Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,331,542 papers from all fields of science
Search
Sign In
Create Free Account
Data loss prevention software
Known as:
DLP
, Data leakage prevention
, ILD&P
Expand
Data loss prevention software that are designed to detect potential data breaches / data ex-filtration transmissions and prevent them by monitoring…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Adaptive Redaction
Chinese wall
Computer security
Content-control software
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
Data loss prevention: the business case
Lior Arbel
2015
Corpus ID: 60299198
2015
2015
Clone attack detection and data loss prevention in mobile ad hoc networks
Ganapathy Mani
International Journal of Space-Based and Situated…
2015
Corpus ID: 43898013
Wireless ad hoc networks, mobile ad hoc networks (MANETs) in particular, are not protected by tamper-resistant or equipped with…
Expand
2013
2013
Data leakage analysis on cloud computing
Pawan Singh
,
B. Purohit
2013
Corpus ID: 18496820
Cloud describes the use of a collection of services, applications, information, and infrastructure. It is like a pool of…
Expand
2013
2013
Privacy Level Indicating Data Leakage Prevention System
Jinhyung Kim
,
Choonsik Park
,
Jun Hwang
,
Hyung-Jong Kim
KSII Transactions on Internet and Information…
2013
Corpus ID: 15825476
The purpose of a data leakage prevention system is to protect corporate information assets. The system monitors the packet…
Expand
2012
2012
The Application of Chinese Wall Policy in Data Leakage Prevention
Ma Jun
,
W. Zhiying
,
Ren Jiangchun
,
Wu Jiangjiang
,
Cheng Yong
,
Mei Songzhu
International Conference on Communication Systems…
2012
Corpus ID: 14946477
The primary objective of Data Leakage Prevention (DLP) is to control the data usage by authorized users. Traditional control…
Expand
Highly Cited
2011
Highly Cited
2011
Risk-Based Assessment of Financial Losses Due to Voltage Sag
J. Y. Chan
,
J. Milanović
,
Alice Delahunty
IEEE Transactions on Power Delivery
2011
Corpus ID: 26234489
This paper investigates the factors that influence the outcome of financial-loss analysis in voltage sag studies. Focusing on…
Expand
2011
2011
Digital Suppression of Spurious PLL Tones in A/D Converters
Shang-Kee Ting
,
A. H. Sayed
IEEE Transactions on Signal Processing
2011
Corpus ID: 15332182
In a nonideal PLL circuit, leakage of the reference signal into the control line produces spurious tones. When the distorted PLL…
Expand
2010
2010
Web-Based Data Leakage Prevention
Sachiko Yoshihama
,
T. Mishina
,
Tsutomu Matsumoto
International Workshop on Security
2010
Corpus ID: 18883932
The risk of data leakage from users’ Web browsers to external servers has increased due to the prevalence of Software as a…
Expand
2010
2010
A trustworthiness-based distribution model for data leakage prevention
Yinghong Fan
,
Yu Wang
,
Lina Wang
,
Rongwei Yu
Wuhan University Journal of Natural Sciences
2010
Corpus ID: 44323265
Under the global circumstances where data leakage gets more and more severe, we present a trustworthiness-based distribution…
Expand
2006
2006
Decision Making Tools for Seismic Risk
G. MacRae
2006
Corpus ID: 107601107
Earthquake risk, and the benefits and deficiencies of possible risk mitigation options, need to be communicated in such as way as…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE