A Bayesian belief network for data leakage investigation

F Xu, M Kwan, H Tse, KP Chow - … of the 2nd international workshop on …, 2014 - dl.acm.org
Today, it is common to share and to disseminate digital data in both the commercial and
personal domains. Incidents of data leakage in which personal or commercial sensitive data …

Beyond M-score for detection of misusability by malicious insiders

JP Kumar, AU Kumar, T Ravi - 2016 3rd International …, 2016 - ieeexplore.ieee.org
As data is very important for any enterprise, prevention of misuse of data in the context of
data mining assumes much importance of late. There are many threats to the privacy of data …

[PDF][PDF] Mining Multiple Text Sequence with Key Management

GVS Kumar, AA Princes, R Karthiga… - International Journal of …, 2014 - Citeseer
ABSTRACT A Text stream is a sequence of chronologically ordered documents, being
generated in various forms. Multiple text streams that are correlated to each other by sharing …

[引用][C] Kurum içi saldırılara karşı sunucu izleme ve takip sistemi geliştirilmesi

Hİ Ulus - Fen Bilimleri Enstitüsü