Shivakumara et al., 2019 - Google Patents
Review Paper on Dynamic Mechanisms of Data Leakage Detection and PreventionShivakumara et al., 2019
View PDF- Document ID
- 7037483954420144777
- Author
- Shivakumara T
- Patil R
- Muneshwara M
- Publication year
- Publication venue
- Int. J. Comput. Sci. Eng
External Links
Snippet
Accepted: 14/Feb/2019, Published: 28/Feb/2019 Abstract-Today's world needs most of the things would be automated, the machine would be able to do itself everything by its own, from initiation of job to till the decision-making capabilities. Similarly the Security of the data …
- 238000001514 detection method 0 title abstract description 31
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Omotunde et al. | A comprehensive review of security measures in database systems: Assessing authentication, access control, and beyond | |
US11411980B2 (en) | Insider threat management | |
US11783069B2 (en) | Enterprise document classification | |
Cheng et al. | Enterprise data breach: causes, challenges, prevention, and future directions | |
Herrera Montano et al. | Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat | |
Gupta et al. | A holistic view on data protection for sharing, communicating, and computing environments: Taxonomy and future directions | |
Sargiotis | Data security and privacy: Protecting sensitive information | |
US12294589B2 (en) | Cloud-platform push for known data breaches | |
Aswathy et al. | Privacy breaches through cyber vulnerabilities: Critical issues, open challenges, and possible countermeasures for the future | |
Arora | THE SIGNIFICANCE AND ROLE OF AI IN IMPROVING CLOUD SECURITY POSTURE FOR MODERN ENTERPRISES | |
Senapati et al. | Impact of information leakage and conserving digital privacy | |
Dhiman et al. | Artificial Intelligence and Machine Learning-Enabled Cybersecurity Tools and Techniques | |
Tetskyi et al. | Intrusion detection and prevention systems as a component of ensuring compliance with regulatory documents | |
Mansikka | Data loss prevention: For securing enterprise data integrity | |
Shivakumara et al. | Review Paper on Dynamic Mechanisms of Data Leakage Detection and Prevention | |
Wendt | AI for Defense | |
Metoui | Privacy-aware risk-based access control systems | |
Tytarenko | Selection of the best security controls for rapid development of enterprise-level cyber security | |
Hlatshwayo | Cybersecurity in the digital space | |
Adavelli et al. | AI and Cybersecurity: Advancements in Threat Detection and Prevention | |
King | Bring your own device security awareness and security behavior: a quantitative explanatory study | |
Cornellisen | Covert Channel Data Leakage Protection | |
Kumar et al. | Security, Privacy, Trust, and Other Issues in Industries 4.0 | |
Ojoawo et al. | Data leak protection using text mining and social network analysis | |
Ghauri | Digital Security Versus Private Information |