Online social networks: threats and solutions
Many online social network (OSN) users are unaware of the numerous security risks that
exist in these networks, including privacy violations, identity theft, and sexual harassment …
exist in these networks, including privacy violations, identity theft, and sexual harassment …
A survey on data leakage prevention systems
S Alneyadi, E Sithirasenan… - Journal of Network and …, 2016 - Elsevier
Protection of confidential data from being leaked to the public is a growing concern among
organisations and individuals. Traditionally, confidentiality of data has been preserved using …
organisations and individuals. Traditionally, confidentiality of data has been preserved using …
Loose tweets: an analysis of privacy leaks on twitter
Twitter has become one of the most popular microblogging sites for people to broadcast (or"
tweet") their thoughts to the world in 140 characters or less. Since these messages are …
tweet") their thoughts to the world in 140 characters or less. Since these messages are …
Privacy enhanced multimodal neural representations for emotion recognition
Many mobile applications and virtual conversational agents now aim to recognize and adapt
to emotions. To enable this, data are transmitted from users' devices and stored on central …
to emotions. To enable this, data are transmitted from users' devices and stored on central …
Data leakage detection and prevention: Review and research directions
Disclosure of confidential data to an unauthorized person, internal or external to the
organization is termed as data leakage. It may happen inadvertently or deliberately by a …
organization is termed as data leakage. It may happen inadvertently or deliberately by a …
A holistic view on data protection for sharing, communicating, and computing environments: Taxonomy and future directions
The data is an important asset of an organization and it is essential to keep this asset
secure. It requires security in whatever state is it ie data at rest, data in use, and data in …
secure. It requires security in whatever state is it ie data at rest, data in use, and data in …
Exsense: Extract sensitive information from unstructured data
Large-scale sensitive information leakage incidents are frequently reported in recent years.
Once sensitive information is leaked, it may lead to serious effects. In this context, sensitive …
Once sensitive information is leaked, it may lead to serious effects. In this context, sensitive …
CoBAn: A context based model for data leakage prevention
A new context-based model (CoBAn) for accidental and intentional data leakage prevention
(DLP) is proposed. Existing methods attempt to prevent data leakage by either looking for …
(DLP) is proposed. Existing methods attempt to prevent data leakage by either looking for …
A hybrid framework for data loss prevention and detection
Data loss, ie the unauthorized/unwanted disclosure of data, is a major threat for modern
organizations. Data Loss Protection (DLP) solutions in use nowadays, either employ …
organizations. Data Loss Protection (DLP) solutions in use nowadays, either employ …
Governing Open Vocabulary Data Leaks Using an Edge LLM through Programming by Example
A major concern with integrating large language model (LLM) services (eg, ChatGPT) into
workplaces is that employees may inadvertently leak sensitive information through their …
workplaces is that employees may inadvertently leak sensitive information through their …