Journal articles on the topic 'Threat of information leakage'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Threat of information leakage.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wong, Wai Peng, Hwee Chin Tan, Kim Hua Tan, and Ming-Lang Tseng. "Human factors in information leakage: mitigation strategies for information sharing integrity." Industrial Management & Data Systems 119, no. 6 (July 8, 2019): 1242–67. http://dx.doi.org/10.1108/imds-12-2018-0546.
Full textShchelkin, Kirill E., and Gleb V. Popkov. "DETECTION OF INFORMATION LEAKAGE THREATS IN FIBER OPTICAL COMMUNICATION CHANNEL." Interexpo GEO-Siberia 6, no. 2 (July 8, 2020): 182–88. http://dx.doi.org/10.33764/2618-981x-2020-6-2-182-188.
Full textZatonatskiy, D., V. Marhasova, and N. Korogod. "INSIDER THREAT MANAGEMENT AS AN ELEMENT OF THE CORPORATE ECONOMIC SECURITY." Financial and credit activity: problems of theory and practice 1, no. 36 (February 17, 2021): 149–58. http://dx.doi.org/10.18371/fcaptp.v1i36.227690.
Full textDeshanta Ibnugraha, Prajna, Lukito Edi Nugroho, and Paulus Insap Santosa. "An Approach for Risk Estimation in Information Security Using Text Mining and Jaccard Method." Bulletin of Electrical Engineering and Informatics 7, no. 3 (September 1, 2018): 393–99. http://dx.doi.org/10.11591/eei.v7i3.847.
Full textKuznecov, Fedor. "The threat of data leakage due to insufficient attention to information security." Russian Journal of Management 10, no. 1 (April 19, 2022): 126–30. http://dx.doi.org/10.29039/2409-6024-2022-10-1-126-130.
Full textSkryl, S. V., S. S. Nikulin, A. V. Mazin, V. I. Spivak, V. O. Krylov, and V. V. Nikulina. "Methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligence." Radio industry (Russia) 30, no. 4 (December 23, 2020): 35–46. http://dx.doi.org/10.21778/2413-9599-2020-30-4-35-46.
Full textZhang, Jie, Xiao Dan Guan, Yan Sun, and Xue Jie Wei. "Study on Oil Pipeline Leakage Detection Based on Stress Wave Detection Technique and Wavelet Analysis." Advanced Materials Research 694-697 (May 2013): 1368–71. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.1368.
Full textAnjaria, Kushal, and Arun Mishra. "Quantitative analysis of information leakage in service-oriented architecture-based Web services." Kybernetes 46, no. 3 (March 6, 2017): 479–500. http://dx.doi.org/10.1108/k-07-2016-0178.
Full textMohammad Kootiani, A. Zadali, and P. Abedi. "Investigation Role of Sbox to Leakage DPA Information for TDES in FPGA Targets." Applied Mechanics and Materials 256-259 (December 2012): 2820–25. http://dx.doi.org/10.4028/www.scientific.net/amm.256-259.2820.
Full textHu, Teng, Bangzhou Xin, Xiaolei Liu, Ting Chen, Kangyi Ding, and Xiaosong Zhang. "Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats." Sensors 20, no. 18 (September 16, 2020): 5297. http://dx.doi.org/10.3390/s20185297.
Full textOzhiganova, Marina, Anastasia Kalita, and Yevgeny Tishchenko. "Building Adaptive Information Security Systems." NBI Technologies, no. 4 (February 2020): 12–21. http://dx.doi.org/10.15688/nbit.jvolsu.2019.4.2.
Full textRenaud, Karen, and Wendy Goucher. "Monkey See - Monkey Take Photo." International Journal of Cyber Warfare and Terrorism 3, no. 4 (October 2013): 40–51. http://dx.doi.org/10.4018/ijcwt.2013100105.
Full textChoi, Donghee, Dohoon Kim, and Seog Park. "A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems." Computational and Mathematical Methods in Medicine 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/265132.
Full textZeng, Zhen, and Jiajia Zhang. "Based on the Role of Internet of Things Security in the Management of Enterprise Human Resource Information Leakage." Wireless Communications and Mobile Computing 2021 (October 5, 2021): 1–12. http://dx.doi.org/10.1155/2021/5936390.
Full textLifshits, Pavel, Roni Forte, Yedid Hoshen, Matt Halpern, Manuel Philipose, Mohit Tiwari, and Mark Silberstein. "Power to peep-all: Inference Attacks by Malicious Batteries on Mobile Devices." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (October 1, 2018): 141–58. http://dx.doi.org/10.1515/popets-2018-0036.
Full textV. Grishachev, Vladimir. "Detecting Threats of Acoustic Information Leakage Through Fiber Optic Communications." Journal of Information Security 03, no. 02 (2012): 149–55. http://dx.doi.org/10.4236/jis.2012.32017.
Full textRogozin, E. A., R. E. Rogozin, D. G. Silka, I. D. Korobkin, and M. O. Meshcheryakov. "Investigation of side electromagnetic radiation generated during the operation of devices with sensory input of information." Herald of Dagestan State Technical University. Technical Sciences 48, no. 3 (November 9, 2021): 83–92. http://dx.doi.org/10.21822/2073-6185-2021-48-3-83-92.
