A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations
Insider threat has become a widely accepted issue and one of the major challenges in
cybersecurity. This phenomenon indicates that threats require special detection systems …
cybersecurity. This phenomenon indicates that threats require special detection systems …
Protecting organizational competitive advantage: A knowledge leakage perspective
The strategic management literature emphasizes the importance of protecting organizational
knowledge and information, especially in terms of maintaining competitive advantage. We …
knowledge and information, especially in terms of maintaining competitive advantage. We …
Data loss prevention solution for Linux endpoint devices
L Daubner, A Považanec - … of the 18th International Conference on …, 2023 - dl.acm.org
Endpoint data loss prevention (DLP) software monitors and protects data on the endpoint
against accidental and malicious leakage. While the risk of such leakage is widely present in …
against accidental and malicious leakage. While the risk of such leakage is widely present in …
[PDF][PDF] Guarding against the erosion of competitive advantage: a knowledge leakage mitigation model
A critical objective of knowledge-intensive organizations is to prevent erosion of their
competitive knowledge base through leakage. Our review of the literature highlights the …
competitive knowledge base through leakage. Our review of the literature highlights the …
Softmark: software watermarking via a binary function relocation
The ease of reproducibility of digital artifacts raises a growing concern in copyright
infringement; in particular, for a software product. Software watermarking is one of the …
infringement; in particular, for a software product. Software watermarking is one of the …
Hindering data theft with encrypted data trees
Data theft is a major threat for modern organizations with potentially large economic
consequences. Although these attacks may well originate outside an organization's …
consequences. Although these attacks may well originate outside an organization's …
An information security risk management model for smart industries
N Sohrabi Safa, C Maple… - Advances in Manufacturing …, 2017 - ebooks.iospress.nl
Abstract Internet of Things (IoT) has been acknowledged as a new revolution in technology.
IoT play an important role in the flourishing of smart manufacturing and in supply chains …
IoT play an important role in the flourishing of smart manufacturing and in supply chains …
Quantification of side-channel information leaks based on data complexity measures for web browsing
Website fingerprinting attack can identify the visited websites by analyzing the side-channel
information of the network traffic even though it is transferred through an encrypted tunnel …
information of the network traffic even though it is transferred through an encrypted tunnel …
[PDF][PDF] Automating interpretations of trustworthiness
M Sel - 2021 - core.ac.uk
Digital services have a significant impact on the lives of many individuals and organisations.
Trust influences decisions regarding potential service providers, and continues to do so …
Trust influences decisions regarding potential service providers, and continues to do so …
APT kaynaklı ataklara karşı dayanıklı etmen tabanlı ve ontolojik veri sızıntısı önleme sistemi= Agent based and ontological data leakage prevention system against …
E Kaya - 2024 - acikerisim.sakarya.edu.tr
Gelişmiş Israrcı Tehditler (Advanced Persistent Threat-APT) tarafından gerçekleştirilen veri
sızıntıları kurumlar ve devletler için her geçen gün artan bir sorun olmaktadır. Yapılan …
sızıntıları kurumlar ve devletler için her geçen gün artan bir sorun olmaktadır. Yapılan …