• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,247
Next 10 →

Leakage Detection Instrumentation

by unknown authors , 1066
"... Seabrook Station. The proposed change revises the TS for the reactor coolant system (RCS) leakage detection systems. The change revises the operability requirements for the leakage detection systems, eliminates redundant TS requirements, and revises the TS actions to include conditions and required ..."
Abstract - Add to MetaCart
Seabrook Station. The proposed change revises the TS for the reactor coolant system (RCS) leakage detection systems. The change revises the operability requirements for the leakage detection systems, eliminates redundant TS requirements, and revises the TS actions to include conditions and required

A novel diagnostic system for gasoline-engine leakage detection

by P-c Chen - J. Automob. Eng
"... leakage detection ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
leakage detection

DATA LEAKAGE DETECTION

by Mr Amol , Prof. Ms O V M Gharpande , Deshmukh
"... Abstract-In both the commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of Information. This paper gives review idea about data leakage detection techniques. A data distributor has given sensitive data to a set of supposedly trusted agents (third parti ..."
Abstract - Add to MetaCart
Abstract-In both the commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of Information. This paper gives review idea about data leakage detection techniques. A data distributor has given sensitive data to a set of supposedly trusted agents (third

Data Leakage Detection

by Panagiotis Papadimitriou, Hector Garcia-molina
"... Abstract—We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized place (e.g., on the web or somebody’s laptop). The distributor must assess the likelihood that the leake ..."
Abstract - Cited by 35 (0 self) - Add to MetaCart
). In some cases we can also inject “realistic but fake ” data records to further improve our chances of detecting leakage and identifying the guilty party. Index Terms—allocation strategies, data leakage, data privacy, fake records, leakage model 1

Data Leakage Detection

by unknown authors
"... We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leaked and found in an unauthorized place (e.g., on the web or somebody’s laptop). The distributor must assess the likelihood that the leaked data c ..."
Abstract - Add to MetaCart
, we can also inject “realistic but fake ” data records to further improve our chances of detecting leakage and identifying the guilty party. Keywords:Allocation strategies, data leakage, data privacy, fake records, leakage model. 1.

DATA LEAKAGE DETECTION

by Archana Vaidya, Prakash Lahange, Kiran More, Shefali Kachroo, Nivedita P
"... Modern business activities rely on extensive email exchange. Email leakages have become widespread, and the severe damage caused by such leakages constitutes a disturbing problem for organizations. We study the following problem: A data distributor has given sensitive data to a set of supposedly tru ..."
Abstract - Add to MetaCart
propose data allocation strategies that improve the probability of identifying leakages. In some cases we can also inject “realistic but fake ” data record to further improve our changes of detecting leakage and identifying the guilty party. The algorithms implemented using fake objects will improve

REVIEW ON DATA LEAKAGE DETECTION.

by Naresh Bollam
"... Abstract — In this paper, we present a mechanism for proof of ownership based on the secure embedding of a robust imperceptible watermark in relational data. We formulate the watermarking of relational database as a constraint optimization problem and discuss efficient techniques to solve the optimi ..."
Abstract - Add to MetaCart
agents, as opposed to having been independently gathered by other means. We propose data allocation strategies that improve the probability of identifying leakages. In some cases we can also inject “realistic but fake ” data record to further improve our changes of detecting leakage and identifying

Data leakage Detection

by Rohit Pol (student, Vishwajeet Thakur (student, Ruturaj Bhise (student, Guide –prof Akash Kate
"... In both the commercial and defence sectors a compelling need is emerging for rapid, yet secure, dissemination of Information. In this paper we address the threat of information leakage that often accompanies such information flows. We focus on domains with one information source (sender) and many in ..."
Abstract - Add to MetaCart
In both the commercial and defence sectors a compelling need is emerging for rapid, yet secure, dissemination of Information. In this paper we address the threat of information leakage that often accompanies such information flows. We focus on domains with one information source (sender) and many

Data Leakage Detection

by Chandni Bhatt, Prof. Richa Sharma
"... Abstract- A data distributor has given sensitive data to a set of supposedly trusted agents. Sometimes data is leaked and found in unauthorized place e.g., on the web or on somebody's laptop. For example, a hospital may give patient records to researchers who will devise new treatments. Similar ..."
Abstract - Add to MetaCart
. Data leakage happens every day when confidential business information such as customer or patient data, company secrets, budget information etc..are leaked out. when these information are leaked out, then the companies are at serious risk. Most probably data are being leaked from agent’s side. So

Image Leakage Detection and Prevention

by Pardeep Kumar
"... As we know now a days we have to share our image with many other companies to get the service from them and share it on the internet,so it is very dangerous for the data to get into the wrong hands.But, some of the data that we are sharing might be very sensitive to organization. So, we have to prot ..."
Abstract - Add to MetaCart
to protect (copyright) it from leaking so, they don’t reach to wrong people.We have to find the person responsible for the leakage of data. if the data distributed to the third party found in the public domain,it might be very serious threat to the owner of the company.
Next 10 →
Results 1 - 10 of 1,247
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University