffrey Dean et al.
COMMUNICATIONS OF THE ACM (2008)
Detecting anomalous access patterns in relational databases
Ashish Kamra et al.
VLDB JOURNAL (2008)