A comparative study of the approach provided for preventing the data leakage

I Gupta - International Journal of Network Security & Its …, 2017 - papers.ssrn.com
Data is the most valuable assets of an organization that need to be secured. Due to limited
computational resources, Customers outsource their workload to cloud and economically …

Blockchain-Based Data Breach Detection: Approaches, Challenges, and Future Directions

K Ansar, M Ahmed, M Helfert, J Kim - Mathematics, 2023 - mdpi.com
In cybersecurity, personal data breaches have become one of the significant issues. This
fact indicates that data breaches require unique detection systems, techniques, and …

[HTML][HTML] International Journal of Computer Networks & Communications (IJCNC)

K Kaur, I Gupta, AK Singh - ijcnc.com
Many of previous research have proven that the usage of rhetorical relations is capable to
enhance many applications such as text summarization, question answering and natural …