1. Lecture Notes in Computer Science;M Hart,2011
2. Mogull R (2009) Best practices for endpoint data loss prevention. s.l.: Securosis, L.L.C.
3. Mogull R Understanding and selecting a DLP solution: part 2, content awareness. https://securosis.com/blog/understanding-and-selecting-a-dlp-solution-part-2-contentawareness
4. Takebayashi T, et al (2010) Data loss prevention technologies. Fujitsu Sci Tech J 46:47–55
5. Faiz MF, Arshad J, Alazab M, Shalaginov A (2020) Predicting likelihood of legitimate data loss in email DLP. Future Gener Comput Syst 110:744–757