Research on Leakage Prevention Technology of Sensitive Data based on Artificial Intelligence

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

IMAGES

  1. (PDF) Data Leak Prevention through Named Entity Recognition

    research papers on data leak prevention

  2. (PDF) Data and Information Leakage Prevention Within the Scope of

    research papers on data leak prevention

  3. (PDF) Data Leak Prevention System: A Survey

    research papers on data leak prevention

  4. (PDF) Review Paper on Dynamic Mechanisms of Data Leakage Detection and

    research papers on data leak prevention

  5. (PDF) AppCaulk: Data Leak Prevention by Injecting Targeted Taint

    research papers on data leak prevention

  6. (PDF) Web-Based Data Leakage Prevention

    research papers on data leak prevention

VIDEO

  1. The Devil's in the Data: Role of Data Governance in Cyber Risk Mitigation

  2. Urgent: Protect Yourself After 272 Million Americans' Data Leak

  3. NEET SCAM

  4. Nightfall AI: The First AI-Native Enterprise DLP Platform

  5. Regulation and Risk When Your Customer’s Browser Leaks Data

  6. The Biggest Cybersecurity Threats Right Now!

COMMENTS

  1. Data Leakage Detection and Prevention: Review and Research ...

    This paper defines data leakage detection and prevention system and characterizes it based on different states of data, deployment points and leakage detection approaches.

  2. Survey of Techniques on Data Leakage Protection and Methods ...

    Significant advances were detected in protection systems against data leakage with the incorporation of new techniques and technologies, such as machine learning, blockchain, and digital rights management policies. In 40% of the relevant studies, significant interest was shown in avoiding internal threats.

  3. Enterprise data breach: causes, challenges, prevention, and ...

    This review helps interested readers to learn about enterprise data leak threats, recent data leak incidents, various stateoftheart prevention and detection techniques, new...

  4. (PDF) Survey of Techniques on Data Leakage Protection and ...

    The main objective of this work is to survey the literature to detect the existing techniques to protect against data leakage and to identify the methods used to address the insider threat.

  5. Data Leakage Detection and Prevention: Review and Research ...

    This paper defines data leakage detection and prevention system and characterizes it based on different states of data, deployment points and leakage detection approaches.

  6. A survey on data leakage prevention systems - ScienceDirect

    The authors define a DLPS as ‘a system that is designed to detect and prevent the unauthorised access, use, or transmission of confidential information’ (p. 10). Their survey describes taxonomy of data leakage prevention solutions along with commercial and academic examples.

  7. Data Leakage Detection and Prevention: Review and Research ...

    This paper proposes a new automatic approach that applies Named Entity Recognition (NER) to prevent data leaks and conducts an empirical study with real-world data to show that this NER-based approach can enhance the prevention of data losses.

  8. Survey of Techniques on Data Leakage Protection and Methods ...

    In 40% of the relevant studies, significant interest was shown in avoiding internal threats. The most used techniques in the analyzed DLP tools were encryption and machine learning. Keywords Data leak Protection · Data leak Prevention · DLP · Internal threat · Classified Information Security · DRM.

  9. Research on Leakage Prevention Technology of Sensitive Data ...

    In order to deal with the sensitive data leakage under the new network threat, this paper proposes the sensitive data leakage prevention method based on artificial intelligence technology by studying the current data leakage prevention technology.

  10. DATALEAK: Data Leakage Detection System - ResearchGate

    We should determine risks regarding storing data online. Then explain how data leaks and review existing solutions for solving data leakage problems.