This chapter presents three case studies in the data leakage domain and the methods proposed and evaluated for mitigating the threat of data leakage. The case studies are: detecting an insider attempting to misuse and leak data stored in a database system; using honeytokens to detect insider threats; and detecting leakage through email.
CITATION STYLE
Shabtai, A., Elovici, Y., & Rokach, L. (2012). Case studies. In SpringerBriefs in Computer Science (Vol. 0, pp. 69–82). Springer. https://doi.org/10.1007/978-1-4614-2053-8_7
Mendeley helps you to discover research relevant for your work.