Full textSeo, Sang, and Dohoon Kim. "Study on Inside Threats Based on Analytic Hierarchy Process." Symmetry 12, no. 8 (July 29, 2020): 1255. http://dx.doi.org/10.3390/sym12081255.
Full textCasati, Luca, and Andrea Visconti. "The Dangers of Rooting: Data Leakage Detection in Android Applications." Mobile Information Systems 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/6020461.
Full textZhang, Pu Han, Jing Zhe Li, Shuai Shao, and Peng Wang. "PDroid: Detecting Privacy Leakage on Android." Applied Mechanics and Materials 556-562 (May 2014): 2658–62. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.2658.
Full textKang, Haiyan, Yanhang Xiao, and Jie Yin. "An Intelligent Detection Method of Personal Privacy Disclosure for Social Networks." Security and Communication Networks 2021 (April 23, 2021): 1–11. http://dx.doi.org/10.1155/2021/5518220.
Full textChristos P, Beretas. "Industrial control systems: The biggest cyber threat." Annals of Civil and Environmental Engineering 4, no. 1 (December 4, 2020): 044–46. http://dx.doi.org/10.29328/journal.acee.1001026.
Full textKhandare, Miss Komal K. "Various Privacy and Security Issues in Online Social Networks." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 142–46. http://dx.doi.org/10.22214/ijraset.2021.39203.
Full textSkryl, S. V., A. V. Mazin, T. V. Meshcheryakova, A. V. Kalach, M. V. Ponomarev, and O. A. Gulyaev. "Prevention of information leakage through channels of spurious electromagnetic radiation and interference: research models." Radio industry (Russia) 31, no. 2 (July 7, 2021): 22–34. http://dx.doi.org/10.21778/2413-9599-2021-31-2-22-34.
Full textWu, Bingzhe, Chaochao Chen, Shiwan Zhao, Cen Chen, Yuan Yao, Guangyu Sun, Li Wang, Xiaolu Zhang, and Jun Zhou. "Characterizing Membership Privacy in Stochastic Gradient Langevin Dynamics." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (April 3, 2020): 6372–79. http://dx.doi.org/10.1609/aaai.v34i04.6107.
Full textKorochentsev, D., L. Cherckesova, and P. Razumov. "Development of a software tool for identification of information security information threats arising due to low–frequency acoustoelectric transformations." E3S Web of Conferences 224 (2020): 01042. http://dx.doi.org/10.1051/e3sconf/202022401042.
Full textNakamura, Ko, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone. "Information Leakage Threats for Cryptographic Devices Using IEMI and EM Emission." IEEE Transactions on Electromagnetic Compatibility 60, no. 5 (October 2018): 1340–47. http://dx.doi.org/10.1109/temc.2017.2766139.
Full textDu, Ruizhong, Yuqing Zhang, and Mingyue Li. "Database Padding for Dynamic Symmetric Searchable Encryption." Security and Communication Networks 2021 (December 31, 2021): 1–12. http://dx.doi.org/10.1155/2021/9703969.
Full textRogozin, E. A., D. G. Silka, and O. A. Gulyaev. "METHODOLOGY FOR ASSESSING THE SECURITY OF INFORMATION PASSED THROUGH THE TECHNICAL CHANNELS OF A SPECIAL-PURPOSE INFORMATISATION OBJECT." Herald of Dagestan State Technical University. Technical Sciences 46, no. 4 (January 2, 2020): 123–33. http://dx.doi.org/10.21822/2073-6185-2019-46-4-123-133.
Full textMiao, Yuantian, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, and Yang Xiang. "Machine Learning–based Cyber Attacks Targeting on Controlled Information." ACM Computing Surveys 54, no. 7 (July 2021): 1–36. http://dx.doi.org/10.1145/3465171.
Full textSekiguchi, Hidenori. "NOVEL INFORMATION LEAKAGE THREAT FOR INPUT OPERATIONS ON TOUCH SCREEN MONITORS CAUSED BY ELECTROMAGNETIC NOISE AND ITS COUNTERMEASURE METHOD." Progress In Electromagnetics Research B 36 (2012): 399–419. http://dx.doi.org/10.2528/pierb11101201.
Full textHamzah, Intan Suria. "Keselamatan Peribadi di Facebook: Ancaman dan Penyelesaian." Jurnal Komunikasi: Malaysian Journal of Communication 37, no. 1 (March 31, 2021): 379–95. http://dx.doi.org/10.17576/jkmjc-2021-3701-22.
Full textPrytys, V. I., L. А. Krymchak, and N. I. Havlovska. "Leakage of Information as a Key Problem of Information-Analytical Provision of Economic Security of Enterprise in the Context of Digitalization of the Economy." Business Inform 10, no. 513 (2020): 240–47. http://dx.doi.org/10.32983/2222-4459-2020-10-240-247.
Full textVassilakis, Costas. "Blockchain technologies for leveraging security and privacy." Homo Virtualis 2, no. 1 (March 27, 2019): 7. http://dx.doi.org/10.12681/homvir.20188.
