Добірка наукової літератури з теми "Threat of information leakage"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Threat of information leakage".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Threat of information leakage"

1

Wong, Wai Peng, Hwee Chin Tan, Kim Hua Tan, and Ming-Lang Tseng. "Human factors in information leakage: mitigation strategies for information sharing integrity." Industrial Management & Data Systems 119, no. 6 (July 8, 2019): 1242–67. http://dx.doi.org/10.1108/imds-12-2018-0546.

Повний текст джерела
Анотація:
Purpose The purpose of this paper is to explore the human factors triggering information leakage and investigate how companies mitigate insider threat for information sharing integrity. Design/methodology/approach The methodology employed is multiple case studies approach with in-depth interviews with five multinational enterprises (MNEs)/multinational corporations (MNCs). Findings The findings reveal that information leakage can be approached with human governance mechanism such as organizational ethical climate and information security culture. Besides, higher frequency of leakages negatively affects information sharing integrity. Moreover, this paper also contributes to a research framework which could be a guide to overcome information leakage issue in information sharing. Research limitations/implications The current study involved MNCs/MNEs operating in Malaysia, while companies in other countries may have different ethical climate and information sharing culture. Thus, for future research, it will be good to replicate the study in a larger geographic region to verify the findings and insights of this research. Practical implications This research contributes to the industry and business that are striving toward solving the mounting problem of information leakage by raising awareness of human factors and to take appropriate mitigating governance strategies to pre-empt information leakage. This paper also contributes to a novel theoretical model that characterizes the iniquities of humans in sharing information, and suggests measures which could be a guide to avert disruptive leakages. Originality/value This paper is likely an unprecedented research in molding human governance in the domain of information sharing and its Achilles’ heel which is information leakage.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Shchelkin, Kirill E., and Gleb V. Popkov. "DETECTION OF INFORMATION LEAKAGE THREATS IN FIBER OPTICAL COMMUNICATION CHANNEL." Interexpo GEO-Siberia 6, no. 2 (July 8, 2020): 182–88. http://dx.doi.org/10.33764/2618-981x-2020-6-2-182-188.

Повний текст джерела
Анотація:
The paper discusses the possibility of detecting an information leakage channel in standard fiber-optic communications by monitoring optical radiation. Any abnormal light emission can create a potential threat of speech information leakage, as well as regular light streams modulated at acoustic frequencies.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Zatonatskiy, D., V. Marhasova, and N. Korogod. "INSIDER THREAT MANAGEMENT AS AN ELEMENT OF THE CORPORATE ECONOMIC SECURITY." Financial and credit activity: problems of theory and practice 1, no. 36 (February 17, 2021): 149–58. http://dx.doi.org/10.18371/fcaptp.v1i36.227690.

Повний текст джерела
Анотація:
This paper considers the insider threats in the companies from different sectors and various methods of their assessment. The problem of information leakage is becoming increasingly important for companies in all areas of economic activity. The problem of insider threats is becoming increasingly important, as the company may incur losses not only due to the leakage of information about its inventions, but also through lawsuits in case of theft of personal information of the customers, contractors and more. This means that in order to gain access to the international markets, Ukrainian companies must have an appropriate level of protection not only of the company’s confidential information, but also of the data on customers, contractors, etc. The objective of the article is to analyze the existing methodological approaches to the assessment of insider threats in the enterprise as a component of personnel and economic security. We came to the conclusion that different industries have different vulnerabilities to insider threats and different approaches to insider threat management. It was determined that information leaks are a serious threat to the company’s economic and personnel security. It was discovered that firms have achieved significant improvements and developed effective procedures for counteracting external threats, however, protection against insider attacks remains rather low. In the course of the research, the concept of an insider attacker was defined, the types of insider threats were established, and the main actions of the personnel prior to the insider attack were outlined. It was proved that the degree of insider threat is determined by the type of activity of the company and the liquidity of information that may be leaked. Most leaks are observed in high-tech companies and medical institutions, while the most liquid is the information of banks, financial institutions, industrial and commercial companies.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Deshanta Ibnugraha, Prajna, Lukito Edi Nugroho, and Paulus Insap Santosa. "An Approach for Risk Estimation in Information Security Using Text Mining and Jaccard Method." Bulletin of Electrical Engineering and Informatics 7, no. 3 (September 1, 2018): 393–99. http://dx.doi.org/10.11591/eei.v7i3.847.

Повний текст джерела
Анотація:
Involvement of digital information in almost of enterprise sectors makes information having value that must be protected from information leakage. In order to obtain proper method for protecting sensitive information, enterprise must perform risk analysis of threat. However, enterprises often get limitation in measuring risk related information security threat. Therefore, this paper has goal to give approach for estimating risk by using information value. Techniques for measuring information value in this paper are text mining and Jaccard method. Text mining is used to recognize information pattern based on three classes namely high business impact, medium business impact and low business impact. Furthermore, information is given weight by Jaccard method. The weight represents risk levelof information leakage in enterprise quantitatively. Result of comparative analysis with existing method show that proposed method results more detailed output in estimating risk of information security threat.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Kuznecov, Fedor. "The threat of data leakage due to insufficient attention to information security." Russian Journal of Management 10, no. 1 (April 19, 2022): 126–30. http://dx.doi.org/10.29039/2409-6024-2022-10-1-126-130.

Повний текст джерела
Анотація:
The article discusses the main problems of data leakage in firms, formulates the basic principles of rationalization, including in the context of vectors of awareness development in the field of information security. The importance of expanding the budget allocated for the development of information security, interaction with employees responsible for information security at the facility, employees of the personnel department was noted. Emphasis is placed on the need to develop indicators of insider data compromise in order to develop a data traceability system. At the conclusion of the work, conclusions are drawn and proposals are formulated for the modernization of the information security system.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Skryl, S. V., S. S. Nikulin, A. V. Mazin, V. I. Spivak, V. O. Krylov, and V. V. Nikulina. "Methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligence." Radio industry (Russia) 30, no. 4 (December 23, 2020): 35–46. http://dx.doi.org/10.21778/2413-9599-2020-30-4-35-46.

