Academic literature on the topic 'Threat of information leakage'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Threat of information leakage.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Threat of information leakage"
Wong, Wai Peng, Hwee Chin Tan, Kim Hua Tan, and Ming-Lang Tseng. "Human factors in information leakage: mitigation strategies for information sharing integrity." Industrial Management & Data Systems 119, no. 6 (July 8, 2019): 1242–67. http://dx.doi.org/10.1108/imds-12-2018-0546.
Full textShchelkin, Kirill E., and Gleb V. Popkov. "DETECTION OF INFORMATION LEAKAGE THREATS IN FIBER OPTICAL COMMUNICATION CHANNEL." Interexpo GEO-Siberia 6, no. 2 (July 8, 2020): 182–88. http://dx.doi.org/10.33764/2618-981x-2020-6-2-182-188.
Full textZatonatskiy, D., V. Marhasova, and N. Korogod. "INSIDER THREAT MANAGEMENT AS AN ELEMENT OF THE CORPORATE ECONOMIC SECURITY." Financial and credit activity: problems of theory and practice 1, no. 36 (February 17, 2021): 149–58. http://dx.doi.org/10.18371/fcaptp.v1i36.227690.
Full textDeshanta Ibnugraha, Prajna, Lukito Edi Nugroho, and Paulus Insap Santosa. "An Approach for Risk Estimation in Information Security Using Text Mining and Jaccard Method." Bulletin of Electrical Engineering and Informatics 7, no. 3 (September 1, 2018): 393–99. http://dx.doi.org/10.11591/eei.v7i3.847.
Full textKuznecov, Fedor. "The threat of data leakage due to insufficient attention to information security." Russian Journal of Management 10, no. 1 (April 19, 2022): 126–30. http://dx.doi.org/10.29039/2409-6024-2022-10-1-126-130.
Full textSkryl, S. V., S. S. Nikulin, A. V. Mazin, V. I. Spivak, V. O. Krylov, and V. V. Nikulina. "Methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligence." Radio industry (Russia) 30, no. 4 (December 23, 2020): 35–46. http://dx.doi.org/10.21778/2413-9599-2020-30-4-35-46.
Full textZhang, Jie, Xiao Dan Guan, Yan Sun, and Xue Jie Wei. "Study on Oil Pipeline Leakage Detection Based on Stress Wave Detection Technique and Wavelet Analysis." Advanced Materials Research 694-697 (May 2013): 1368–71. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.1368.
Full textAnjaria, Kushal, and Arun Mishra. "Quantitative analysis of information leakage in service-oriented architecture-based Web services." Kybernetes 46, no. 3 (March 6, 2017): 479–500. http://dx.doi.org/10.1108/k-07-2016-0178.
Full textMohammad Kootiani, A. Zadali, and P. Abedi. "Investigation Role of Sbox to Leakage DPA Information for TDES in FPGA Targets." Applied Mechanics and Materials 256-259 (December 2012): 2820–25. http://dx.doi.org/10.4028/www.scientific.net/amm.256-259.2820.
Full textHu, Teng, Bangzhou Xin, Xiaolei Liu, Ting Chen, Kangyi Ding, and Xiaosong Zhang. "Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats." Sensors 20, no. 18 (September 16, 2020): 5297. http://dx.doi.org/10.3390/s20185297.
Full textDissertations / Theses on the topic "Threat of information leakage"
Dlamini, Moses Thandokuhle. "Combating Data Leakage in the Cloud." Thesis, University of Pretoria, 2020. http://hdl.handle.net/2263/73245.
Full textThesis (PhD)--University of Pretoria, 2020.
Computer Science
PhD
Unrestricted
Лобанов, Сергій Олександрович. "Удосконалені методи автентифікації в системах обміну миттєвими повідомленнями." Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/27191.
Full textThe work includes 104 pages, 2 images, 16 links and 25 tables. The object of research are user authentication and their messages authentication based on extracted behavioral patterns during communication at instant messaging services. The subject of this qualification is multifactor authentication methods and improvement approaches for machine learning classification methods of user messages authentication by analyzing the characteristics of dialogue in order to use the key features of dialogue in the applications of instant messaging. The aim of this qualification work is improvement of security of instant messaging systems by building of mechanism with reliable methods of user authentication and improved messages authentication methods for prevention of information leakage based on extracted behavioral patterns of users during communication at instant messaging services. Methods of research are analysis and comparison of multifactor authentication methods for users and messages based on user behavioral patterns extraction by analyzing of user dialogues during messaging, building of mechanism for user and message authentication. The result of the work is a system with the multifactor authentication and improved messages authentication information leakage prevention during instant messaging.
