Sign in

Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat.

Isabel Herrera MontanoJosé J. García-ArandaJuan Ramos-DíazSergio Molina-CardínIsabel de la Torre DíezJoel J. P. C. Rodrigues
Published in: Clust. Comput. (2022)
Keyphrases
  • statistical methods
  • data sets
  • data analysis
  • insider threat
  • data processing
  • data collection
  • database
  • data mining techniques
  • data quality
  • data leakage prevention