Case studies

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

This chapter presents three case studies in the data leakage domain and the methods proposed and evaluated for mitigating the threat of data leakage. The case studies are: detecting an insider attempting to misuse and leak data stored in a database system; using honeytokens to detect insider threats; and detecting leakage through email.

Original languageEnglish
Title of host publicationSpringerBriefs in Computer Science
PublisherSpringer
Pages69-82
Number of pages14
Edition9781461420521
DOIs
StatePublished - 1 Jan 2012

Publication series

NameSpringerBriefs in Computer Science
Number9781461420521
Volume0
ISSN (Print)2191-5768
ISSN (Electronic)2191-5776

Keywords

  • Anomaly Score
  • Context Attribute
  • Data Leakage
  • Email Exchange
  • Unsupervised Approach

ASJC Scopus subject areas

  • Computer Science (all)

Fingerprint

Dive into the research topics of 'Case studies'. Together they form a unique fingerprint.

Cite this