Khan, Ajmal. "School Shooting : Threat Detection and Classification in Textual Leakage." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-207622.
Full textSmith, Adam (Adam Davidson) 1977. "Maintaining secrecy when information leakage is unavoidable." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/28744.
Full textIncludes bibliographical references (p. 109-115).
(cont.) We apply the framework to get new results, creating (a) encryption schemes with very short keys, and (b) hash functions that leak no information about their input, yet-paradoxically-allow testing if a candidate vector is close to the input. One of the technical contributions of this research is to provide new, cryptographic uses of mathematical tools from complexity theory known as randomness extractors.
Sharing and maintaining long, random keys is one of the central problems in cryptography. This thesis provides about ensuring the security of a cryptographic key when partial information about it has been, or must be, leaked to an adversary. We consider two basic approaches: 1. Extracting a new, shorter, secret key from one that has been partially compromised. Specifically, we study the use of noisy data, such as biometrics and personal information, as cryptographic keys. Such data can vary drastically from one measurement to the next. We would like to store enough information to handle these variations, without having to rely on any secure storage-in particular, without storing the key itself in the clear. We solve the problem by casting it in terms of key extraction. We give a precise definition of what "security" should mean in this setting, and design practical, general solutions with rigorous analyses. Prior to this work, no solutions were known with satisfactory provable security guarantees. 2. Ensuring that whatever is revealed is not actually useful. This is most relevant when the key itself is sensitive-for example when it is based on a person's iris scan or Social Security Number. This second approach requires the user to have some control over exactly what information is revealed, but this is often the case: for example, if the user must reveal enough information to allow another user to correct errors in a corrupted key. How can the user ensure that whatever information the adversary learns is not useful to her? We answer by developing a theoretical framework for separating leaked information from useful information. Our definition strengthens the notion of entropic security, considered before in a few different contexts.
by Adam Davison Smith.
Ph.D.
LUO, Huajiang. "Information leakage and sharing in decentralized systems." Digital Commons @ Lingnan University, 2018. https://commons.ln.edu.hk/otd/35.
Full textWampler, Christopher. "Information leakage in encrypted IP video traffic." Thesis, Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/54287.
Full textMartinez, Antonio. "Information management and the biological warfare threat." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://sirsi.nps.navy.mil/uhtbin/hyperion-image/02Mar%5FMartinez.pdf.
Full textLUO, Huajiang. "Information leakage and Stackelberg leadership in Cournot competition." Digital Commons @ Lingnan University, 2015. https://commons.ln.edu.hk/cds_etd/12.
Full textWoods, Richard David. "Collective responses to acoustic threat information in jackdaws." Thesis, University of Exeter, 2016. http://hdl.handle.net/10871/25978.
Full textOgren, Joel G. Langevin James R. "Responding to the threat of cyberterrorism through information assurance /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA366792.
Full text"June 1999". Thesis advisor(s): John S. Osmundson, Timothy J. Shimeall. Includes bibliographical references (p. 69-73). Also available online.
Books on the topic "Threat of information leakage"
Liu, Taikang, and Yongmei Li. Electromagnetic Information Leakage and Countermeasure Technique. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-10-4352-9.
Full textReinikka, Ritva. Explaining leakage of public funds. Washington, D.C: World Bank, Public Services for Human Development, Development Research Group, 2001.
Find full textReinikka, Ritva. Explaining leakage of public funds. Helsinki: United Nations University, World Institute for Development Economics Research, 2001.
Find full textBoni, William C. Netspionage: The global threat to information. Boston: Butterworth-Heinemann, 2000.
Find full textYuval, Elovici, Rokach Lior, and SpringerLink (Online service), eds. A Survey of Data Leakage Detection and Prevention Solutions. Boston, MA: Springer US, 2012.
Find full textSchrader, Stephan. Informal technology transfer between companies: Information leakage or know-how trading? Cambridge, Mass: Alfred P. Sloan School of Management, Massachusetts Institute of Technology, 1989.
