A comparative study of the approach provided for preventing the data leakage
I Gupta - International Journal of Network Security & Its …, 2017 - papers.ssrn.com
Data is the most valuable assets of an organization that need to be secured. Due to limited
computational resources, Customers outsource their workload to cloud and economically …
computational resources, Customers outsource their workload to cloud and economically …
Blockchain-Based Data Breach Detection: Approaches, Challenges, and Future Directions
In cybersecurity, personal data breaches have become one of the significant issues. This
fact indicates that data breaches require unique detection systems, techniques, and …
fact indicates that data breaches require unique detection systems, techniques, and …
[HTML][HTML] International Journal of Computer Networks & Communications (IJCNC)
Many of previous research have proven that the usage of rhetorical relations is capable to
enhance many applications such as text summarization, question answering and natural …
enhance many applications such as text summarization, question answering and natural …