2013
DOI: 10.21236/ada610372
|View full text |Cite
|
Sign up to set email alerts
|

Insider Threat Control: Using Plagiarism Detection Algorithms to Prevent Data Exfiltration in Near Real Time

Abstract: This material has been approved for public release and unlimited distribution except as restricted below.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…e data combining work has the following problems. First, for the sensitive data of enterprises, due to the lack of strict management of the computer network by the managers and their lack of awareness of network security, it is easy for the computer to leak information, which causes a series of subsequent security risks to damage the computer network [12]. Second, most of the understanding of policies, regulations, and standards also relies on manual combining.…”
Section: Introductionmentioning
confidence: 99%
“…e data combining work has the following problems. First, for the sensitive data of enterprises, due to the lack of strict management of the computer network by the managers and their lack of awareness of network security, it is easy for the computer to leak information, which causes a series of subsequent security risks to damage the computer network [12]. Second, most of the understanding of policies, regulations, and standards also relies on manual combining.…”
Section: Introductionmentioning
confidence: 99%
“…• WebDLPIndexer, a Java specialists, helps with the execution of the group's information misfortune avoidance (DLP) control • WebDLP Customer advances active web solicitations to the WebDLPIndexer [9] specialists for correlation against a record of licensed innovation.…”
Section: Technical Controlsmentioning
confidence: 99%