{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T04:29:06Z","timestamp":1727065746179},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T00:00:00Z","timestamp":1657756800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T00:00:00Z","timestamp":1657756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001872","name":"Centre for the Development of Industrial Technology","doi-asserted-by":"crossref","award":["18.IP.MJ","18.IP.MJ","18.IP.MJ","18.IP.MJ","18.IP.MJ"],"id":[{"id":"10.13039\/501100001872","id-type":"DOI","asserted-by":"crossref"}]},{"name":"FCT\/MCTES through national funds and when applicable co-funded EU","award":["UIDB\/50008\/2020"]},{"DOI":"10.13039\/501100007515","name":"Universidad de Valladolid","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100007515","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2022,12]]},"abstract":"Abstract<\/jats:title>Data leakage is a problem that companies and organizations face every day around the world. Mainly the data leak caused by the internal threat posed by authorized personnel to manipulate confidential information. The main objective of this work is to survey the literature to detect the existing techniques to protect against data leakage and to identify the methods used to address the insider threat. For this, a literature review of scientific databases was carried out in the period from 2011 to 2022, which resulted in 42 relevant papers. It was obtained that from 2017 to date, 60% of the studies found are concentrated and that 90% come from conferences and publications in journals. Significant advances were detected in protection systems against data leakage with the incorporation of new techniques and technologies, such as machine learning, blockchain, and digital rights management policies. In 40% of the relevant studies, significant interest was shown in avoiding internal threats. The most used techniques in the analyzed DLP tools were encryption and machine learning.<\/jats:p>","DOI":"10.1007\/s10586-022-03668-2","type":"journal-article","created":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T13:03:44Z","timestamp":1657803824000},"page":"4289-4302","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-0841-653X","authenticated-orcid":false,"given":"Isabel","family":"Herrera Montano","sequence":"first","affiliation":[]},{"given":"Jos\u00e9 Javier","family":"Garc\u00eda Aranda","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Ramos Diaz","sequence":"additional","affiliation":[]},{"given":"Sergio","family":"Molina Card\u00edn","sequence":"additional","affiliation":[]},{"given":"Isabel","family":"de la Torre D\u00edez","sequence":"additional","affiliation":[]},{"given":"Joel J. P. C.","family":"Rodrigues","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,14]]},"reference":[{"key":"3668_CR1","doi-asserted-by":"crossref","unstructured":"Kiperberg, M., Amit, G., Yeshooroon, A., Zaidenberg, N.J.: Efficient DLP-visor: An efficient hypervisor-based DLP. In: 2021 IEEE\/ACM 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid). pp.\u00a0344\u2013355. IEEE (2021)","DOI":"10.1109\/CCGrid51090.2021.00044"},{"key":"3668_CR2","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.jnca.2016.01.008","volume":"62","author":"S Alneyadi","year":"2016","unstructured":"Alneyadi, S., Sithirasenan, E., Muthukkumarasamy, V.: A survey on data leakage prevention systems. J. Netw. Comput. Appl. 62, 137\u2013152 (2016). https:\/\/doi.org\/10.1016\/j.jnca.2016.01.008","journal-title":"J. Netw. Comput. Appl."},{"key":"3668_CR3","doi-asserted-by":"crossref","unstructured":"Holgado, P., Garc\u00eda, A., Garc\u00eda, J.J., Roncero, J., Villagr\u00e1, V.A., Jalain, H.: Context-based Encryption Applied to Data Leakage Prevention Solutions. In: Proceedings of the 14th International Joint Conference on e-Business and Telecommunications. pp.