Повний текст джерела
Анотація:
Formulation of the problem. The completeness of the characteristics of one of the most serious threats to the security of information today – its leakage through the transient electromagnetic pulse emanation standard (TEMPEST) from computer equipment (CE) is determined not only by the number of detectable signs of leakage but also by several other parameters characterizing the dynamics of the implementation of such a threat. The established patterns in the scenarios of violators’ actions associated with the use of technical reconnaissance equipment (TRQ) to intercept informative TEMPEST signals from computer equipment made it possible to form a model of all possible options for using TRQ to obtain confidential information processed by computer equipment. The proposed model provides the implementation of the methodological principles of the recognition theory for a more complete characterization of threats of information leakage through the channels of spurious electromagnetic radiation and interference from CE in the process of their detection.Objective. Development of methodological grounds for presenting signs of the violator’s implementation of certain functions associated with the use of technical reconnaissance equipment to intercept informative signals of spurious electromagnetic radiation and interference from computer equipment as signs that identify the most significant conditions for the recognition and prevention of such threats.Results. Methodological solutions for the identification of three states significant for the prevention of threats are given based on the structuring of the functional representation of the intruder’s actions to implement such threats. Mathematical models for assessing the predicted amount of information disclosed in the process of intercepting TEMPEST informative signals from computer equipment, and assessing the level of security threats in case of interception of information are also presented.Practical significance. The paper presents the main options for the operation of a complex of programs for recognizing threats of information leakage through TEMPEST channels from computer equipment developed within the framework of the presented methodology.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Zhang, Jie, Xiao Dan Guan, Yan Sun, and Xue Jie Wei. "Study on Oil Pipeline Leakage Detection Based on Stress Wave Detection Technique and Wavelet Analysis." Advanced Materials Research 694-697 (May 2013): 1368–71. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.1368.

Повний текст джерела
Анотація:
Based on stress wave detection technique and wavelet analysis, oil pipeline leakage detection system is designed. Through vibration sensor put on the pipeline, vibration signal of pipeline is collected. The signal is used to preliminary assessment with DSP processing unit within the system, and then the feature of threat events is extracted. The information is uploaded to the centre of security central station of system by GPRS signal. At this, signal wavelet analysis is done for leakage detection. Based on LabVIEW platform, on oil pipeline leakage monitoring interface, threat events is alarmed and shown in electronic map and the system is convenient for staff to handle with. With the test, recognized police rate of system is superior to 85%, rate of false alarm is 15% below. All knocking signal of pipeline is given right alarm information. The noise by people walk, car, wind and rain is effectively filtered.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Anjaria, Kushal, and Arun Mishra. "Quantitative analysis of information leakage in service-oriented architecture-based Web services." Kybernetes 46, no. 3 (March 6, 2017): 479–500. http://dx.doi.org/10.1108/k-07-2016-0178.

Повний текст джерела
Анотація:
Purpose Any computing architecture cannot be designed with complete confidentiality. As a result, at any point, it may leak the information. So, it is important to decide leakage threshold in any computing architecture. To prevent leakage more than the predefined threshold, quantitative analysis is helpful. This paper aims to provide a method to quantify information leakage in service-oriented architecture (SOA)-based Web services. Design/methodology/approach To visualize the dynamic binding of SOA components, first, the orchestration of components is modeled. The modeling helps to information-theoretically quantify information leakage in SOA-based Web services. Then, the paper considers the non-interference policy in a global way to quantify information leakage. It considers not only variables which interfere with security sensitive content but also other architectural parameters to quantify leakage in Web services. To illustrate the attacker’s ability, a strong threat model has been proposed in the paper. Findings The paper finds that information leakage can be quantified in SOA-based Web services by considering parameters that interfere with security sensitive content and information theory. A hypothetical case study scenario of flight ticket booking Web services has been considered in the present paper in which leakage of 18.89 per cent information is calculated. Originality/value The paper shows that it is practically possible to quantify information leakage in SOA-based Web services. While modeling the SOA-based Web services, it will be of help to architects to identify parameters which may cause the leakage of secret contents.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Mohammad Kootiani, A. Zadali, and P. Abedi. "Investigation Role of Sbox to Leakage DPA Information for TDES in FPGA Targets." Applied Mechanics and Materials 256-259 (December 2012): 2820–25. http://dx.doi.org/10.4028/www.scientific.net/amm.256-259.2820.

Повний текст джерела
Анотація:
Differential power analysis (DPA) attack is an important threat that researchers spend great effort to make crypto algorithms resistant against DPA attacks. In order to determine whether the hardware has DPA leakage before manufacturing, an accurate power model in digital simulation has been generated. FPGAs Arrays are attractive options for hardware implementation of encryption algorithms. In this paper, we show generated power model by using integer numbers whole DES’s rounds vs. S-Box alone, and this method gives more realistic results to determine the effectiveness of the improvements protect whole DES rather than in which only informer elements in the DES round. In particular this allows the user to isolate some parts of its implementation in order to analyze information leakages directly linked to them. We review s-box because it’s get 2kbit or 20% CLB slice from FPGA to implement DES or TDES. This paper try to identify role of Sbox in DPA.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Hu, Teng, Bangzhou Xin, Xiaolei Liu, Ting Chen, Kangyi Ding, and Xiaosong Zhang. "Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats." Sensors 20, no. 18 (September 16, 2020): 5297. http://dx.doi.org/10.3390/s20185297.

