• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Data exfiltration: A review of external attack vectors and countermeasures.

Faheem UllahMatthew EdwardsRajiv RamdhanyRuzanna ChitchyanMuhammad Ali BabarAwais Rashid
Published in: J. Netw. Comput. Appl. (2018)
Keyphrases
  • countermeasures
  • data sets
  • database
  • data analysis
  • information technology
  • input data
  • computer systems
  • databases
  • data points
  • knowledge discovery
  • lightweight
  • power analysis