\u00a0566\u2013571. SCITEPRESS - Science and Technology Publications (2017)","DOI":"10.5220\/0006475205660571"},{"key":"3668_CR4","doi-asserted-by":"publisher","unstructured":"Morrow, B.: BYOD security challenges: Control and protect your most sensitive data. Network Security. 5\u20138 (2012). (2012). https:\/\/doi.org\/10.1016\/S1353-4858(12)70111-3","DOI":"10.1016\/S1353-4858(12)70111-3"},{"key":"3668_CR5","doi-asserted-by":"publisher","first-page":"102212","DOI":"10.1016\/j.ijinfomgt.2020.102212","volume":"56","author":"Y Barlette","year":"2021","unstructured":"Barlette, Y., Jaouen, A., Baillette, P.: Bring Your Own Device (BYOD) as reversed IT adoption: Insights into managers\u2019 coping strategies. Int. J. Inform. Manage. 56, 102212 (2021). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2020.102212","journal-title":"Int. J. Inform. Manage."},{"key":"3668_CR6","first-page":"2319","volume":"2","author":"SR Raj","year":"2013","unstructured":"Raj, S.R., Cherian, A., Abraham, A.: A Survey on Data Loss prevention Techniques. Int. J. Sci. Res. 2, 2319\u20137064 (2013)","journal-title":"Int. J. Sci. Res."},{"key":"3668_CR7","unstructured":"Meizlik, D.: The ROI of Data Loss Prevention (DLP). (2008)"},{"key":"3668_CR8","unstructured":"Brook, C.: DATAINSIDER Digital Guardian\u2019s Blog, https:\/\/digitalguardian.com\/blog\/whats-cost-data-breach-2019"},{"key":"3668_CR9","unstructured":"CCN-CERT: Ciberamenazas y Tendencias Edici\u00f3n 2017 CCN-CERT IA-16\/17. In: Centro Criptol\u00f3gico Nacional de Espa\u00f1a. p.\u00a086: (2017)"},{"key":"3668_CR10","doi-asserted-by":"publisher","unstructured":"Zeng, W., Van Moorsel, A.: Quantitative Evaluation of Enterprise DRM Technology. Electronic Notes in Theoretical Computer Science. 275, 159\u2013174 (2011). https:\/\/doi.org\/10.1016\/j.entcs.2011.09.011","DOI":"10.1016\/j.entcs.2011.09.011"},{"key":"3668_CR11","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.cose.2014.11.006","volume":"49","author":"NH Ab Rahman","year":"2015","unstructured":"Ab Rahman, N.H., Choo, K.-K.R.: A survey of information security incident handling in the cloud. Computers & Security. 49, 45\u201369 (2015). https:\/\/doi.org\/10.1016\/j.cose.2014.11.006","journal-title":"Computers & Security."},{"key":"3668_CR12","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/s10916-019-1195-7","volume":"43","author":"SG Alonso","year":"2019","unstructured":"Alonso, S.G., Arambarri, J., L\u00f3pez-Coronado, M., de la Torre D\u00edez, I.: Proposing New Blockchain Challenges in eHealth. J. Med. Syst. 43, 64 (2019). https:\/\/doi.org\/10.1007\/s10916-019-1195-7","journal-title":"J. Med. Syst."},{"key":"3668_CR13","volume-title":"Enterprise architecture management as a solution for addressing general data protection regulation requirements in a big data context: a systematic mapping study","author":"G Georgiadis","year":"2021","unstructured":"Georgiadis, G., Poels, G.: Enterprise architecture management as a solution for addressing general data protection regulation requirements in a big data context: a systematic mapping study. Springer, Berlin Heidelberg (2021)"},{"key":"3668_CR14","doi-asserted-by":"crossref","unstructured":"Palazov, A.: Some Technologies for Information Security Protection in Weak-Controlled Computer Systems and Their Applicability for eGovernment Services Users. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). pp.\u00a0117\u2013122 (2011)","DOI":"10.1007\/978-3-642-19228-9_10"},{"key":"3668_CR15","doi-asserted-by":"crossref","unstructured":"Hu, C., Chen, F., Zheng, H.: Researches on the Security Protection and Inspection Method for Confidential Documents Based on Linux Operating System. In: Proceedings of the 3rd International Conference on Machine Learning and Soft Computing - ICMLSC 2019. pp.