Issues in Detecting Confidential Information Leaks in Unstructured Data
Abstract
Full Text:
PDF (Russian)References
Garbuzov G. Problems of Definitions and Setting Goals for Data Leaks Protection. International Journal of Open Information Technologies, 2024, vol. 12, no. 5, pp. 185-191. (In Russ., abstract in Eng.) EDN: ZXVIYQ
Ferrara E. Determine The Business Value Of An Effective Security Program – Information Security Economics 101. Forrester Research, Inc., October 2, 2012.
Garbuzov G. Technologies for Protecting Intangible Assets from Confidentiality Attacks. International Journal of Open Information Technologies, 2024, vol. 12, no. 9, pp. 142-149. (In Russ., abstract in Eng.) EDN: CXXTYY
Herrera Montano I., García Aranda J.J., Ramos Diaz J., et al. Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat. Cluster Computing, 2022, vol. 25, pp. 4289-4302. doi: https://doi.org/10.1007/s10586-022-03668-2
[On Commercial Secrecy (with The Amendments and Additions): Federal Law No. 98-FZ of July 29, 2004: Adopted by the State Duma on 9 July, 2004]. [Online]. Available: https://www.consultant.ru/document/cons_doc_LAW_48699 (In Russ.)
Civil Code of the Russian Federation (Part Four, (with The Amendments and Additions): Federal Law No. 230-FZ of December 18, 2006: Adopted by the State Duma on November 24, 2006]. [Online]. Available: https://www.consultant.ru/document/cons_doc_LAW_64629/ (In Russ.)
Zarubin A., Smirnov B., Kharitonov S., Denisov D., Main drivers and trends of DLP systems development in the Russian Federation. Prikladnaya informatika = Journal of Applied Informatics, 2020, vol. 15, no. 3, pp. 75-90. (In Russ., abstract in Eng.) doi: https://doi.org/10.37791/2687-0649-2020-15-3-75-90
Haenlein M., Kaplan A. A brief history of artificial intelligence: On the past, present, and future of artificial intelligence. California Management Review, 2019, vol. 61, no. 4, pp. 5-14. doi: https://doi.org/10.1177/0008125619864925 7
Wei J. Research progress and application of computer artificial intelligence technology. MATEC Web of Conferences, 2018, vol. 176. Article number: 01043. doi: https://doi.org/10.1051/matecconf/201817601043
Artyushkina E.S., Skakun O.O., Guz A.R. Using artificial intelligence in DLP systems. Applied economic research, 2023, no. 2, pp. 123-129. (In Russ., abstract in Eng.) doi: https://doi.org/10.47576/2949-1908_2023_2_123
Avdoshin S.M., Pesotskaya E.Yu. Trusted artificial intelligence: Strengthening digital protection. Business Informatics, 2022, vol. 16, no. 2, pp. 62-73. doi: https://doi.org/10.17323/2587-814X.2022.2.62.73
Donglan Liu, Xin Liu, Lei Ma, Yingxian Chang, Rui Wang, Hao Zhang, Hao Yu, Wenting Wang. Research on Leakage Prevention Technology of Sensitive Data based on Artificial Intelligence. In: 2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC). Beijing, China: IEEE Computer Society; 2020. pp. 142-145. doi: https://doi.org/10.1109/ICEIEC49280.2020.9152286
Martinelli F., Marulli F., Mercaldo F., Marrone S., Santone A. Enhanced Privacy and Data Protection using Natural Language Processing and Artificial Intelligence. In: 2020 International Joint Conference on Neural Networks (IJCNN). Glasgow, UK: IEEE Computer Society, 2020. pp. 1-8. doi: https://doi.org/10.1109/IJCNN48605.2020.9206801
Kim J., Lee C., Chang H. The Development of a Security Evaluation Model Focused on Information Leakage Protection for Sustainable Growth. Sustainability, 2020, vol. 12, issue 24. Article number: 10639. https://doi.org/10.3390/su122410639
Zhu T., Ye D., Wang W., Zhou W., Yu P.S. More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence. IEEE Transactions on Knowledge and Data Engineering, 2022, vol. 34, no. 6, pp. 2824-2843. doi: https://doi.org/10.1109/TKDE.2020.3014246
Guha A., Samanta D., Banerjee A., Agarwal D. Deep Learning Model for Information Loss Prevention From Multi-Page Digital Documents. IEEE Access, 2021, vol. 9, pp. 80451-80465. doi: https://doi.org/10.1109/ACCESS.2021.3084841
Refbacks
- There are currently no refbacks.
Abava Кибербезопасность ИБП для ЦОД СНЭ
ISSN: 2307-8162