A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Some Technologies for Information Security Protection in Weak-Controlled Computer Systems and Their Applicability for eGovernment Services Users
[chapter]
2011
Lecture Notes in Computer Science
The technologies for control over the channels which can lead to data leakage protect data by whitelisting or blacklisting some devices or ports, by prohibit and allow some actions and operations, or by ...
The technologies for data protection in case of theft or loss of computers and data devices and in case of data leakage are very important for eGovernment services users and must have appropriate properties ...
• Integration of DLP technologies with other services like e-mail, instant messaging, Skype, social networking, etc would be a challenge and a big advantage for eGovernment services users. ...
doi:10.1007/978-3-642-19228-9_10
fatcat:as3nkfyhbbhybm4e2tyhph6mni
A Comparative Study of the Approach Provided for Preventing the Data Leakage
2017
International journal of network security and its applications
Data leakage poses a serious issue for companies as the number of incidents and the cost to those experiencing them continue to increase. ...
This review paper aims to study data leakage prevention through some challenges and data protection approaches as well as considering some limitations. ...
Companies should ensure that traffic will pass through HTTP port. E-mail Security-In companies, grouping can be performed to prevent data leakage. ...
doi:10.5121/ijnsa.2017.9502
fatcat:ugpoy43w2vchrioquhnjzk33ta
Data loss prevention (DLP) by using MRSH-v2 algorithm
2020
International Journal of Electrical and Computer Engineering (IJECE)
There are many reasons for data leakages. Internal threats such as human mistakes and external threats such as DDoS attacks are two main reasons for data loss. ...
Exposing valuable data to others leads to severe Consequences. Customers, organizations, and /or companies lose their money and reputation due to data breaches. ...
FTP protocol and E-mail E-mail is the most common way to send data through the internet among people around the world. ...
doi:10.11591/ijece.v10i4.pp3615-3622
fatcat:3zcdzs5nxjfltp7ba435b3ybvu
Research on Behavior-Based Data Leakage Incidents for the Sustainable Growth of an Organization
2020
Sustainability
Statistical verification of the analyzed data leakage behavior is performed to determine the validity and derive the levels of leakage risk for each behavior. ...
In addition, by applying the N-gram analysis method to derive a data leakage scenario, the levels of risk are clarified to reduce false-positives and over detection (i.e., the limitations of existing data ...
User Behavior Profiling using Ensemble Approach for Insider Threat Detection. ...
doi:10.3390/su12156217
fatcat:65y4uw5bibcjzcdfoku4onkefq
An Improved Data Leak Detector for Situation Awareness Using Ant Bee Colony (ABC) Algorithm
2020
jecet
There is an alarming rate of data leakage in most social networks and not every social media user takes data security seriously. ...
According to Subalakshmi et al [9] , in the research titled detecting data leakage using data allocation strategies with fake objects; "the functions of businesses depend on e-mail exchange for the purpose ...
However, data leakage detection systems cannot provide absolute protection. Thus, it is essential to discover data leakage as soon as possible. ...
doi:10.24214/jecet.b.9.1.07988
fatcat:ti4t7m3ycvfszg3huh443iw2lq
Implementation of Security Systems for Prevention of Loss of Information at Organizations of Higher Education
2015
2015 12th International Conference on Information Technology - New Generations
The DLP system helps to analyze, control, monitor, block and protect data at the University. ...
letter exchanges with partners and clients, academic and research data, etc... ...
DLP system helps to analyze, monitor, track, lock and protect our data. ...
doi:10.1109/itng.2015.147
fatcat:nsezwsi3ibglbjdzx4iijyd5bm
NMR Application Probes a Novel and Ubiquitous Family of Enzymes That Alter Monosaccharide Configuration
2004
Journal of Biological Chemistry
It was observed that the anomeric exchange of only ribofuranose, not ribopyranose, occurs spontaneously in solution rationalizing its evolutionary incorporation into the nucleic acid. ...
The RbsD and FucU proteins share sequence homology and belong to the same protein family that is found from eubacteria to human, whereas the YiiL homologues exist in archaebacteria and lower eukaryotes ...
‡ ‡ To whom correspondence may be addressed. Tel.: 82-42-869-2629;
Fax: 82-42-869-2610; E-mail: ckpark@kaist.ac.kr. ...
doi:10.1074/jbc.m402016200
pmid:15060078
fatcat:gg7ualtokfei5mo7ejoosy3qbi
Information behaving badly
2013
Proceedings of the 2013 workshop on New security paradigms workshop - NSPW '13
We hypothesize that similar types of documents will exhibit similar workflows, and that a document deviating from its expected workflow indicates potential data leakage. ...
Traditionally, insider threat detection has focused on observing human actors -or, more precisely, computer accounts and processes acting on behalf of those actors -to model their "normal" behavior, then ...