\u00a0249\u2013252. ACM Press, New York, New York, USA (2019)","DOI":"10.1145\/3310986.3311029"},{"key":"3668_CR16","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.ijinfomgt.2015.11.009","volume":"36","author":"ZA Soomro","year":"2016","unstructured":"Soomro, Z.A., Shah, M.H., Ahmed, J.: Information security management needs more holistic approach: A literature review. Int. J. Inform. Manage. 36, 215\u2013225 (2016). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2015.11.009","journal-title":"Int. J. Inform. Manage."},{"key":"3668_CR17","doi-asserted-by":"publisher","first-page":"68","DOI":"10.4236\/cn.2021.132006","volume":"13","author":"AB Kayode","year":"2021","unstructured":"Kayode, A.B., Dayo, A.O., Uthman, A.A.: A Review on Distribution Model for Mobile Agent-Based Information Leakage Prevention. Commun. Netw. 13, 68\u201378 (2021). https:\/\/doi.org\/10.4236\/cn.2021.132006","journal-title":"Commun. Netw."},{"key":"3668_CR18","doi-asserted-by":"publisher","unstructured":"Leng, J., Zhou, M., Zhao, J.L., Huang, Y., Bian, Y.: Blockchain Security: A Survey of Techniques and Research Directions. IEEE Trans. Serv. Comput. 1\u20131 (2021). https:\/\/doi.org\/10.1109\/TSC.2020.3038641","DOI":"10.1109\/TSC.2020.3038641"},{"key":"3668_CR19","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1109\/TSMC.2020.3040789","volume":"51","author":"J Leng","year":"2021","unstructured":"Leng, J., Ye, S., Zhou, M., Zhao, J.L., Liu, Q., Guo, W., Cao, W., Fu, L.: Blockchain-Secured Smart Manufacturing in Industry 4.0: A Survey. IEEE Trans. Syst. Man Cybernetics: Syst. 51, 237\u2013252 (2021). https:\/\/doi.org\/10.1109\/TSMC.2020.3040789","journal-title":"IEEE Trans. Syst. Man Cybernetics: Syst."},{"key":"3668_CR20","doi-asserted-by":"publisher","first-page":"3615","DOI":"10.11591\/ijece.v10i4.pp3615-3622","volume":"10","author":"B Husham Ali","year":"2020","unstructured":"Husham Ali, B., Jalal, A.A., Al-Obaydy Al-Obaydy, W.N.I.: Data loss prevention (DLP) by using MRSH-v2 algorithm. Int. J. Electr. Comput. Eng. (IJECE). 10, 3615 (2020). https:\/\/doi.org\/10.11591\/ijece.v10i4.pp3615-3622","journal-title":"Int. J. Electr. Comput. Eng. (IJECE)"},{"key":"3668_CR21","doi-asserted-by":"crossref","unstructured":"Garcia, A., Holgado, P., Garcia, J.J., Roncero, J., Villagr\u00e1, V., Jalain, H.: Sistema de cifrado basado en contexto aplicado a prevenci\u00f3n de fuga de datos. In: Proceedings XIII Jornadas de Ingenieria Telematica - JITEL2017. pp.\u00a093\u2013100. Universitat Polit\u00e8cnica Val\u00e8ncia, Valencia (2017)","DOI":"10.4995\/JITEL2017.2017.6576"},{"key":"3668_CR22","unstructured":"Garcia Aranda, J.J.A.: EP 2 709 333 A1 EUROPEAN PATENT APPLICATION, (2014)"},{"key":"3668_CR23","doi-asserted-by":"crossref","unstructured":"Buda, A., Colesa, A.: File System Minifilter Based Data Leakage Prevention System. In: 2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet). pp.\u00a01\u20136. IEEE (2018)","DOI":"10.1109\/ROEDUNET.2018.8514147"},{"key":"3668_CR24","unstructured":"Por\u00edzek*, D.: Transparent Encryption with Windows Minifilter Driver. (2019)"},{"key":"3668_CR25","doi-asserted-by":"publisher","unstructured":"Thombre, S.: Freeware Solution for Preventing Data Leakage by Insider for Windows Framework. International Conference on Computational Performance Evaluation, ComPE 2020. 44\u201347 (2020). (2020). https:\/\/doi.org\/10.1109\/ComPE49325.2020.9200160","DOI":"10.1109\/ComPE49325.2020.9200160"},{"key":"3668_CR26","doi-asserted-by":"crossref","unstructured":"Alruban, A., Clarke, N., Li, F., Furnell, S.: Biometrically Linking Document Leakage to the Individuals Responsible. In: Furnell S., Mouratidis H., Pernul G. (eds) Trust, Privacy and Security in Digital Business. pp.