2014
DOI: 10.1007/978-3-319-08344-5_27
|View full text |Cite
|
Sign up to set email alerts
|

A Semantics-Aware Classification Approach for Data Leakage Prevention

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…erefore, data is used as the security protection target, and the intricate enterprise data assets are divided into various categories and multiple levels according to the classification and gradation method. According to the type and value of data, different protection strategies are formulated [9,10], and the continuous strengthening and improvement of sensitive data security management have become more prominent and important.…”
Section: Introductionmentioning
confidence: 99%
“…erefore, data is used as the security protection target, and the intricate enterprise data assets are divided into various categories and multiple levels according to the classification and gradation method. According to the type and value of data, different protection strategies are formulated [9,10], and the continuous strengthening and improvement of sensitive data security management have become more prominent and important.…”
Section: Introductionmentioning
confidence: 99%
“…We are not the first to explore applying machine learning toward sensitive text classification. However, previous authors, e.g., [6], [7], [8], have discussed the problem and proposed solutions for approaching it. Unfortunately, real sensitive text datasets are generally kept private, so these works were not able to perform realistic evaluations, instead using fictitious "sensitive" texts (e.g., collected from public Twitter feeds).…”
Section: Related Workmentioning
confidence: 99%
“…They then assigned a confidentiality score to each document by calculating the confidential term probability. Alneyadi et al [7] used L 1 -norms [8] between ngram category profiles, assigning the document to the category of shortest distance. Hart et al [9] proposed a new training method to overcome the problem of imbalanced data by implementing class-specific classifiers.…”
Section: Related Workmentioning
confidence: 99%