Case studies

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This chapter presents three case studies in the data leakage domain and the methods proposed and evaluated for mitigating the threat of data leakage. The case studies are: detecting an insider attempting to misuse and leak data stored in a database system; using honeytokens to detect insider threats; and detecting leakage through email.

Cite

CITATION STYLE

APA

Shabtai, A., Elovici, Y., & Rokach, L. (2012). Case studies. In SpringerBriefs in Computer Science (Vol. 0, pp. 69–82). Springer. https://doi.org/10.1007/978-1-4614-2053-8_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free