Повний текст джерела
Анотація:
The insider threats have always been one of the most severe challenges to cybersecurity. It can lead to the destruction of the organisation’s internal network system and information leakage, which seriously threaten the confidentiality, integrity and availability of data. To make matters worse, since the attacker has authorized access to the internal network, they can launch the attack from the inside and erase their attack trace, which makes it challenging to track and forensics. A blockchain traceability system for insider threats is proposed in this paper to mitigate the issue. First, this paper constructs an insider threat model of the internal network from a different perspective: insider attack forensics and prevent insider attacker from escaping. Then, we analyze why it is difficult to track attackers and obtain evidence when an insider threat has occurred. After that, the blockchain traceability system is designed in terms of data structure, transaction structure, block structure, consensus algorithm, data storage algorithm, and query algorithm, while using differential privacy to protect user privacy. We deployed this blockchain traceability system and conducted experiments, and the results show that it can achieve the goal of mitigating insider threats.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Threat of information leakage"

1

Dlamini, Moses Thandokuhle. "Combating Data Leakage in the Cloud." Thesis, University of Pretoria, 2020. http://hdl.handle.net/2263/73245.

Повний текст джерела
Анотація:
The increasing number of reports on data leakage incidents increasingly erodes the already low consumer confidence in cloud services. Hence, some organisations are still hesitant to fully trust the cloud with their confidential data. Therefore, this study raises a critical and challenging research question: How can we restore the damaged consumer confidence and improve the uptake and security of cloud services? This study makes a plausible attempt at unpacking and answering the research question in order to holistically address the data leakage problem from three fronts, i.e. conflict-aware virtual machine (VM) placement, strong authentication and digital forensic readiness. Consequently, this study investigates, designs and develops an innovative conceptual architecture that integrates conflict-aware VM placement, cutting-edge authentication and digital forensic readiness to strengthen cloud security and address the data leakage problem in the hope of eventually restoring consumer confidence in cloud services. The study proposes and presents a conflict-aware VM placement model. This model uses varying degrees of conflict tolerance levels, the construct of sphere of conflict and sphere of non-conflict. These are used to provide the physical separation of VMs belonging to conflicting tenants that share the same cloud infrastructure. The model assists the cloud service provider to make informed VM placement decisions that factor in their tenants’ security profile and balance it against the relevant cost constraints and risk appetite. The study also proposes and presents a strong risk-based multi-factor authentication mechanism that scales up and down, based on threat levels or risks posed on the system. This ensures that users are authenticated using the right combination of access credentials according to the risk they pose. This also ensures end-to-end security of authentication data, both at rest and in transit, using an innovative cryptography system and steganography. Furthermore, the study proposes and presents a three-tier digital forensic process model that proactively collects and preserves digital evidence in anticipation of a legal lawsuit or policy breach investigation. This model aims to reduce the time it takes to conduct an investigation in the cloud. Moreover, the three-tier digital forensic readiness process model collects all user activity in a forensically sound manner and notifies investigators of potential security incidents before they occur. The current study also evaluates the effectiveness and efficiency of the proposed solution in addressing the data leakage problem. The results of the conflict-aware VM placement model are derived from simulated and real cloud environments. In both cases, the results show that the conflict-aware VM placement model is well suited to provide the necessary physical isolation of VM instances that belong to conflicting tenants in order to prevent data leakage threats. However, this comes with a performance cost in the sense that higher conflict tolerance levels on bigger VMs take more time to be placed, compared to smaller VM instances with low conflict tolerance levels. From the risk-based multifactor authentication point of view, the results reflect that the proposed solution is effective and to a certain extent also efficient in preventing unauthorised users, armed with legitimate credentials, from gaining access to systems that they are not authorised to access. The results also demonstrate the uniqueness of the approach in that even minor deviations from the norm are correctly classified as anomalies. Lastly, the results reflect that the proposed 3-tier digital forensic readiness process model is effective in the collection and storage of potential digital evidence. This is done in a forensically sound manner and stands to significantly improve the turnaround time of a digital forensic investigation process. Although the classification of incidents may not be perfect, this can be improved with time and is considered part of the future work suggested by the researcher.
Thesis (PhD)--University of Pretoria, 2020.
Computer Science
PhD
Unrestricted
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Лобанов, Сергій Олександрович. "Удосконалені методи автентифікації в системах обміну миттєвими повідомленнями". Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/27191.

Повний текст джерела
Анотація:
Обсяг роботи 104 сторінки, 2 ілюстрації, 16 джерел літератури, 25 таблиць та 2 додатки. Об’єктом дослідження є автентифікація користувачів та їх повідомлень на основі виділених поведінкових патернах при спілкуванні в системах обміну миттєвими повідомленнями. Предметом дослідження є методи багатофакторної автентифікації та способи покращення методів машинного навчання при автентифікації повідомлень користувача за ключовими характеристиками ведення діалогу в системах обміну повідомленнями. Метою даної кваліфікаційної роботи є підвищення рівня захищеності систем обміну миттєвими повідомленнями за рахунок побудови механізму з більш надійними методами автентифікації користувачів та удосконаленими методами автентифікації повідомлення на основі виділених поведінкових патернів користувача, що дозволить знизити рівень загрози витоку інформації при обміні повідомленнями. Методами дослідження дипломної роботи є аналіз та порівняння методів автентифікації користувачів та повідомлень на основі поведінкових патернів користувача шляхом аналізу діалогів користувачів у системах обміну миттєвими повідомленнями, побудова механізму перевірки автентичності користувача і повідомлення. Результатом дипломної роботи є система з двофакторною автентифікацією користувачів та вдосконаленим механізмом автентифікації повідомлень для запобігання витоку інформації в системах обміну миттєвими повідомленнями.
The work includes 104 pages, 2 images, 16 links and 25 tables. The object of research are user authentication and their messages authentication based on extracted behavioral patterns during communication at instant messaging services. The subject of this qualification is multifactor authentication methods and improvement approaches for machine learning classification methods of user messages authentication by analyzing the characteristics of dialogue in order to use the key features of dialogue in the applications of instant messaging. The aim of this qualification work is improvement of security of instant messaging systems by building of mechanism with reliable methods of user authentication and improved messages authentication methods for prevention of information leakage based on extracted behavioral patterns of users during communication at instant messaging services. Methods of research are analysis and comparison of multifactor authentication methods for users and messages based on user behavioral patterns extraction by analyzing of user dialogues during messaging, building of mechanism for user and message authentication. The result of the work is a system with the multifactor authentication and improved messages authentication information leakage prevention during instant messaging.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Khan, Ajmal. "School Shooting : Threat Detection and Classification in Textual Leakage." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-207622.

