Guest editorial: A brief overview of data leakage and insider threats.
Carly L. HuthDavid W. ChadwickWilliam R. ClaycombIlsun YouPublished in: Inf. Syst. Frontiers (2013)
Keyphrases
- database
- data sets
- data analysis
- training data
- data collection
- prior knowledge
- data mining techniques
- raw data
- synthetic data
- statistical analysis
- input data
- data structure
- high quality
- small number
- probability distribution
- special issue
- data points
- data distribution
- high dimensional data
- complex data
- big data
- original data
- database systems
- missing data
- computer systems
- xml documents
- data processing
- end users
- knowledge discovery