2016
DOI: 10.1080/00207160.2015.1044784
|View full text |Cite
|
Sign up to set email alerts
|

Innovative security technologies against insider threats and data leakage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…As the enterprise relies increasingly on information systems and information data, information system stability and information data security are directly related to the core competitiveness of enterprises, which puts high demands on enterprise information security and confidentiality [1]. According to the survey, among the ways of leaking sensitive information inside the enterprise, the fact that employees unconsciously outflow sensitive information through the enterprise's home page, mailboxes, instant messaging software, cloud disks, and smartphones connected to a wireless network [2][3][4] has become an important channel for leaking sensitive information [5,6]. Therefore, enterprise border networks are particularly important for the timely detection and interception of sensitive data [7,8].…”
Section: Introductionmentioning
confidence: 99%
“…As the enterprise relies increasingly on information systems and information data, information system stability and information data security are directly related to the core competitiveness of enterprises, which puts high demands on enterprise information security and confidentiality [1]. According to the survey, among the ways of leaking sensitive information inside the enterprise, the fact that employees unconsciously outflow sensitive information through the enterprise's home page, mailboxes, instant messaging software, cloud disks, and smartphones connected to a wireless network [2][3][4] has become an important channel for leaking sensitive information [5,6]. Therefore, enterprise border networks are particularly important for the timely detection and interception of sensitive data [7,8].…”
Section: Introductionmentioning
confidence: 99%