{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T23:54:25Z","timestamp":1726444465923},"reference-count":0,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2015,3,1]],"date-time":"2015-03-01T00:00:00Z","timestamp":1425168000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Data leakage is an uncontrolled or unauthorized transmission of classified information to the outside. It poses a serious problem to companies as the cost of incidents continues to increase. Many software solutions were developed to provide data protection. However, data leakage detection systems cannot provide absolute protection. Thus, it is essential to discover data leakage as soon as possible. The purpose of this research is to design and implement a data leakage detection system based on special information retrieval models and methods. In this paper a semantic informationretrieval based approach and the implemented DATALEAK application is presented.<\/jats:p>","DOI":"10.1515\/macro-2015-0011","type":"journal-article","created":{"date-parts":[[2015,5,12]],"date-time":"2015-05-12T17:01:36Z","timestamp":1431450096000},"page":"113-124","source":"Crossref","is-referenced-by-count":2,"title":["DATALEAK: Data Leakage Detection System"],"prefix":"10.1515","volume":"1","author":[{"given":"Adrienn","family":"Skrop","sequence":"first","affiliation":[{"name":"Department of Computer Science and Systems Technology, Faculty of Information Technology, University of Pannonia, Hungary, e-mail: skrop@dcs.uni-pannon.hu"}]}],"member":"374","published-online":{"date-parts":[[2015,5,9]]},"container-title":["MACRo 2015"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/content.sciendo.com\/view\/journals\/macro\/1\/1\/article-p113.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.sciendo.com\/article\/10.1515\/macro-2015-0011","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T03:23:36Z","timestamp":1617765816000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.sciendo.com\/article\/10.1515\/macro-2015-0011"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,1]]},"references-count":0,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2015,5,9]]},"published-print":{"date-parts":[[2015,3,1]]}},"alternative-id":["10.1515\/macro-2015-0011"],"URL":"https:\/\/doi.org\/10.1515\/macro-2015-0011","relation":{},"ISSN":["2247-0948"],"issn-type":[{"type":"electronic","value":"2247-0948"}],"subject":[],"published":{"date-parts":[[2015,3,1]]}}}