{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T09:52:44Z","timestamp":1765619564465},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319498058"},{"type":"electronic","value":"9783319498065"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49806-5_7","type":"book-chapter","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T07:34:29Z","timestamp":1479886469000},"page":"131-150","source":"Crossref","is-referenced-by-count":6,"title":["Data Loss Prevention Based on Text Classification in Controlled Environments"],"prefix":"10.1007","author":[{"given":"Kyrre Wahl","family":"Kongsg\u00e5rd","sequence":"first","affiliation":[]},{"given":"Nils Agne","family":"Nordbotten","sequence":"additional","affiliation":[]},{"given":"Federico","family":"Mancini","sequence":"additional","affiliation":[]},{"given":"Paal E.","family":"Engelstad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"unstructured":"Digitial National Security Archive. http:\/\/nsarchive.chadwyck.com\/home.do . Accessed 26 Mar 2015","key":"7_CR1"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/978-3-319-08344-5_27","volume-title":"Information Security and Privacy","author":"S Alneyadi","year":"2014","unstructured":"Alneyadi, S., Sithirasenan, E., Muthukkumarasamy, V.: A semantics-aware classification approach for data leakage prevention. In: Susilo, W., Mu, Y. (eds.) ACISP 2014. LNCS, vol. 8544, pp. 413\u2013421. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-08344-5_27"},{"key":"7_CR3","volume-title":"Modern Information Retrieval","author":"R Baeza-Yates","year":"1999","unstructured":"Baeza-Yates, R., Ribeiro-Neto, B., et al.: Modern Information Retrieval, vol. 463. ACM Press, New York (1999)"},{"doi-asserted-by":"crossref","unstructured":"Barreno, M., Nelson, B.A., Joseph, A.D., Tygar, D.: The security of machine learning. Technical report UCB\/EECS-2008-43, EECS Department, University of California, Berkeley, April 2008. http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/2008\/EECS-2008-43.html","key":"7_CR4","DOI":"10.21236\/ADA519143"},{"key":"7_CR5","volume-title":"Pattern Recognition and Machine Learning","author":"CM Bishop","year":"2006","unstructured":"Bishop, C.M.: Pattern Recognition and Machine Learning. Springer, New York (2006)"},{"issue":"1","key":"7_CR6","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"unstructured":"Brown, J.D., Charlebois, D.: Security classification using automated learning (scale): optimizing statistical natural language processing techniques to assign security labels to unstructured text. Technical report, DTIC Document (2010)","key":"7_CR7"},{"unstructured":"Clark, K.P.: Automated security classification. Master thesis Vrije Universiteit (2008)","key":"7_CR8"},{"doi-asserted-by":"crossref","unstructured":"Clinchant, S., Gaussier, E.: Information-based models for ad hoc IR. In: Proceeding ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 234\u2013241 (2010)","key":"7_CR9","DOI":"10.1145\/1835449.1835490"},{"doi-asserted-by":"crossref","unstructured":"Engelstad, P.E., Hammer, H., Kongsg\u00e5rd, K.W., Yazidi, A., Nordotten, N.A., Bai, A.: Automatic security classification with lasso. In: Proceeding International Workshop on Information Security Applications (2015)","key":"7_CR10","DOI":"10.1007\/978-3-319-31875-2_33"},{"key":"7_CR11","volume-title":"Elasticsearch: The Definitive Guide","author":"C Gormley","year":"2015","unstructured":"Gormley, C., Tong, Z.: Elasticsearch: The Definitive Guide. O\u2019Reilly Media Inc., Sebastopol (2015)"},{"doi-asserted-by":"crossref","unstructured":"Haakseth, R., Nordbotten, N.A., Jonsson, \u00d8., Kristiansen, B.: A high assurance guard for use in service-oriented architectures. In: Proc. International Conference on Military Communications and Information Systems (2015)","key":"7_CR12","DOI":"10.1109\/ICMCIS.2015.7158668"},{"doi-asserted-by":"crossref","unstructured":"Hammer, H., Kongsg\u00e5rd, K.W., Bai, A., Yazidi, A., Nordbotten, N.A., Engelstad, P.E.: Automatic security classification by machine learning for cross-domain information exchange. In: Proceeding IEEE Military Communications Conference, vol. 31 (2015)","key":"7_CR13","DOI":"10.1109\/MILCOM.2015.7357672"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-642-22263-4_2","volume-title":"Privacy Enhancing Technologies","author":"M Hart","year":"2011","unstructured":"Hart, M., Manadhata, P., Johnson, R.: Text classification for data loss prevention. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 18\u201337. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-22263-4_2"},{"unstructured":"Security, I.: Grand theft data - data exfiltration study: actors, tactics, and detection (2015). http:\/\/www.mcafee.com\/us\/resources\/reports\/rp-data-exfiltration.pdf","key":"7_CR15"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/BFb0026683","volume-title":"Machine Learning: ECML-98","author":"T Joachims","year":"1998","unstructured":"Joachims, T.: Text categorization with support vector machines: learning with many relevant features. In: N\u00e9dellec, C., Rouveirol, C. (eds.) ECML 1998. LNCS, vol. 1398, pp. 137\u2013142. Springer, Heidelberg (1998). doi: 10.1007\/BFb0026683"},{"unstructured":"Jurafsky, D., Martin, J.: Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition. Prentice Hall series in Artificial Intelligence, Pearson Prentice Hall (2009). https:\/\/books.google.no\/books?id=fZmj5UNK8AQC","key":"7_CR17"},{"doi-asserted-by":"crossref","unstructured":"Lewellen, T., Silowash, G.J., Costa, D.L.: Insider threat control: Using plagiarism detection algorithms to prevent data exfiltration in near real time. Technical report CMU\/SEI-2013-TN-008, Carnegie Mellon University (2013)","key":"7_CR18","DOI":"10.21236\/ADA610372"},{"unstructured":"Ouellet, E.: Magic quadrant for content-aware data loss prevention. Gartner Inc. (2013)","key":"7_CR19"},{"key":"7_CR20","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"doi-asserted-by":"crossref","unstructured":"Ponte, J.M., Croft, W.B.: A language modeling approach to information retrieval. In: Proc. ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 275\u2013281 (1998)","key":"7_CR21","DOI":"10.1145\/290941.291008"},{"unstructured":"\u0158eh\u016f\u0159ek, R., Sojka, P.: Software Framework for Topic Modelling with Large Corpora, pp. 45\u201350, May 2012. http:\/\/is.muni.cz\/publication\/884893\/en","key":"7_CR22"},{"doi-asserted-by":"crossref","unstructured":"Robertson, S., Zaragoza, H.: The probabilistic relevance framework: BM25 and beyond. Foundations and trends in information retrieval (2009)","key":"7_CR23","DOI":"10.1561\/1500000019"},{"unstructured":"Rosso, P., Stein, B.: Overview of the 6th international competition on plagiarism detection","key":"7_CR24"},{"key":"7_CR25","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-2053-8","volume-title":"A Survey of Data Leakage Detection and Prevention Solutions","author":"A Shabtai","year":"2012","unstructured":"Shabtai, A., Elovici, Y., Rokach, L.: A Survey of Data Leakage Detection and Prevention Solutions. Springer, New York (2012)"},{"unstructured":"Shu, X., Zhang, J., Yao, D., Feng, W.C.: Fast detection of transformed data leaks. IEEE Transactions on Information Forensics and Security (2016)","key":"7_CR26"},{"unstructured":"Symantec: Machine learning sets new standard for data loss prevention: describe, fingerprint, learn (2010). http:\/\/eval.symantec.com\/mktginfo\/enterprise\/white_papers\/b-dlp_machine_learning.WP_en-us.pdf","key":"7_CR27"},{"doi-asserted-by":"crossref","unstructured":"Zhai, C., Lafferty, J.: A study of smoothing methods for language models applied to ad hoc information retrieval. In: Proceeding ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 334\u2013342 (2001)","key":"7_CR28","DOI":"10.1145\/383952.384019"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49806-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T18:11:25Z","timestamp":1568571085000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49806-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319498058","9783319498065"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49806-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}