Повний текст джерела
Анотація:
The continual occurrence of school shooting incidents underscores the need of taking preventive measures. Inductive measures of threat assessment have proved to be a bad strategy to solve the problem and new research is focusing on deductive approaches. Deductive threat assessment approaches are gaining ground and efforts are underway to mine text for automatic detection of threats in written text. Automatic detection and classification of threats in the digital world can help the decision makers focus energies on imminent threats of school shooting and take preventive measures in time to save precious lives and other resources. The contribution of this study is criticism of the previous work done on the problem of school shooting, collection of data of previous cases of school shootings in order to find out the factors that affect the school shooting problem and the development of an algorithm that could be used to detect threat of school shooting in written text in the English language. The algorithm proposed in this study classifies text on the basis of seriousness of the threat of school shooting in to four categories i.e., "High", "Medium", "Low", and "Not a threat". The seriousness of the threat is decided based on different indicators present in the text of the threat and presence of factors that has affected previous school shooters. A prototype is implemented to demonstrate the classification in to the categories mentioned above.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Smith, Adam (Adam Davidson) 1977. "Maintaining secrecy when information leakage is unavoidable." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/28744.

Повний текст джерела
Анотація:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.
Includes bibliographical references (p. 109-115).
(cont.) We apply the framework to get new results, creating (a) encryption schemes with very short keys, and (b) hash functions that leak no information about their input, yet-paradoxically-allow testing if a candidate vector is close to the input. One of the technical contributions of this research is to provide new, cryptographic uses of mathematical tools from complexity theory known as randomness extractors.
Sharing and maintaining long, random keys is one of the central problems in cryptography. This thesis provides about ensuring the security of a cryptographic key when partial information about it has been, or must be, leaked to an adversary. We consider two basic approaches: 1. Extracting a new, shorter, secret key from one that has been partially compromised. Specifically, we study the use of noisy data, such as biometrics and personal information, as cryptographic keys. Such data can vary drastically from one measurement to the next. We would like to store enough information to handle these variations, without having to rely on any secure storage-in particular, without storing the key itself in the clear. We solve the problem by casting it in terms of key extraction. We give a precise definition of what "security" should mean in this setting, and design practical, general solutions with rigorous analyses. Prior to this work, no solutions were known with satisfactory provable security guarantees. 2. Ensuring that whatever is revealed is not actually useful. This is most relevant when the key itself is sensitive-for example when it is based on a person's iris scan or Social Security Number. This second approach requires the user to have some control over exactly what information is revealed, but this is often the case: for example, if the user must reveal enough information to allow another user to correct errors in a corrupted key. How can the user ensure that whatever information the adversary learns is not useful to her? We answer by developing a theoretical framework for separating leaked information from useful information. Our definition strengthens the notion of entropic security, considered before in a few different contexts.
by Adam Davison Smith.
Ph.D.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

LUO, Huajiang. "Information leakage and sharing in decentralized systems." Digital Commons @ Lingnan University, 2018. https://commons.ln.edu.hk/otd/35.

Повний текст джерела
Анотація:
This thesis presents two essays that explore firms’ incentive to share information in a multi-period decentralized supply chain and between competing firms. In the first essay, we consider a two-period supply chain in which one manufacturer supplies to a retailer. The retailer possesses some private demand information about the uncertain demand and decides whether to share the information with manufacturer. If an information sharing agreement is achieved, the retailer will share the observed demand information truthfully to the manufacturer. Then the selling season with two periods starts. In each period, the manufacturer decides on a wholesale price, which the retailer considers when deciding on the retail price. The manufacturer can observe the retailer's period-1 decision and the realized period-1 demand, and use this information when making the period-2 wholesale price decision. Thus, without information sharing, the two firms play a two-period signaling game. We find that voluntary information sharing is not possible because it benefits the manufacturer but hurts the retailer. However, different from one-period model, in which no information sharing can be achieved even with side payment, the manufacturer can make a side payment to the retailer to induce information sharing when the demand range is small. Both firms benefit from more accurate information regardless whether the retailer shares information. We also extend the two-period model to three-period model and infinite-period model, we find that the above results are robust. The second essay studies the incentives for information sharing between two competing firms with different production timing strategies. Each firm is planning to produce a new (upgraded) product. One firm adopts routine timing, whereby her production time is fixed according to her tradition of similar or previous models of the product. The other firm uses strategic timing, whereby his production time can be strategically chosen: be it before, simultaneously with, and after the routine firm. The two firms simultaneously choose whether or not to disclose their private demand information, make their quantity decisions based on any demand information available, and then compete in the market. We find that when the demand uncertainty is not high, both firms sharing information is the unique equilibrium outcome. Exactly one firm (the routine firm) sharing information can arise in equilibrium when the demand uncertainty is intermediate. These results are in stark contrast to extant literature which has shown that, for Cournot competitors with substitutable goods, no firm is willing to share demand information. Production timing is thus identified as a key driving force for horizontal information sharing, which might have been overlooked before. Surprisingly, when the competition becomes more intense, firms are more willing to share information. It is the information asymmetry that fundamentally change the strategic firm’s timing. We highlight the impact of signaling demand information for an early-production firm on the timing strategies, under different information sharing arrangements.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Wampler, Christopher. "Information leakage in encrypted IP video traffic." Thesis, Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/54287.

