Case studies

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

This chapter presents three case studies in the data leakage domain and the methods proposed and evaluated for mitigating the threat of data leakage. The case studies are: detecting an insider attempting to misuse and leak data stored in a database system; using honeytokens to detect insider threats; and detecting leakage through email.

Original languageEnglish
Title of host publicationSpringerBriefs in Computer Science
Place of PublicationBoston, MA.
PublisherSpringer
Pages69-82
Number of pages14
ISBN (Electronic)978-1-4614-2053-8
ISBN (Print)978-1-4614-2052-1
DOIs
StatePublished - 1 Jan 2012

Publication series

NameSpringerBriefs in Computer Science
ISSN (Print)2191-5768
ISSN (Electronic)2191-5776

Keywords

  • Anomaly Score
  • Context Attribute
  • Data Leakage
  • Email Exchange
  • Unsupervised Approach

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Case studies'. Together they form a unique fingerprint.

Cite this