{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:40Z","timestamp":1750308820537,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,3]],"date-time":"2014-06-03T00:00:00Z","timestamp":1401753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,3]]},"DOI":"10.1145\/2598918.2598919","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"19-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A bayesian belief network for data leakage investigation"],"prefix":"10.1145","author":[{"given":"Fei","family":"Xu","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, CAS, Beijing, China"}]},{"given":"Michael","family":"Kwan","sequence":"additional","affiliation":[{"name":"University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Hayson","family":"Tse","sequence":"additional","affiliation":[{"name":"University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"K.P.","family":"Chow","sequence":"additional","affiliation":[{"name":"University of Hong Kong, Hong Kong, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2014,6,3]]},"reference":[{"issue":"6","key":"e_1_3_2_1_1_1","volume":"3","author":"Mishra R.","year":"2012","unstructured":"Mishra , R. and Chitre , D.K. , Data leakage and Detection of Guilty Agent , International Journal of Scientific & Engineering Research , Vol. 3 , Issue 6 , June 2012 . Mishra, R. and Chitre, D.K., Data leakage and Detection of Guilty Agent, International Journal of Scientific & Engineering Research, Vol. 3, Issue 6, June 2012.","journal-title":"International Journal of Scientific & Engineering Research"},{"issue":"3","key":"e_1_3_2_1_2_1","first-page":"404","volume":"2","author":"Pol R.","year":"2012","unstructured":"Pol , R. , Thakur , V. , Bhise , R. and Kat , A. , Data Leakage Detection , International Journal of Engineering Research & Application , Vol. 2 , Issue 3 , May 2012 , pp. 404 -- 410 . Pol, R., Thakur, V., Bhise, R. and Kat, A., Data Leakage Detection, International Journal of Engineering Research & Application, Vol. 2, Issue 3, May 2012, pp. 404--410.","journal-title":"International Journal of Engineering Research & Application"},{"key":"e_1_3_2_1_3_1","volume-title":"International Journal of Computational Engineering Research, Vo. 3, Issue","author":"Sundaramoorthy K.","year":"2013","unstructured":"Sundaramoorthy , K. and Madhane , S.S.R , Efficient Method of Detecting Data Leakage Using Misusability Weight Measure , International Journal of Computational Engineering Research, Vo. 3, Issue 4, April 2013 . Sundaramoorthy, K. and Madhane, S.S.R, Efficient Method of Detecting Data Leakage Using Misusability Weight Measure, International Journal of Computational Engineering Research, Vo. 3, Issue 4, April 2013."},{"issue":"6","key":"e_1_3_2_1_4_1","first-page":"272","volume":"1","author":"Chaware N.","year":"2012","unstructured":"Chaware , N. , Bapat , P. , Kad , R. , Jadhav , A. and Sangve , S.M.J. , Data Leakage Detection , International Journal of Scientific Engineering & Technology , Vol. 1 , Issue 6 , December 2012 , pp. 272 -- 273 . Chaware, N., Bapat, P., Kad, R., Jadhav, A. and Sangve, S.M.J., Data Leakage Detection, International Journal of Scientific Engineering & Technology, Vol. 1, Issue 6, December 2012, pp. 272--273.","journal-title":"International Journal of Scientific Engineering & Technology"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/TKDE.2010.100"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","DOI":"10.1002\/0470091754","volume-title":"Bayesian Network and Probabilistic Inference in Forensic Science","author":"Taroni F.","year":"2006","unstructured":"Taroni , F. , Aitken , C. , Garbolino , P. and Biedermann , A . ( 2006 ), Bayesian Network and Probabilistic Inference in Forensic Science , John Wiley & Sons Ltd ., Chichester, West Susseex, England. Taroni, F., Aitken, C., Garbolino, P. and Biedermann, A. (2006), Bayesian Network and Probabilistic Inference in Forensic Science, John Wiley & Sons Ltd., Chichester, West Susseex, England."},{"key":"e_1_3_2_1_7_1","series-title":"IFIP The International Federation for Information Processing","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1007\/978-0-387-84927-0_22","volume-title":"Advances in Digital Forensics IV","author":"Michael Kwan","year":"2008","unstructured":"Michael Kwan , Kam-Pui Chow, Frank Law , and Pierre Lai. Reasoning About Evidence Using Bayesian Networks . In Indrajit Ray and Sujeet Shenoi, editors, Advances in Digital Forensics IV , volume 285 of IFIP The International Federation for Information Processing , pages 275 -- 289 . Springer US , 2008 . Michael Kwan, Kam-Pui Chow, Frank Law, and Pierre Lai. Reasoning About Evidence Using Bayesian Networks. In Indrajit Ray and Sujeet Shenoi, editors, Advances in Digital Forensics IV, volume 285 of IFIP The International Federation for Information Processing, pages 275--289. Springer US, 2008."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/SADFE.2009.8"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1007\/978-3-642-04155-6_17"},{"key":"e_1_3_2_1_10_1","first-page":"16","volume-title":"IFIP International Conference on Digital Forensics","author":"Hayson K.S.","year":"2012","unstructured":"Hayson K.S. Tse , K.P. Chow , and Y.K. Kwan . A Revisit of Reasoning About Evidence Using Bayesian Networks . In IFIP International Conference on Digital Forensics , pages 16 -- 30 , 2012 . Hayson K.S.Tse, K.P.Chow, and Y.K.Kwan. A Revisit of Reasoning About Evidence Using Bayesian Networks. In IFIP International Conference on Digital Forensics, pages 16--30, 2012."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-74101-7","volume-title":"Bayesian networks and Influence Diagrams: A Guide to Construction and Analysis","author":"Kjaerulff U.B.","year":"2008","unstructured":"Kjaerulff , U.B. and Madsen , A.L . ( 2008 ), Bayesian networks and Influence Diagrams: A Guide to Construction and Analysis , New York : Springer Science + Business Media, LLC. Kjaerulff, U.B. and Madsen, A.L. (2008), Bayesian networks and Influence Diagrams: A Guide to Construction and Analysis, New York: Springer Science + Business Media, LLC."},{"unstructured":"EastSouthWestNorth Sexy Photo Gate http:\/\/www.zonaeuropa.com\/20080209_1.htm (last accessed on 24 September 2013)  EastSouthWestNorth Sexy Photo Gate http:\/\/www.zonaeuropa.com\/20080209_1.htm (last accessed on 24 September 2013)","key":"e_1_3_2_1_12_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/90417.90738"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"ASIA CCS '14","name":"ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security","location":"Kyoto Japan"},"container-title":["Proceedings of the 2nd international workshop on Security and forensics in communication systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2598918.2598919","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2598918.2598919","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:26:40Z","timestamp":1750278400000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2598918.2598919"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,3]]},"references-count":13,"alternative-id":["10.1145\/2598918.2598919","10.1145\/2598918"],"URL":"https:\/\/doi.org\/10.1145\/2598918.2598919","relation":{},"subject":[],"published":{"date-parts":[[2014,6,3]]},"assertion":[{"value":"2014-06-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}