2013 Ieee Conference on Information and Communication Technologies 2013
DOI: 10.1109/cict.2013.6558085
|View full text |Cite
|
Sign up to set email alerts
|

Comparative evaluation of algorithms for effective data leakage detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…In our review, we observed that quite a large number of countermeasures are either not evaluated at all ( [23], [40], [45] , [48] , [49] , [62] , [75] , [88] , [91] , [67] , [92] , [105] , [110], [111], [114], [137], [141], [154], , [160], [174], , [175]) or evaluated weakly ( [60], [70], [100], [109], [132], [138], [147], [158], [161], [165], [171]). We consider an evaluation as weak evaluation when the system is evaluated with a small dataset (e.g.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In our review, we observed that quite a large number of countermeasures are either not evaluated at all ( [23], [40], [45] , [48] , [49] , [62] , [75] , [88] , [91] , [67] , [92] , [105] , [110], [111], [114], [137], [141], [154], , [160], [174], , [175]) or evaluated weakly ( [60], [70], [100], [109], [132], [138], [147], [158], [161], [165], [171]). We consider an evaluation as weak evaluation when the system is evaluated with a small dataset (e.g.…”
Section: Discussionmentioning
confidence: 99%
“…Kumar et al [171] compare a number of data leakage detection and data allocation strategies for this same 'traitors tracing' problem, though note that the leakage may be accidental. In modelling the problem, they address allocation where only a sample of a total dataset is required.…”
Section: Probabilistic Forensicsmentioning
confidence: 99%
See 1 more Smart Citation
“…To identify the guilty agent, [43], [44], [45] preferred to choose probabilistic approach which implements a variety of data distribution strategies. This improves distributor's chances of identifying leaker.…”
Section: Related Workmentioning
confidence: 99%
“…Sensitive data of institutions include intellectual, financial, personal, and other sorts of information, depending on the organization or business' aim [1]. A study carried out by InsightExpress in the US, requested by Cisco [2], reveals that employees' behavior represents the major source of data loss threat mainly related to intellectual property or client's sensitive data.…”
Section: Introductionmentioning
confidence: 99%