Повний текст джерела
Анотація:
We show that information leakage occurs in video over IP traffic, including for encrypted payloads. It is possible to detect events occurring in the field of view of a camera streaming live video through analysis of network traffic metadata including arrival time between packets, packets sizes, and video stream bandwidth. Event detection through metadata analysis is possible even when common encryption techniques are applied to the video stream such as SSL or AES. We have observed information leakage across multiple codes and cameras. Through timestamps added to the x264 codec, we establish a basis for detectability of events via packet timing. Laboratory experiments confirm that this event detection is possible in practice and repeatable. By collecting network traffic captures from over 100 Skype video calls we are able to see the impact of this information leakage under a variety of conditions.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Martinez, Antonio. "Information management and the biological warfare threat." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://sirsi.nps.navy.mil/uhtbin/hyperion-image/02Mar%5FMartinez.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

LUO, Huajiang. "Information leakage and Stackelberg leadership in Cournot competition." Digital Commons @ Lingnan University, 2015. https://commons.ln.edu.hk/cds_etd/12.

Повний текст джерела
Анотація:
In duopoly Cournot competition with sequential moves, it is well known that each player prefers Stackelberg leadership without demand uncertainty. We study the same game when the demand is uncertain, and firms possess some private information about the uncertain demand. There are two effects of private information in this game. First, when the Stackelberg leader moves first, its private information is leaked to, or inferred by the Stackelberg follower via the output quantity. Hence, the Stackelberg follower makes decision based on more accurate information than the leader. Second, the leader incurs a cost to signal its information to the follower, which hurts the leader. Both effects hurt the Stackelberg leader, then the follower may earn more ex ante profit than the leader. When the demand is continuous, Gal-or (1987) assumes that firms follow linear decision rules and reports that the follower always sets a higher output quantity than the leader and earns more profit than the leader. However, our study finds that it is true if and only if the demand is unboundedly distributed. Otherwise, the Stackelberg leader's Pareto-optimal output quantity is not linear in its private information unless it observes the highest signal, and the follower does not always earn more ex ante profit than the leader. When the demand is discretely distributed, we study how the number of demand states influences the effect of cost of signaling. With more demand states, the effect of cost of signaling on the leader becomes more significant, and the follower may earn more ex ante profit than the leader.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Woods, Richard David. "Collective responses to acoustic threat information in jackdaws." Thesis, University of Exeter, 2016. http://hdl.handle.net/10871/25978.

Повний текст джерела
Анотація:
Navigating the physical world may present only a small fraction of the challenges faced by social animals. Sociality brings with it numerous benefits, including access to important information that may have otherwise been harder to come by. However, almost every aspect of these apparent benefits may also entail additional cognitive challenges, including how to interpret signals from conspecifics, who to attend to, and how to incorporate knowledge about signallers when deciding how to respond. One approach to understanding the cognitive abilities associated with social function is to investigate social species that take part in potentially costly group behaviours, where individual decisions must be made in a social context. In this thesis I explore how jackdaws (Corvus monedula), a highly sociable corvid species, use acoustic information to coordinate collective anti-predator responses. In Chapter Two I showed using playback experiments that the magnitude of collective responses to anti-predator recruitment calls known as “scolding” calls depends on the identity of the caller, with larger responses to familiar colony members than unfamiliar individuals. In Chapter Three I then used habituation-dishabituation experiments to show that this vocal discrimination operates at the level of the individual, with jackdaws discriminating between the calls of different conspecifics, regardless of their level of familiarity. In Chapter Four, I examined whether aspects of call structure conveyed information about threat levels. Here, I found that high rates of scolding calls were associated with elevated threats, and playback experiments suggested that this information might result in larger group responses. The finding that jackdaws are capable of mediating their response to alarm calls based on the identity of the individual caller, and on structural variation in call production, raised the question of whether jackdaws employed similar forms discrimination between acoustic cues made by predators in their environment. I investigated this in Chapter Five, using playback experiments to show that jackdaws responded not only to the vocalisations of resident predators, but that this ability extended to novel predators, and that responsiveness was mediated by the phase of the breeding season in which predators were heard. Together, these findings provide insights in to how discrimination among acoustic cues can mediate group behaviour in species that respond collectively to threats.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Ogren, Joel G. Langevin James R. "Responding to the threat of cyberterrorism through information assurance /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA366792.

