최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기IEEE access : practical research, open solutions, v.3, 2015년, pp.2554 - 2565
Hauer, Barbara
Incidents involving data breaches are ever-present in the media since several years. In order to overcome this threat, organizations apply enterprise content-aware data leakage prevention (DLP) solutions to monitor and control data access and usage. However, this paper argues that current solutions ...
Trans Amer Math Soc Can content-based data loss prevention solutions prevent data leakage in Web traffic? gugelmann 1953 13 52
Symantec Data Loss Prevention 2015
Digital Guardian Platform 2015
TRITON APX 2015
Privacy Enhancing Technologies Text classification for data loss prevention hart 2011 10.1007/978-3-642-22263-4_2 6794 18
DataLossDB 2015
Rowley, Jennifer. The wisdom hierarchy: representations of the DIKW hierarchy. Journal of information science, vol.33, no.2, 163-180.
2012
Gödel, Kurt. Über formal unentscheidbare Sätze der Principia Mathematica und verwandter Systeme I. Monatshefte für Mathematik und Physik, vol.38, no.1, 173-198.
IT-Grundschutz-Kataloge 2013
2010
Maron, M. E.. Automatic Indexing: An Experimental Inquiry. Journal of the Association for Computing Machinery, vol.8, no.3, 404-417.
Österreichisches Informationssicherheitshandbuch 2012
CWE-200 Information Exposure 2015
The forrester wave: Data leak prevention, Q2 2008 raschke 2008
Magic quadrant for content-aware data loss prevention ouellet 2013
Proc Int Conf Enterprise Inf Syst (ICEIS) Data leakage prevention—A position to state-of-the-art capabilities and remaining risk hauer 2014 2 361
Mcafee Total Protection for Data Loss Prevention 2015
Data Loss Prevention (DLP) Software 2015
Proceedings of the London Mathematical Society On computable numbers, with an application to the Entscheidungsproblem turing 1936 42 230
Rice, H. G.. Classes of recursively enumerable sets and their decision problems. Transactions of the American Mathematical Society, vol.74, no.2, 358-366.
Guardian Edward Snowden: The whistleblower behind the NSA surveillance revelations greenwald 2013
Proc 2nd Int Conf Edu Technol Comput (ICETC) Information security knowledge and behavior: An adapted model of technology acceptance wang 2010 2 v2-364
Grant, R.A., Higgins, C.A.. Computerized performance monitors: factors affecting acceptance. IEEE transactions on engineering management, vol.38, no.4, 306-315.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.