\u00a0135\u2013149 (2018)","DOI":"10.1007\/978-3-319-98385-1_10"},{"key":"3668_CR27","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1016\/j.procs.2019.02.062","volume":"150","author":"Z Shokishalov","year":"2019","unstructured":"Shokishalov, Z., Wang, H.: Applying Eye Tracking in Information Security. Procedia Comput. Sci. 150, 347\u2013351 (2019). https:\/\/doi.org\/10.1016\/j.procs.2019.02.062","journal-title":"Procedia Comput. Sci."},{"key":"3668_CR28","doi-asserted-by":"publisher","first-page":"2883","DOI":"10.1007\/s12652-018-1023-9","volume":"10","author":"L Catuogno","year":"2019","unstructured":"Catuogno, L., Galdi, C., Riccio, D.: Off-line enterprise rights management leveraging biometric key binding and secure hardware. J. Ambient Intell. Humaniz. Comput. 10, 2883\u20132894 (2019). https:\/\/doi.org\/10.1007\/s12652-018-1023-9","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"3668_CR29","doi-asserted-by":"crossref","unstructured":"Vojnak, D.T., Eordevic, B.S., Timcenko, V.V., Strbac, S.M.: Performance Comparison of the type-2 hypervisor VirtualBox and VMWare Workstation. In: 2019 27th Telecommunications Forum (TELFOR). pp.\u00a01\u20134. IEEE (2019)","DOI":"10.1109\/TELFOR48224.2019.8971213"},{"key":"3668_CR30","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MP.2006.1649008","volume":"25","author":"SR Subramanya","year":"2006","unstructured":"Subramanya, S.R., Yi, B.K.: Digital rights management. IEEE Potentials. 25, 31\u201334 (2006). https:\/\/doi.org\/10.1109\/MP.2006.1649008","journal-title":"IEEE Potentials."},{"key":"3668_CR31","doi-asserted-by":"crossref","unstructured":"Reddy, R.S.C., Gopu, S.R.: Enterprise Digital Rights Management for Document Protection. In: 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA). pp.\u00a0321\u2013326. IEEE (2017)","DOI":"10.1109\/WAINA.2017.48"},{"key":"3668_CR32","doi-asserted-by":"crossref","unstructured":"Munier, M., Lalanne, V., Ricarde, M.: Self-protecting documents for cloud storage security. In: Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012. pp.\u00a01231\u20131238. IEEE (2012)","DOI":"10.1109\/TrustCom.2012.261"},{"key":"3668_CR33","doi-asserted-by":"crossref","unstructured":"Munier, M.: A Secure Autonomous Document Architecture for Enterprise Digital Right Management. In: 2011 Seventh International Conference on Signal Image Technology & Internet-Based Systems. pp.\u00a016\u201323. IEEE (2011)","DOI":"10.1109\/SITIS.2011.37"},{"key":"3668_CR34","doi-asserted-by":"publisher","first-page":"102405","DOI":"10.1016\/j.jnca.2019.07.006","volume":"145","author":"M Guri","year":"2019","unstructured":"Guri, M., Puzis, R., Choo, K.-K.R., Rubinshtein, S., Kedma, G., Elovici, Y.: Using malware for the greater good: Mitigating data leakage. J. Netw. Comput. Appl. 145, 102405 (2019). https:\/\/doi.org\/10.1016\/j.jnca.2019.07.006","journal-title":"J. Netw. Comput. Appl."},{"key":"3668_CR35","doi-asserted-by":"crossref","unstructured":"Wuchner, T., Pretschner, A.: Data Loss Prevention Based on Data-Driven Usage Control. In: 2012 IEEE 23rd International Symposium on Software Reliability Engineering. pp.\u00a0151\u2013160. IEEE (2012)","DOI":"10.1109\/ISSRE.2012.10"},{"key":"3668_CR36","doi-asserted-by":"crossref","unstructured":"Aaber, Z.S., Crowder, R.M., Fadhel, N.F., Wills, G.B.: Preventing document leakage through active document. In: 2014 World Congress on Internet Security, WorldCIS 2014. pp.53\u201358.Infonomics Society(2014)","DOI":"10.1109\/WorldCIS.2014.7028166"},{"key":"3668_CR37","doi-asserted-by":"crossref","unstructured":"Zhu, D.Y., Berkeley, U.C., Song, D., Wetherall, D.: TaintEraser: Protecting Sensitive Data Leaks Using Application-Level Taint Tracking. In: ACM SIGOPS Operating Systems Review. pp.