Find full textHadden, Lawrence. Upper-limit indicator targeting and age-based nutritional interventions: Optimality, information and leakage. Coventry: University of Warwick, Development Economics Research Centre, 1991.
Find full textYoshihara, Toshi. Chinese information warfare: A phantom menace or emerging threat? [Carlisle Barracks, PA]: Strategic Studies Institute, U.S. Army War College, 2001.
Find full textJoint Special Operations University (U.S.), ed. Disrupting threat finances: Using financial information to disrupt terrorist organizations. Hurlburt Field, Fla: JSOU Press, 2008.
Find full textAnis, Mohab. Multi-threshold CMOS digital circuits: Managing leakage power. Boston, MA: Kluwer Academic Publishers, 2004.
Find full textBook chapters on the topic "Threat of information leakage"
Patel, Sarvar. "Information leakage in encrypted key exchange." In Network Threats, 33–40. Providence, Rhode Island: American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/04.
Full textShumilina, Vera, and Elena Tetunashvili. "INFORMATION SECURITY AS A COMPONENT OF THE ECONOMIC SECURITY OF THE ENTERPRISE." In Business security management in modern conditions, 119–29. au: AUS PUBLISHERS, 2021. http://dx.doi.org/10.26526/chapter_60258635b4a2f5.44169199.
Full textTang, Yujia, Chang Xu, Can Zhang, Yan Wu, and Liehuang Zhu. "Analysis of Address Linkability in Tornado Cash on Ethereum." In Communications in Computer and Information Science, 39–50. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9229-1_3.
Full textAlvim, Mário S., Konstantinos Chatzikokolakis, Yusuke Kawamoto, and Catuscia Palamidessi. "Information Leakage Games." In Lecture Notes in Computer Science, 437–57. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68711-7_23.
Full textMalavena, Gerardo. "Modeling of GIDL–Assisted Erase in 3–D NAND Flash Memory Arrays and Its Employment in NOR Flash–Based Spiking Neural Networks." In Special Topics in Information Technology, 43–53. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-85918-3_4.
Full textLiu, Taikang, and Yongmei Li. "Electromagnetic Information Leakage Testing." In Electromagnetic Information Leakage and Countermeasure Technique, 195–215. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-10-4352-9_8.
Full textAlvim, Mário S., Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, and Geoffrey Smith. "Posterior vulnerability and leakage." In The Science of Quantitative Information Flow, 71–100. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-96131-6_5.
Full textStandaert, François-Xavier, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, and Elisabeth Oswald. "Leakage Resilient Cryptography in Practice." In Information Security and Cryptography, 99–134. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14452-3_5.
Full textChatzikokolakis, Konstantinos, Tom Chothia, and Apratim Guha. "Statistical Measurement of Information Leakage." In Tools and Algorithms for the Construction and Analysis of Systems, 390–404. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12002-2_33.
Full textKong, Guangwen, Sampath Rajagopalan, and Hao Zhang. "Information Leakage in Supply Chains." In Springer Series in Supply Chain Management, 313–41. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32441-8_15.
Full textConference papers on the topic "Threat of information leakage"
Wu, Jiangjiang, Jie Zhou, Jun Ma, Songzhu Mei, and Jiangchun Ren. "An Active Data Leakage Prevention Model for Insider Threat." In 2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing (IPTC). IEEE, 2011. http://dx.doi.org/10.1109/iptc.2011.17.
Full textZick, Kenneth M., Sen Li, and Matthew French. "High-precision self-characterization for the LUT burn-in information leakage threat." In 2014 24th International Conference on Field Programmable Logic and Applications (FPL). IEEE, 2014. http://dx.doi.org/10.1109/fpl.2014.6927475.
Full textLechler, Thomas, Susanne Wetzel, and Richard Jankowski. "Identifying and Evaluating the Threat of Transitive Information Leakage in Healthcare Systems." In 2011 44th Hawaii International Conference on System Sciences (HICSS 2011). IEEE, 2011. http://dx.doi.org/10.1109/hicss.2011.230.
Full textLiu, Zhenyi, Philip Smith, and Qing Hui. "Contaminant Detection and Localization With Design of Experiment and Response Surface Methodology." In ASME 2014 Dynamic Systems and Control Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/dscc2014-5950.
