-
2
-
-
83655189688
-
Understanding data leak prevention
-
JUNE
-
Preeti Raman, Hilmi Güne Kayaclk, and Anil Somayaji, "Understanding Data Leak Prevention", ANNUAL SYMPOSIUM ON INFORMATION ASSURANCE (ASIA) Journal, JUNE 7-8, 2011.
-
(2011)
Annual Symposium on Information Assurance (ASIA) Journal
, pp. 7-8
-
-
Raman, P.1
Güne Kayaclk, H.2
Somayaji, A.3
-
3
-
-
84908702809
-
-
ISACA
-
ISACA, "Data Leak Prevention", vailable, http ://www.isaca.or g/Knowledge-CenteriResearch/ResearchDeliverables/Pages/DataLeak-Preventi on. aspx.
-
Data Leak Prevention
-
-
-
5
-
-
84908693642
-
-
Stony Brook University, August
-
Michael Hart, Pratyusa Manadhata, and Rob Johnson, " Text Classification for Data Loss Prevention", Stony Brook University, August 6, 2011.
-
Text Classification for Data Loss Prevention
, vol.6
, pp. 2011
-
-
Hart, M.1
Manadhata, P.2
Johnson, R.3
-
6
-
-
84908694381
-
-
October 19- 21 2006, Minneapolis, Minnesota, USA
-
Hilmi A Lahoud, PhD (ABD), Xin Tang, PhD, "lnformation Security Labs in IDS/IPS for Distance Education", SIGITE'06, October 19-21, 2006, Minneapolis, Minnesota, USA
-
Lnformation Security Labs in IDS/IPS for Distance Education SIGITE'06
-
-
Lahoud, H.A.1
Tang, X.2
-
7
-
-
84908694380
-
Towards Application Classification with vulnerability signature for IDS/IPS
-
Augest 17-19 2012, Kollam, Kerala, India
-
Dhiren & Maulik, Hardik Joshi, Bhadresh K, Patel, "Towards Application Classification with vulnerability signature for IDS/IPS", SecurIT' 12, Augest, 17-19, 2012, Kollam, Kerala, India.
-
SecurIT' 12
-
-
Maulik, D.1
Joshi, H.2
Patel, B.K.3
-
9
-
-
80052681285
-
Combining file content and file relations for cloud based malware Detection
-
August 21- 24 2011, San Diego, California, USA
-
Yanfang Ye, Tao Li, Shenghuo Zhu, Wei wei Zhuang, Egemen Tas, Umesh Gupta, Melih Abdulhayoglu "Combining File Content and File Relations for Cloud Based Malware Detection", KDD' 11, August 21-24, 2011, San Diego, California, USA
-
KDD' 11
-
-
Ye, Y.1
Li, T.2
Zhu, S.3
Zhuang, W.4
Tas, E.5
Gupta, U.6
Abdulhayoglu, M.7
-
10
-
-
84899417748
-
Active malware analysis using stochastic games
-
Conitzer, Winikoff
-
Simon A Williamson, Pradeep Varakantham" Debin Gao, Ong Chen Hui, "Active Malware Analysis using Stochastic Games", 11th International Conference on Autonomous Agents and Multiagent Systems-Innovative Applications Track (AAMAS 2012), Conitzer, Winikoff.
-
11th International Conference on Autonomous Agents and Multiagent Systems-Innovative Applications Track (AAMAS 2012)
-
-
Williamson, S.1
Varakantham, P.2
Gao, D.3
Hui, O.C.4
-
16
-
-
79551634986
-
Skip finite automaton: A content scanning engine tosecure Enterprise Networks
-
Junchen Jiang, Yi Tang, Bin Liu, Yang Xu, Xiaofei Wang, "Skip Finite Automaton: A Content Scanning Engine toSecure Enterprise Networks" Global Telecommunications Conference, 2010 IEEE .
-
Global Telecommunications Conference 2010 IEEE
-
-
Jiang, J.1
Tang, Y.2
Liu, B.3
Xu, Y.4
Wang, X.5
-
17
-
-
79960183516
-
Data leakage mitigation for discretionary access control in Collaboration Clouds
-
June 15- 17 2011, Innsbruck, Austria
-
Qihua Wang, Hongxia Jin, "Data Leakage Mitigation for Discretionary Access Control in Collaboration Clouds", SACMA T' II, June 15-17, 2011, Innsbruck, Austria.