Acknowledgments: This work was supported by Awards CCF-0905503, CNS-1219992, CNS-1219993, and OCI-1246061 from the National Science Foundation to the University of California at Davis. ...
doi:10.1145/2535813.2535825
dblp:conf/nspw/ArdBGS13
fatcat:b7jvrsacarhp3fb7td3vf2c2qq
Untangling a Web of Lies: Exploring Automated Detection of Deception in Computer-Mediated Communication
2016
Journal of Management Information Systems
CMC is especially vulnerable to deception, as unstructured data is exchanged through emails [6, 26] . ...
Therefore, we were able to use the full set of e-mails and requests collected to analyze speech act cues that were not missing due to a lower level of abstraction, such as simple word use or were lacking ...
doi:10.1080/07421222.2016.1205927
fatcat:ytvj7zwh6zdmzh3xqc6yua3xgi
Corporate chat under DLP–system controlling
2021
E3S Web of Conferences
The article describes the preparation process of software complex (package) consisting of secure corporate chat and DLP (Data Leak Prevention) system in the form of security monitor. ...
If employees send files or e-mails to external e-mail addresses that do not correspond to their corporate e-mail addresses -there is high level of threat. 4. ...
(users, departments, tasks, roles); -Control of the employee correspondence in the corporate chat; -Tracking the distribution path of files transmitted in the chat and e-mail; -Threat detection in the ...
doi:10.1051/e3sconf/202127308048
fatcat:yid53z3ogre4fncu7gxn6gkznm
Identity management-based social trust model for mediating information sharing and privacy enhancement
2011
Security and Communication Networks
The proposed trust model contributes to increasing the opportunities for information sharing. ...
In this paper, we propose an identity management-based social trust model for solving a sparsity problem and an information leakage. ...
Furthermore, identity management-based social trust model can be applied to the real world applications such as recommendation system and E-mail spam detection. ...
doi:10.1002/sec.379
fatcat:fs7g3rj4vvgyxopnlgfhngtc2q
Automating Group Management of Large-Scale IoT Botnets for Antitracking
2022
Security and Communication Networks
The Diffie–Hellman key exchange method is leveraged for efficiently generating the unique group ID, thereby scaling up automatic bot grouping. ...
To solve this problem, this paper proposes an automated approach to group management of large-scale IoT bots. ...
Once a group of bots are mixed with honeypots, the configuration information leakage will not affect other groups. e Diffie-Hellman key exchange method is applied for automatic bot grouping, as is shown ...
doi:10.1155/2022/4196945
fatcat:a7kunndfmzacjhjku3gsbhayye
Sensitive Data Exposure: Data Forwarding and Storage on Cloud Environment
2021
International Journal of Online and Biomedical Engineering (iJOE)
This is because the rate of attack, leakage and loss of this data has become a serious matter. ...
The importance of sensitive data in our current era is considered our oil, as it is very important in several uses in statistical analyzes and other important matters that help the authorities to know ...
A mysterious fingerprint system has been proposed that helps enhance the privacy of data during the detection of data leakage from private files and E-mails. ...
doi:10.3991/ijoe.v17i14.27365
fatcat:tzebicrgkrcxdhpdbl7dptlpu4
Methods of Machine Learning in System Abnormal Behavior Detection
[chapter]
2020
Lecture Notes in Computer Science
The aim of the research is to develop mathematical and program support for detecting abnormal behavior of users. It will be based on analysis of their behavioral biometric characteristics. ...
This will make it possible to achieve a data analysis high quality and find complex dependencies in it. ...
Purpose of Internal Invasions The purpose of internal intrusions is usually to gain access to textual information (financial reports, contracts, technical documentation, e-mail, etc.). ...
doi:10.1007/978-3-030-53956-6_45
fatcat:juqwtw42d5hajmxpf5hccncw6u
Clinician Survey to Determine Knowledge of Dengue and Clinical Management Practices, Texas, 2014
2017
American Journal of Tropical Medicine and Hygiene
A survey was sent to 2,375 south Texas clinicians; 217 (9%) completed the survey. ...
Knowledge of clinical management was limited; few participants correctly identified scenarios when plasma leakage occurred (10%) or a crystalloid solution was indicated (7%); however, 45% correctly identified ...
Data were analyzed using IBM SPSS Statistics for Windows (Version 20.0; IBM Corporation, Armonk, NY) and difference in responses among groups was analyzed using Pearson's χ 2 test. ...
doi:10.4269/ajtmh.16-0367
pmid:28138048
pmcid:PMC5361550
fatcat:yypddywstzf2lktnomeuyox4rm
« Previous
Showing results 1 — 15 out of 4,069 results