Login / Signup

Data exfiltration: A review of external attack vectors and countermeasures.

Faheem UllahMatthew EdwardsRajiv RamdhanyRuzanna ChitchyanMuhammad Ali BabarAwais Rashid
Published in: J. Netw. Comput. Appl. (2018)
Keyphrases
  • countermeasures
  • data sets
  • database
  • data analysis
  • information technology
  • input data
  • computer systems
  • databases
  • data points
  • knowledge discovery
  • lightweight
  • power analysis