-
SACMA t' II
-
-
Wang, Q.1
Jin, H.2
-
19
-
-
84908694374
-
-
Wikipedia
-
Wikipedia http://en.wikipedia.orglwikilData lossrevention software
-
-
-
-
20
-
-
84908692828
-
-
ADP
-
ADP, http://www.adp.comlabout-us.aspx
-
-
-
-
21
-
-
84908692827
-
-
ADP
-
ADP, http://www.adp.comi-/mediaiCorporate%200verview/ADPCorporate-Overview.ashx
-
-
-
-
23
-
-
0001345686
-
Context-sensitive learning methods for text categorization
-
Cohen, W.W., and Singer, Y. 1999. Context-sensitive learning methods for text categorization. ACM Transactions on Information Systems (TorS ), 17(2), 11-17.
-
(1999)
ACM Transactions on Information Systems (TorS )
, vol.17
, Issue.2
, pp. 11-17
-
-
Cohen, W.W.1
Singer, Y.2
-
24
-
-
84876696675
-
The trend of the security research for the insider cyber threat
-
Hong, , I., Kim, , I., and Cho, J. 2010. The trend of the security research for the insider cyber threat. International Journal of Future Generation Communication and Networking.
-
(2010)
International Journal of Future Generation Communication and Networking
-
-
Hong, I.1
Kim, I.2
Cho, J.3
-
26
-
-
77952383223
-
External insider threat: A real security challenge in enterprise value webs
-
Franqueira, V., Cleeff, A, Eck, P., and Wieringa, R. 2010. External insider threat: A real security challenge in enterprise value webs. Proceedings, 5th International Conference on Availability, Reliability and Security.
-
(2010)
Proceedings, 5th International Conference on Availability, Reliability and Security
-
-
Franqueira, V.1
Cleeff, A.2
Eck, P.3
Wieringa, R.4
-
28
-
-
84885692728
-
Yet another intrusion detection system against Insider Attacks
-
Mun, H., Han, K., Yeun, C.Y., and Kim, K. 2008. Yet another intrusion detection system against Insider Attacks. Proceedings, Symposium on Cryptography and Information Security .
-
(2008)
Proceedings, Symposium on Cryptography and Information Security
-
-
Mun, H.1
Han, K.2
Yeun, C.Y.3
Kim, K.4
-
29
-
-
84908692825
-
-
Erez Shmuelia, c, Tamir Tassab, c, Raz Wassersteina, Bracha Shapiraa, Lior Rokach, Limiting Disclosure of Sensitive Data in Sequential Releases of Databases, 2012
-
(2012)
Limiting Disclosure of Sensitive Data in Sequential Releases of Databases
-
-
Erez Shmuelia, C.1
Tamir Tassab, C.2
Wassersteina, R.3
Shapiraa, B.4
Rokach, L.5
-
31
-
-
84908692824
-
-
Wikipedia
-
Wikipedia, http://en. wikipedia.orglwiki/WikiLeaks
-
-
-
-
32
-
-
84908692823
-
-
Frost & Sullivan. Technical Report ND34D-74, Frost & Sullivan, United States
-
Frost & Sullivan. World Data Leakage Prevention Market . Technical Report ND34D-74, Frost & Sullivan, United States. 2008.
-
(2008)
World Data Leakage Prevention Market
-
-
-
33
-
-
84908692822
-
-
SearchSecurity
-
SearchSecurity, http://searchsecurity.techtarget.comldefinitionl security-information-and-event-management-SIEM.
-
-
-
-
35
-
-
84908692820
-
-
wikipedia
-
wikipedia, http://en. wikipedia.org/wikilDeep content-inspection.
-
-
-
-
36
-
-
84908692819
-
-
wedgenetworks
-
wedgenetworks, http://www.wedgenetworks.com/resources/technology/deep-content-inspection-with-wedgeos.html.
-
-
-
|