Full textSkryl, S. V., M. P. Sychev, A. V. Mazin, T. V. Meshcheryakova, O. A. Gulyaev, and I. M. Tegentsev. "Directions for the development of the existing concept of assessing the relevance of information leakage through technical channels in the current trends of improving technical intelligence." Radio industry (Russia) 31, no. 1 (April 7, 2021): 74–83. http://dx.doi.org/10.21778/2413-9599-2021-31-1-74-83.
Full textFadaeinia, Bijan, Thorben Moos, and Amir Moradi. "Balancing the Leakage Currents in Nanometer CMOS Logic—A Challenging Goal." Applied Sciences 11, no. 15 (August 2, 2021): 7143. http://dx.doi.org/10.3390/app11157143.
Full textDzhulij, V. M., V. A. Boychuk, V. Y. Titova, O. V. Selyukov, and O. V. Miroshnichenko. "PROTECTION MODELS AND METHODS AGAINST THREATED PROGRAMS INFORMATION SYSTEMS." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 67 (2020): 72–84. http://dx.doi.org/10.17721/2519-481x/2020/67-08.
Full textHu, Xiao-yang, Kai-yan Chen, Yang Zhang, Dong-xin Guo, and Yan-hai Wei. "Research on Electromagnetic Side-channel Signal Extraction for Mobile Device PCM-9589F Multi-COM." MATEC Web of Conferences 232 (2018): 04022. http://dx.doi.org/10.1051/matecconf/201823204022.
Full textGoli, Mehran, Muhammad Hassan, Daniel Große, and Rolf Drechsler. "Security validation of VP-based SoCs using dynamic information flow tracking." it - Information Technology 61, no. 1 (February 25, 2019): 45–58. http://dx.doi.org/10.1515/itit-2018-0027.
Full textBelokurov, S. V., Y. E. Lvovich, S. V. Ivanov, and A. N. Noev. "Mathematical modeling of mechanisms for detecting threats of information leakage through parametric channels." Journal of Physics: Conference Series 1202 (April 2019): 012012. http://dx.doi.org/10.1088/1742-6596/1202/1/012012.
Full textOnik, Md Mehedi Hassan, Chul-Soo Kim, Nam-Yong Lee, and Jinhong Yang. "Personal Information Classification on Aggregated Android Application’s Permissions." Applied Sciences 9, no. 19 (September 24, 2019): 3997. http://dx.doi.org/10.3390/app9193997.
Full textFabšič, Tomáš, Ondrej Gallo, and Viliam Hromada. "Simple Power Analysis Attack on the QC-LDPC McEliece Cryptosystem." Tatra Mountains Mathematical Publications 67, no. 1 (September 1, 2016): 85–92. http://dx.doi.org/10.1515/tmmp-2016-0032.
Full textChatel, Sylvain, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, and Jean-Pierre Hubaux. "SoK: Privacy-Preserving Collaborative Tree-based Model Learning." Proceedings on Privacy Enhancing Technologies 2021, no. 3 (April 27, 2021): 182–203. http://dx.doi.org/10.2478/popets-2021-0043.
Full textZhou, Yousheng, Xinyun Chen, and Meihuan Chen. "Privacy-Preserving Multidimensional Data Aggregation Scheme for Smart Grid." Security and Communication Networks 2020 (December 3, 2020): 1–14. http://dx.doi.org/10.1155/2020/8845959.
Full textSelifanov, Valentin, Oksana Ermak, Anna Yakunina, and Karina Yarkova. "ANALYSIS OF THE DEVELOPMENT OF MEANS OF INFORMATION PROTECTION." Interexpo GEO-Siberia 9 (2019): 25–29. http://dx.doi.org/10.33764/2618-981x-2019-9-25-29.
Full textKolomoets, E. "Ensuring information security in the field of remote work." Journal of Physics: Conference Series 2210, no. 1 (March 1, 2022): 012008. http://dx.doi.org/10.1088/1742-6596/2210/1/012008.
Full textTershukov, Dmitry. "Analysis of Modern Information Security Threats." NBI Technologies, no. 3 (January 2019): 6–12. http://dx.doi.org/10.15688/nbit.jvolsu.2018.3.1.
Full textGu, Jingjing, Ruicong Huang, Li Jiang, Gongzhe Qiao, Xiaojiang Du, and Mohsen Guizani. "A Fog Computing Solution for Context-Based Privacy Leakage Detection for Android Healthcare Devices." Sensors 19, no. 5 (March 8, 2019): 1184. http://dx.doi.org/10.3390/s19051184.
Full textBabenko, Aleksey, and Svetlana Kozunova. "The Model of Information Security Control in State Information Systems." NBI Technologies, no. 4 (February 2019): 16–22. http://dx.doi.org/10.15688/nbit.jvolsu.2018.4.3.
Full textAnjaria, Kushal, and Arun Mishra. "Thread scheduling using ant colony optimization: An intelligent scheduling approach towards minimal information leakage." Karbala International Journal of Modern Science 3, no. 4 (December 2017): 241–58. http://dx.doi.org/10.1016/j.kijoms.2017.08.003.
Full text