Now showing items 1-2 of 2
Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing
The leak of sensitive data on computer systems poses a serious threat to organizational security. Organizations need to identify the exposure of sensitive data by screening the content in storage and transmission, i.e., ...
Fast Detection of Transformed Data Leaks
(Ieee-Inst Electrical Electronics Engineers Inc, 2016-03-01)