Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics 2011
DOI: 10.1109/isi.2011.5984047
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing group communication for preventing data leakage via email

Abstract: Modern business activities rely on extensive email exchange. Email "wrong recipients" mistakes have become widespread, and the severe damage caused by such mistakes constitutes a disturbing problem both for organizations and for individuals. Various solutions attempt to analyze email exchange for preventing emails to be sent to wrong recipients. However there is still no satisfying solution: many email addressing mistakes are not detected and in many cases correct recipients are wrongly marked as potential add… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 24 publications
(11 citation statements)
references
References 3 publications
(5 reference statements)
0
11
0
Order By: Relevance
“…On the preventive methods techniques namely, Policy and Access Rights, Virtualization and Isolation, Cryptographic Approaches and Quantifying are explained and in other side Data Identification, Social and Behavioural, Data mining / text clustering, and Quantifying and Limiting methods are explained in detective side and finally AI based methods have been explained with its advantages over other methods [37].…”
Section: Academic Researchmentioning
confidence: 99%
“…On the preventive methods techniques namely, Policy and Access Rights, Virtualization and Isolation, Cryptographic Approaches and Quantifying are explained and in other side Data Identification, Social and Behavioural, Data mining / text clustering, and Quantifying and Limiting methods are explained in detective side and finally AI based methods have been explained with its advantages over other methods [37].…”
Section: Academic Researchmentioning
confidence: 99%
“…However, practically speaking, the HAC is utilized by specifying the clusters in a manual way. For the HAC, common criteria will comprise of a sum of the within-group sums of squares along with the shortest possible distance among sets that triggers in a technique of single-link [11].The HAC is iterative that builds a tree, T, made over a dataset based on the linkage function. The linkage function l: 2X × 2X → R will score the actual merger of two different nodes that correspond to clusters with data points that are stored at the descendant leaves.…”
Section: B Hierarchical Agglomerative Clustering (Hac)mentioning
confidence: 99%
“…Extensions of [1] are described in [2], [10]. An improved approach is presented in [11], [12], which analyzes group communication for preventing information leakage via emails. For an email to be sent, a recipient is approved if the email's content belongs to at least one of the topics common to the sender and the recipient.…”
Section: Related Workmentioning
confidence: 99%