\u00a0142\u2013154 (2011)","DOI":"10.1145\/1945023.1945039"},{"key":"3668_CR38","doi-asserted-by":"crossref","unstructured":"Zhang, N., Jing, J., Liu, P.: CLOUD SHREDDER: Removing the Laptop On-road Data Disclosure Threat in the Cloud Computing Era. In: 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications. pp.\u00a01592\u20131599. IEEE (2011)","DOI":"10.1109\/TrustCom.2011.221"},{"key":"3668_CR39","doi-asserted-by":"crossref","unstructured":"Omote, Y., Chubachi, Y., Shinagawa, T.: Hypervisor-based Background Encryption. In: 27th Annual ACM Symposium on Applied Computing. pp.\u00a01829\u20131836 (2012)","DOI":"10.1145\/2245276.2232073"},{"key":"3668_CR40","doi-asserted-by":"crossref","unstructured":"Wang, J., Yu, M., Li, B., Qi, Z., Guan, H.: Hypervisor-based protection of sensitive files in a compromised system. In: 27th Annual ACM Symposium on Applied Computing. pp.\u00a01765\u20131770 (2012)","DOI":"10.1145\/2245276.2232063"},{"key":"3668_CR41","unstructured":"Topaloglu, M., Ucar, E., Umut, I.: AWERProcedia Information Technology & Computer Science Architectural Design and Realization for Management of end Point. 03, 167\u2013172 (2013)"},{"key":"3668_CR42","doi-asserted-by":"crossref","unstructured":"Koutsourelis, D., Katsikas, S.K.: Designing and developing a free Data Loss Prevention system. In: Proceedings of the 18th Panhellenic Conference on Informatics - PCI \u201914. pp.\u00a01\u20135. ACM Press, New York, New York, USA (2014)","DOI":"10.1145\/2645791.2645833"},{"key":"3668_CR43","doi-asserted-by":"crossref","unstructured":"Allawi, M.A.A., Hadi, A., Awajan, A.: MLDED: Multi-layer Data Exfiltration Detection System. In: 2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec). pp.\u00a0107\u2013112. IEEE (2015)","DOI":"10.1109\/CyberSec.2015.29"},{"key":"3668_CR44","doi-asserted-by":"crossref","unstructured":"Yin, J., Yang, J., Chen, Y.: The Design and Implementation of User Autonomous Encryption Cloud Storage System Based on Dokan. In: Proceedings of the 2016 International Conference on Computer Science and Electronic Technology. pp.\u00a0917\u2013928. Atlantis Press, Paris, France (2016)","DOI":"10.2991\/cset-16.2016.18"},{"key":"3668_CR45","doi-asserted-by":"crossref","unstructured":"Burg, S., Channakeshava, P., Bringmann, O.: Linebased end-to-display encryption for secure documents. In: 2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA). pp.\u00a01\u20136. IEEE (2016)","DOI":"10.1109\/ISBA.2016.7477242"},{"key":"3668_CR46","doi-asserted-by":"crossref","unstructured":"Riccio, D., Galdi, C., Manzo, R.: Biometric\/Cryptographic Keys Binding Based on Function Minimization. In: 2016 12th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS). pp.\u00a0144\u2013150. IEEE (2016)","DOI":"10.1109\/SITIS.2016.31"},{"key":"3668_CR47","doi-asserted-by":"crossref","unstructured":"Chang, S.-H., Mallissery, S., Hsieh, C.-H., Wu, Y.-S.: Hypervisor-Based Sensitive Data Leakage Detector. In: 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS). pp.\u00a0155\u2013162. IEEE (2018)","DOI":"10.1109\/QRS.2018.00029"},{"key":"3668_CR48","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1049\/iet-ifs.2018.5295","volume":"13","author":"J Anitha Ruth","year":"2019","unstructured":"Anitha Ruth, J., Sirmathi, H., Meenakshi, A.: Secure data storage and intrusion detection in the cloud using MANN and dual encryption through various attacks. IET Inform. Secur. 13, 321\u2013329 (2019). https:\/\/doi.org\/10.1049\/iet-ifs.2018.5295","journal-title":"IET Inform. Secur."