2 works on record
Data Exfiltration Threats and Prevention Techniques
Data Exfiltration Malware, Detection, and Prevention Technologies