Full textMoore, J. Jeffrey. "Three-Dimensional CFD Rotordynamic Analysis of Gas Labyrinth Seals." In ASME 2001 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2001. http://dx.doi.org/10.1115/detc2001/vib-21394.
Full textDoering, S., M. Seitz, U. Zimmermann, P. Rodger, and W. Werner. "Analysis of Deep Trench Node Leakage Depth by Applying Current Imaging Technique at Silicon Level." In ISTFA 2008. ASM International, 2008. http://dx.doi.org/10.31399/asm.cp.istfa2008p0209.
Full textJolly, Pascal, and Luc Marchand. "Leakage Predictions for Static Gasket Based on the Porous Media Theory." In ASME 2006 Pressure Vessels and Piping/ICPVT-11 Conference. ASMEDC, 2006. http://dx.doi.org/10.1115/pvp2006-icpvt-11-93401.
Full textShiau, Chao-Cheng, Izzet Sahin, Nian Wang, Je-Chin Han, Hongzhou Xu, and Michael Fox. "Turbine Vane Endwall Film Cooling Comparison From Five Film-Hole Design Patterns and Three Upstream Leakage Injection Angles." In ASME Turbo Expo 2018: Turbomachinery Technical Conference and Exposition. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/gt2018-75272.
Full textRehder, Hans-Ju¨rgen, and Axel Dannhauer. "Experimental Investigation of Turbine Leakage Flows on the 3D Flow Field and End Wall Heat Transfer." In ASME Turbo Expo 2006: Power for Land, Sea, and Air. ASMEDC, 2006. http://dx.doi.org/10.1115/gt2006-90173.
Full textXu, Susan S., Zhipeng Lei, Ziqing Zhuang, and Michael Bergman. "Computational Fluid Dynamics Simulation of Flow of Exhaled Particles From Powered-Air Purifying Respirators." In ASME 2019 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/detc2019-97826.
Full textReports on the topic "Threat of information leakage"
Johnson, Christopher S., Mark Lee Badger, David A. Waltermire, Julie Snyder, and Clem Skorupka. Guide to Cyber Threat Information Sharing. National Institute of Standards and Technology, October 2016. http://dx.doi.org/10.6028/nist.sp.800-150.
Full textAnderson, Emory A., Cynthia E. Irvine, and Roger R. Schell. Subversion as a Threat in Information Warfare. Fort Belvoir, VA: Defense Technical Information Center, June 2004. http://dx.doi.org/10.21236/ada435312.
Full textPearcy, Richard E. The Information Warfare Threat to Air Expeditionary Forces. Fort Belvoir, VA: Defense Technical Information Center, February 2000. http://dx.doi.org/10.21236/ada378513.
Full textThiruvathukal, George K. Ad Hoc Human Information Nets for Asymmetric Threat Surveillance. Fort Belvoir, VA: Defense Technical Information Center, June 2003. http://dx.doi.org/10.21236/ada416466.
Full textLasley, Jennifer. Denial and Deception: A Serious Threat to Information Superiority? Fort Belvoir, VA: Defense Technical Information Center, April 2000. http://dx.doi.org/10.21236/ada431704.
Full textYoshihara, Toshi. Chinese Information Warfare: A Phantom Menace or Emerging Threat. Fort Belvoir, VA: Defense Technical Information Center, November 2001. http://dx.doi.org/10.21236/ada397266.
Full textMcKeown, Wendell B. Information Operations: Countering the Asymmetric Threat to the United States. Fort Belvoir, VA: Defense Technical Information Center, April 1999. http://dx.doi.org/10.21236/ada363692.
Full textThompson, Herbert H., and James A. Whittaker. Information Centric Security: Innovative Protections to Mitigate the Insider Threat. Fort Belvoir, VA: Defense Technical Information Center, February 2004. http://dx.doi.org/10.21236/ada421489.
Full textThomas, Cathy H. The Dissemination of Terrorist Threat Information: Who Should Be Warned. Fort Belvoir, VA: Defense Technical Information Center, May 1990. http://dx.doi.org/10.21236/ada220703.
Full textWarren, Paul S. A New Kind of War: Adaptive Threat Doctrine and Information Operations. Fort Belvoir, VA: Defense Technical Information Center, February 2001. http://dx.doi.org/10.21236/ada395701.
Full text