},{"key":"3668_CR49","doi-asserted-by":"publisher","first-page":"163","DOI":"10.22452\/mjcs.vol32no3.1","volume":"32","author":"SV Divya","year":"2019","unstructured":"Divya, S.V., Shaji, R.S., Venkadesh, P., A COMBINED DATA STORAGE WITH ENCRYPTION, AND KEYWORD BASED DATA RETRIEVAL USING SCDS-TM MODEL IN CLOUD: Malaysian J. Comput. Sci. 32, 163\u2013185 (2019). https:\/\/doi.org\/10.22452\/mjcs.vol32no3.1","journal-title":"Malaysian J. Comput. Sci."},{"key":"3668_CR50","doi-asserted-by":"crossref","unstructured":"Dhanuja, B., Prabadevi, B., Bhavani Shankari, K., Sathiya, G.: E-REA Symmetric Key Cryptographic Technique. In: 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE). pp.\u00a01\u20138. IEEE (2020)","DOI":"10.1109\/ic-ETITE47903.2020.38"},{"key":"3668_CR51","doi-asserted-by":"crossref","unstructured":"Gupta, K., Kush, A.: A Forecasting-Based DLP Approach for Data Security. Presented at the (2021)","DOI":"10.1007\/978-981-15-8335-3_1"},{"key":"3668_CR52","doi-asserted-by":"crossref","unstructured":"Fugkeaw, S., Worapaluk, K., Tuekla, A., Namkeatsakul, S.: Design and Development of a Dynamic and Efficient PII Data Loss Prevention System. In: Communications and Network. pp.\u00a023\u201333 (2021)","DOI":"10.1007\/978-3-030-79757-7_3"},{"key":"3668_CR53","doi-asserted-by":"publisher","unstructured":"Ahmad, S., Mehfuz, S., Beg, J.: Cloud security framework and key management services collectively for implementing DLP and IRM. Materials Today: Proceedings. (2022). https:\/\/doi.org\/10.1016\/j.matpr.2022.03.420","DOI":"10.1016\/j.matpr.2022.03.420"},{"key":"3668_CR54","doi-asserted-by":"crossref","unstructured":"Zheng, S., Liu, J.: A global strategy for controlling document distribution in confidential document management system. In: 2011 IEEE 3rd International Conference on Communication Software and Networks. pp.\u00a0410\u2013415. IEEE (2011)","DOI":"10.1109\/ICCSN.2011.6014300"},{"key":"3668_CR55","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1049\/cje.2017.05.002","volume":"26","author":"Z Ma","year":"2017","unstructured":"Ma, Z.: CPSec DLP: Kernel-Level Content Protection Security System of Data Leakage Prevention. Chin. J. Electron. 26, 827\u2013836 (2017). https:\/\/doi.org\/10.1049\/cje.2017.05.002","journal-title":"Chin. J. Electron."},{"key":"3668_CR56","doi-asserted-by":"crossref","unstructured":"Alhindi, H., Traore, I., Woungang, I.: Data Loss Prevention Using Document Semantic Signature. In: Lecture Notes on Data Engineering and Communications Technologies. pp.\u00a075\u201399 (2019)","DOI":"10.1007\/978-3-030-11437-4_7"},{"key":"3668_CR57","doi-asserted-by":"crossref","unstructured":"Chen, Z., Wang, J., Yang, Y., Yang, G., Wen, L., Chen, L.: Research on Key Technology of Enterprise Private Cloud Anti-Leakage. In: 2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS). pp.\u00a0829\u2013834. IEEE (2019)","DOI":"10.1109\/ICICAS48597.2019.00178"},{"key":"3668_CR58","doi-asserted-by":"crossref","unstructured":"Liu, N.: Cloud Technology in the Security Management of Enterprise Document. In: 2011 Second International Conference on Innovations in Bio-inspired Computing and Applications. pp.\u00a0267\u2013269. IEEE (2011)","DOI":"10.1109\/IBICA.2011.70"},{"key":"3668_CR59","doi-asserted-by":"publisher","first-page":"103167","DOI":"10.1016\/j.jisa.2022.103167","volume":"67","author":"A Erola","year":"2022","unstructured":"Erola, A., Agrafiotis, I., Goldsmith, M., Creese, S.: Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations. J. Inform. Secur. Appl. 67, 103167 (2022). https:\/\/doi.org\/10.1016\/j.jisa.2022.103167","journal-title":"J. Inform. Secur. Appl."},{"key":"3668_CR60","doi-asserted-by":"publisher","first-page":"b2535","DOI":"10.1136\/bmj.b2535","volume":"339","author":"D Moher","year":"2009","unstructured":"Moher, D., Liberati, A., Tetzlaff, J., Altman, D.G.: Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. BMJ. 339, b2535\u2013b2535 (2009). https:\/\/doi.org\/10.1136\/bmj.b2535","journal-title":"BMJ."