Login / Signup
Use of Security Logs for Data Leak Detection: A Systematic Literature Review.
Ricardo Ávila
Raphaël Khoury
Richard Khoury
Fábio Petrillo
Published in:
Secur. Commun. Networks (2021)
Keyphrases
</>
literature review
data sets
training data
data sources
data collection
data analysis
original data
database
expert systems
data mining techniques
log data
clustering analysis
access control
data quality
leak detection