Now showing items 1-3 of 3
Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing
The leak of sensitive data on computer systems poses a serious threat to organizational security. Organizations need to identify the exposure of sensitive data by screening the content in storage and transmission, i.e., ...
Fast Detection of Transformed Data Leaks
(Ieee-Inst Electrical Electronics Engineers Inc, 2016-03-01)
Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce
The exposure of sensitive data in storage and transmission poses a serious threat to organizational and personal security. Data leak detection aims at scanning content (in storage or transmission) for exposed sensitive ...