H Li, Z Peng, X Feng, H Ma - … and Techniques in Information Security: 6th …, 2015 - Springer
There is often a lot of sensitive information in the unstructured data of enterprise information
network, if not controlled, the sensitive data will flow from the Intranet to the Extranet, which …