Повний текст джерела
Анотація:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, June 1999.
"June 1999". Thesis advisor(s): John S. Osmundson, Timothy J. Shimeall. Includes bibliographical references (p. 69-73). Also available online.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Threat of information leakage"

1

Liu, Taikang, and Yongmei Li. Electromagnetic Information Leakage and Countermeasure Technique. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-10-4352-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Reinikka, Ritva. Explaining leakage of public funds. Washington, D.C: World Bank, Public Services for Human Development, Development Research Group, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Reinikka, Ritva. Explaining leakage of public funds. Helsinki: United Nations University, World Institute for Development Economics Research, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Boni, William C. Netspionage: The global threat to information. Boston: Butterworth-Heinemann, 2000.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Yuval, Elovici, Rokach Lior, and SpringerLink (Online service), eds. A Survey of Data Leakage Detection and Prevention Solutions. Boston, MA: Springer US, 2012.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Schrader, Stephan. Informal technology transfer between companies: Information leakage or know-how trading? Cambridge, Mass: Alfred P. Sloan School of Management, Massachusetts Institute of Technology, 1989.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Hadden, Lawrence. Upper-limit indicator targeting and age-based nutritional interventions: Optimality, information and leakage. Coventry: University of Warwick, Development Economics Research Centre, 1991.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Yoshihara, Toshi. Chinese information warfare: A phantom menace or emerging threat? [Carlisle Barracks, PA]: Strategic Studies Institute, U.S. Army War College, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Joint Special Operations University (U.S.), ed. Disrupting threat finances: Using financial information to disrupt terrorist organizations. Hurlburt Field, Fla: JSOU Press, 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Anis, Mohab. Multi-threshold CMOS digital circuits: Managing leakage power. Boston, MA: Kluwer Academic Publishers, 2004.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Threat of information leakage"

1

Patel, Sarvar. "Information leakage in encrypted key exchange." In Network Threats, 33–40. Providence, Rhode Island: American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/04.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Shumilina, Vera, and Elena Tetunashvili. "INFORMATION SECURITY AS A COMPONENT OF THE ECONOMIC SECURITY OF THE ENTERPRISE." In Business security management in modern conditions, 119–29. au: AUS PUBLISHERS, 2021. http://dx.doi.org/10.26526/chapter_60258635b4a2f5.44169199.

Повний текст джерела
Анотація:
The article is devoted to the study of information security as an integral part of the economic security of any modern enterprise. Threats are described that can lead to disclosure of confidential information, leakage of confidential information, unauthorized access to protected information, etc. Means and ways of countering the presented threats are also given
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Tang, Yujia, Chang Xu, Can Zhang, Yan Wu, and Liehuang Zhu. "Analysis of Address Linkability in Tornado Cash on Ethereum." In Communications in Computer and Information Science, 39–50. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9229-1_3.

Повний текст джерела
Анотація:
AbstractTornado Cash, the most popular non-custodial coin mixer on Ethereum, is widely used to protect the privacy of addresses. However, some inappropriate transaction behaviors in Tornado Cash mixing mechanism lead to the risk of privacy leakage. More specifically, the malicious attackers can link multiple addresses of the same users according to the transaction data. Motivated by the above problem, this paper systematically analyzes the privacy issues of Tornado Cash for the first time. In this paper, we give the macroscopic analysis of Tornado Cash based on the on-chain data and formalize two types of transaction patterns. Focus on the presented transaction patterns, we propose three heuristic clustering rules to link the users’ addresses, which reduce the size of users’ anonymity set. Finally, we perform the experiment on real Tornado Cash transaction data to describe the effectiveness of the proposed clustering rules.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Alvim, Mário S., Konstantinos Chatzikokolakis, Yusuke Kawamoto, and Catuscia Palamidessi. "Information Leakage Games." In Lecture Notes in Computer Science, 437–57. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68711-7_23.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Malavena, Gerardo. "Modeling of GIDL–Assisted Erase in 3–D NAND Flash Memory Arrays and Its Employment in NOR Flash–Based Spiking Neural Networks." In Special Topics in Information Technology, 43–53. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-85918-3_4.

Повний текст джерела
Анотація:
AbstractSince the very first introduction of three-dimensional (3–D) vertical-channel (VC) NAND Flash memory arrays, gate-induced drain leakage (GIDL) current has been suggested as a solution to increase the string channel potential to trigger the erase operation. Thanks to that erase scheme, the memory array can be built directly on the top of a $$n^+$$ n + plate, without requiring any p-doped region to contact the string channel and therefore allowing to simplify the manufacturing process and increase the array integration density. For those reasons, the understanding of the physical phenomena occurring in the string when GIDL is triggered is important for the proper design of the cell structure and of the voltage waveforms adopted during erase. Even though a detailed comprehension of the GIDL phenomenology can be achieved by means of technology computer-aided design (TCAD) simulations, they are usually time and resource consuming, especially when realistic string structures with many word-lines (WLs) are considered. In this chapter, an analysis of the GIDL-assisted erase in 3–D VC nand memory arrays is presented. First, the evolution of the string potential and GIDL current during erase is investigated by means of TCAD simulations; then, a compact model able to reproduce both the string dynamics and the threshold voltage transients with reduced computational effort is presented. The developed compact model is proven to be a valuable tool for the optimization of the array performance during erase assisted by GIDL. Then, the idea of taking advantage of GIDL for the erase operation is exported to the context of spiking neural networks (SNNs) based on NOR Flash memory arrays, which require operational schemes that allow single-cell selectivity during both cell program and cell erase. To overcome the block erase typical of nor Flash memory arrays based on Fowler-Nordheim tunneling, a new erase scheme that triggers GIDL in the NOR Flash cell and exploits hot-hole injection (HHI) at its drain side to accomplish the erase operation is presented. Using that scheme, spike-timing dependent plasticity (STDP) is implemented in a mainstream NOR Flash array and array learning is successfully demonstrated in a prototype SNN. The achieved results represent an important step for the development of large-scale neuromorphic systems based on mature and reliable memory technologies.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Liu, Taikang, and Yongmei Li. "Electromagnetic Information Leakage Testing." In Electromagnetic Information Leakage and Countermeasure Technique, 195–215. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-10-4352-9_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Alvim, Mário S., Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, and Geoffrey Smith. "Posterior vulnerability and leakage." In The Science of Quantitative Information Flow, 71–100. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-96131-6_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Standaert, François-Xavier, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, and Elisabeth Oswald. "Leakage Resilient Cryptography in Practice." In Information Security and Cryptography, 99–134. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14452-3_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Chatzikokolakis, Konstantinos, Tom Chothia, and Apratim Guha. "Statistical Measurement of Information Leakage." In Tools and Algorithms for the Construction and Analysis of Systems, 390–404. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12002-2_33.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Kong, Guangwen, Sampath Rajagopalan, and Hao Zhang. "Information Leakage in Supply Chains." In Springer Series in Supply Chain Management, 313–41. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32441-8_15.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Threat of information leakage"

