A Monitoring Tool for Personal Information Leakage Prevention in Network Packets

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Text Analysis for Monitoring Personal Information Leakage on Twitter

Social networking services (SNSs) such as Twitter and Facebook can be considered as new forms of media. Information spreads much faster through social media than any other forms of traditional news media because people can upload information with no time and location constraints. For this reason, people have embraced SNSs and allowed them to become an integral part of their everyday lives. Peop...

متن کامل

A Tool for Estimating Information Leakage

We present leakiEst, a tool that estimates how much information leaks from systems. To use leakiEst, an analyst must run a system with a range of secret values and record the outputs that may be exposed to an attacker. Our tool then estimates the amount of information leaked from the secret values to the observable outputs of the system. Importantly, our tool calculates the confidence intervals...

متن کامل

Nanotechnology and Neuroscience Convergence: A Novel Tool for Neurotransmitters Monitoring

Since neurotransmitters significantly influence the brain activity, our understanding of the human brain will remain imperfect until all aspects relating to them become clear. One of the key challenges in neuroscience researches and therapies is elucidating the mechanisms by which the neurotransmitter release take place and is regulated in quantity and in time. Despite the enormous number of st...

متن کامل

Implementing a Generalized Tool for Network Monitoring

Determining how you were attacked is essential to developing a response or countermeasure. Usually, a system or network manager presented with a successful intrusion has very little information with which to work: a possibly corrupted system log, a firewall log, and perhaps some tcpdump output. When hackers come up with a new technique for cracking a network, it often takes the security communi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: KIPS Transactions on Computer and Communication Systems

سال: 2013

ISSN: 2287-5891

DOI: 10.3745/ktccs.2013.2.11.489