@inbook{e347404f1778471ba8e60be356c30f17,
title = "Case studies",
abstract = "This chapter presents three case studies in the data leakage domain and the methods proposed and evaluated for mitigating the threat of data leakage. The case studies are: detecting an insider attempting to misuse and leak data stored in a database system; using honeytokens to detect insider threats; and detecting leakage through email.",
keywords = "Anomaly Score, Context Attribute, Data Leakage, Email Exchange, Unsupervised Approach",
author = "Asaf Shabtai and Yuval Elovici and Lior Rokach",
note = "Publisher Copyright: {\textcopyright} 2012, The Author(s).",
year = "2012",
month = jan,
day = "1",
doi = "10.1007/978-1-4614-2053-8_7",
language = "English",
isbn = "978-1-4614-2052-1",
series = "SpringerBriefs in Computer Science",
publisher = "Springer",
pages = "69--82",
booktitle = "SpringerBriefs in Computer Science",
address = "Germany",
}