1

Wu, Jiangjiang, Jie Zhou, Jun Ma, Songzhu Mei, and Jiangchun Ren. "An Active Data Leakage Prevention Model for Insider Threat." In 2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing (IPTC). IEEE, 2011. http://dx.doi.org/10.1109/iptc.2011.17.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Zick, Kenneth M., Sen Li, and Matthew French. "High-precision self-characterization for the LUT burn-in information leakage threat." In 2014 24th International Conference on Field Programmable Logic and Applications (FPL). IEEE, 2014. http://dx.doi.org/10.1109/fpl.2014.6927475.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Lechler, Thomas, Susanne Wetzel, and Richard Jankowski. "Identifying and Evaluating the Threat of Transitive Information Leakage in Healthcare Systems." In 2011 44th Hawaii International Conference on System Sciences (HICSS 2011). IEEE, 2011. http://dx.doi.org/10.1109/hicss.2011.230.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Liu, Zhenyi, Philip Smith, and Qing Hui. "Contaminant Detection and Localization With Design of Experiment and Response Surface Methodology." In ASME 2014 Dynamic Systems and Control Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/dscc2014-5950.

Повний текст джерела
Анотація:
The spread of contaminant into the environment due to a high volume of leakage from point sources is a very real threat in the modern world. Since the contaminant can often be dangerous to human operators, multiple robotic agents equipped with suitable sensors are playing an increasingly important role in the so-called contaminant detection problem than before. This paper proposes a contaminant detection methodology which can not only locate the (possibly multiple) source of the contaminant, but also estimate the intensity in an environment evolving over both space and time. The methods can deal with measurement noise and do not need any gradient information.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Moore, J. Jeffrey. "Three-Dimensional CFD Rotordynamic Analysis of Gas Labyrinth Seals." In ASME 2001 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2001. http://dx.doi.org/10.1115/detc2001/vib-21394.

Повний текст джерела
Анотація:
Abstract Labyrinth seals are utilized inside turbomachinery to provide non-contacting control of internal leakage. These seals can also play an important role in determining the rotordynamic stability of the machine. Traditional labyrinth seal models are based on bulk-flow assumptions where the fluid is assumed to behave as a rigid body affected by shear stress at the interfaces. To model the labyrinth seal cavity, a single, driven vortex is assumed and relationships for the shear stress and divergence angle of the through flow jet are developed. These models, while efficient to compute, typically show poor prediction for seals with small clearances, high running speed, and high pressure (Childs, 1993). In an effort to improve the prediction of these components, this work utilizes three-dimensional computational fluid dynamics (CFD) to model the labyrinth seal flow path by solving the Reynolds Averaged Navier Stokes equations. Unlike bulk-flow techniques, CFD makes no fundamental assumptions on geometry, shear stress at the walls, as well as internal flow structure. The method allows modeling of any arbitrarily shaped domain including stepped and interlocking labyrinths with straight or angled teeth. When only leakage prediction is required, an axisymmetric model is created. To calculate rotordynamic forces, a full 3D, eccentric model is solved. The results demonstrate improved leakage and rotordynamic prediction over bulk-flow approaches compared to experimental measurements.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Doering, S., M. Seitz, U. Zimmermann, P. Rodger, and W. Werner. "Analysis of Deep Trench Node Leakage Depth by Applying Current Imaging Technique at Silicon Level." In ISTFA 2008. ASM International, 2008. http://dx.doi.org/10.31399/asm.cp.istfa2008p0209.

Повний текст джерела
Анотація:
Abstract In case of a node leakage failure in DRAM products, the location of the defect can be spread over the entire deep trench depth of up to six microns, making it very difficult to precisely localize the defects. In addition, the use of surface area enlarging techniques makes it even more difficult to pinpoint the node leakage defect. In this study, first, the node leakage was verified at contact level using the nano-probing technique. In the second step, the sample was deprocessed into the p well level and a current image was obtained, confirming the node leakage to be located below this level. In the third step, the sample was further deprocessed to the edge of the n well level. AFM-based probing provided additional information regarding the location of the node leakage. With these three measurements, the authors confined the node leakage to the small n well region.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Jolly, Pascal, and Luc Marchand. "Leakage Predictions for Static Gasket Based on the Porous Media Theory." In ASME 2006 Pressure Vessels and Piping/ICPVT-11 Conference. ASMEDC, 2006. http://dx.doi.org/10.1115/pvp2006-icpvt-11-93401.

Повний текст джерела
Анотація:
In the present work, the annular static gaskets are considered as porous media and the Darcy’s law is written for a steady radial flow of a compressible gas with a first order slip boundary conditions. From this, a simple equation is obtained that includes the Klinkenberg’s intrinsic permeability factor kv of the gasket and the Knudsen number Kn′o defined with a characteristic length l. The parameters kv and l of the porous gasket are calculated from experimental results obtained with a reference gas at several gasket stress levels. Then, with kv and l, the inverse procedure is performed to predict the leakage rate for three different gases. It is shown that the porous media model predicts leak rates with the same accuracy as the laminar-molecular flow model (LMF) of Marchand, Derenne and Masi. However, the new model has the advantage of furnishing phenomenological information on the evolution of the intrinsic permeability and the gas flow regimes with the gasket compressive stress. It also enables quick identification of the part of leakage that occurs at the flange-gasket interface at low gasket stresses. At low gas pressure, the behavior of the apparent permeability diverges from that of Klinkenberg’s, indicating that the rarefaction effect becomes preponderant on the leak. Finally, it is demonstrated that the porous media model could be very useful in predicting gasket leakage with liquids.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Shiau, Chao-Cheng, Izzet Sahin, Nian Wang, Je-Chin Han, Hongzhou Xu, and Michael Fox. "Turbine Vane Endwall Film Cooling Comparison From Five Film-Hole Design Patterns and Three Upstream Leakage Injection Angles." In ASME Turbo Expo 2018: Turbomachinery Technical Conference and Exposition. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/gt2018-75272.