},{"key":"3668_CR61","doi-asserted-by":"publisher","first-page":"107597","DOI":"10.1016\/j.compeleceng.2021.107597","volume":"97","author":"MN Al-Mhiqani","year":"2022","unstructured":"Al-Mhiqani, M.N., Ahmad, R., Abidin, Z.Z., Abdulkareem, K.H., Mohammed, M.A., Gupta, D., Shankar, K.: A new intelligent multilayer framework for insider threat detection. Computers & Electrical Engineering. 97, 107597 (2022). https:\/\/doi.org\/10.1016\/j.compeleceng.2021.107597","journal-title":"Computers & Electrical Engineering."},{"key":"3668_CR62","doi-asserted-by":"publisher","first-page":"2444","DOI":"10.3390\/electronics10192444","volume":"10","author":"MJ Awan","year":"2021","unstructured":"Awan, M.J., Masood, O.A., Mohammed, M.A., Yasin, A., Zain, A.M., Dama\u0161evi\u010dius, R., Abdulkareem, K.H.: Image-Based Malware Classification Using VGG19 Network and Spatial Convolutional Attention. Electronics. 10, 2444 (2021). https:\/\/doi.org\/10.3390\/electronics10192444","journal-title":"Electronics."},{"key":"3668_CR63","doi-asserted-by":"publisher","unstructured":"Khalaf, B.A., Mostafa, S.A., Mustapha, A., Mohammed, M.A., Mahmoud, M.A., Al-Rimy, B.A.S., Abd Razak, S., Elhoseny, M., Marks, A.: An Adaptive Protection of Flooding Attacks Model for Complex Network Environments. Security and Communication Networks. 1\u201317 (2021). (2021). https:\/\/doi.org\/10.1155\/2021\/5542919","DOI":"10.1155\/2021\/5542919"},{"key":"3668_CR64","doi-asserted-by":"publisher","first-page":"201","DOI":"10.33166\/AETiC.2021.05.025","volume":"5","author":"AH Azizan","year":"2021","unstructured":"Azizan, A.H., Mostafa, S.A., Mustapha, A., Foozy, C.F.M., Wahab, M.H.A., Mohammed, M.A., Khalaf, B.A.: A Machine Learning Approach for Improving the Performance of Network Intrusion Detection Systems. Annals of Emerging Technologies in Computing. 5, 201\u2013208 (2021). https:\/\/doi.org\/10.33166\/AETiC.2021.05.025","journal-title":"Annals of Emerging Technologies in Computing."},{"key":"3668_CR65","doi-asserted-by":"crossref","unstructured":"Lee, G., Son, M., Choi, N., Hong, S., Kim, H.: Blockchain based Removable Storage Device Log Management System. In: 2020 22nd International Conference on Advanced Communication Technology (ICACT). pp.\u00a0276\u2013279. IEEE (2020)","DOI":"10.23919\/ICACT48636.2020.9061329"},{"key":"3668_CR66","doi-asserted-by":"crossref","unstructured":"Mallissery, S., Wu, M.-C., Bau, C.-A., Huang, G.-Z., Yang, C.-Y., Lin, W.-C., Wu, Y.-S.: POSTER: Data Leakage Detection for Health Information System based on Memory Introspection. In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security. pp.\u00a0898\u2013900. ACM, New York, NY, USA (2020)","DOI":"10.1145\/3320269.3405437"},{"key":"3668_CR67","doi-asserted-by":"publisher","unstructured":"Ajayi, O., Abouali, M., Saadawi, T.: Blockchain architecture for secured inter-healthcare electronic health records exchange. Adv. Intell. Syst. Comput. 1263 AISC. 161\u2013172 (2021). https:\/\/doi.org\/10.1007\/978-3-030-57796-4_16","DOI":"10.1007\/978-3-030-57796-4_16"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03668-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-022-03668-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03668-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,27]],"date-time":"2022-10-27T14:34:54Z","timestamp":1666881294000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-022-03668-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,14]]},"references-count":67,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["3668"],"URL":"https:\/\/doi.org\/10.1007\/s10586-022-03668-2","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,14]]},"assertion":[{"value":"7 February 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}]}}