Повний текст джерела
Анотація:
The effects of upstream leakage injection angle on film cooling effectiveness of a turbine vane endwall with various endwall film-hole designs were examined by applying PSP measurement technique. As the leakage flow from the slot between the combustor and the turbine vane is not considered an active source to protect the vane endwall in certain engine designs, discrete cylindrical holes are implemented near the slot to create additional controllable upstream leakage flow to cool the vane endwall. Three potential leakage injection angles were studied: 30°, 40°, and 50°. To explore the optimum endwall cooling design, five different film-hole patterns were tested: axial row, cross row, cluster, mid-chord row, and downstream row. Experiments were conducted in a four-passage linear cascade facility in a blowdown wind tunnel at the exit isentropic Mach number of 0.5 corresponding to inlet Reynolds number of 380,000 based on turbine vane axial chord length. A freestream turbulence intensity of 19% with an integral length scale of 1.7 cm was generated at the cascade inlet plane. Detailed film cooling effectiveness for each design was analyzed and compared at the design operation conditions (coolant mass flow ratio 1% and density ratio 1.5). The results are presented in terms of high-fidelity film effectiveness contours and laterally (spanwise) averaged effectiveness. This paper will provide the gas turbine designers valuable information on how to select the best endwall cooling pattern with minimum cooling air consumption over a range of upstream leakage injection angle.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Rehder, Hans-Ju¨rgen, and Axel Dannhauer. "Experimental Investigation of Turbine Leakage Flows on the 3D Flow Field and End Wall Heat Transfer." In ASME Turbo Expo 2006: Power for Land, Sea, and Air. ASMEDC, 2006. http://dx.doi.org/10.1115/gt2006-90173.

Повний текст джерела
Анотація:
Within a European research project the tip end wall region of LP turbine guide vanes with leakage ejection was investigated at DLR in Go¨ttingen. For this purpose a new cascade wind tunnel with three large profiles in the test section and a contoured end wall was designed and built up, representing 50% height of a real low pressure turbine (LPT) stator and simulating the casing flow field of shrouded vanes. The effect of tip leakage flow was simulated by blowing air through a small leakage gap in the end wall just upstream of the vane leading edges. Engine relevant turbulence intensities were adjusted by an active turbulence generator mounted in the test section inlet plane. The experiments were performed with tangential and perpendicular leakage ejection and varying leakage mass flow rates up to 2%. Aerodynamic and thermodynamic measurement techniques were employed. Pressure distribution measurements provided information about the end wall and vane surface pressure field and its variation with leakage flow. Additionally streamline pattern (local shear stress directions) on the walls were detected by oil flow visualization. Downstream traverses with 5-hole pyramid type probes allow a survey of the secondary flow behavior in the cascade exit plane. The flow field in the near end wall area downstream of the leakage gap and around the vane leading edges was investigated using a 2D Particle Image Velocimetry (PIV) system. In order to determine end wall heat transfer distributions, the wall temperatures were measured by an infra-red camera system, while heat fluxes at the surfaces were generated with electric operating heating foils. It turned out from the experiments that distinct changes in the secondary flow behavior and end wall heat transfer mainly occur when the leakage mass flow rate is increased from 1% to 2%. Leakage ejection perpendicular to the main flow direction amplifies the secondary flow, in particular the horse-shoe vortex, whereas tangential leakage ejection causes a significant reduction of this vortex system. For high leakage mass flow rates the boundary layer flow at the end wall is strongly affected and seems to be highly turbulent, resulting in entirely different heat transfer distributions.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Xu, Susan S., Zhipeng Lei, Ziqing Zhuang, and Michael Bergman. "Computational Fluid Dynamics Simulation of Flow of Exhaled Particles From Powered-Air Purifying Respirators." In ASME 2019 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/detc2019-97826.

Повний текст джерела
Анотація:
Abstract In surgical settings, infectious particulate wound contamination is a recognized cause of post-operative infections. Powered air-purifying respirators (PAPRs) are widely used by healthcare workers personal protection against infectious aerosols. Healthcare infection preventionists have expressed concern about the possibility that infectious particles expelled from PAPR exhalation channels could lead to healthcare associated infections, especially in operative settings where sterile procedural technique is emphasized. This study used computational fluid dynamics (CFD) modeling to simulate and visualize the distribution of particles exhaled by the PAPR wearer. In CFD simulations, the outward release of the exhaled particles, i.e., ratio of exhaled particle concentration outside the PAPR to that of inside the PAPR, was determined. This study also evaluated the effect of particle sizes, supplied air flow rates, and breathing work rates on outward leakage. This simulation study for the headform and loose-fitting PAPR system included the following four main steps: (1) preprocessing (establishing a geometrical model of a headform wearing a loose-fitting PAPR by capturing a 3D image), (2) defining a mathematical model for the headform and PAPR system, and (3) running a total 24 simulations with four particle sizes, three breathing workloads and two supplied-air flow rates (4 × 3 × 2 = 24) applied on the digital model of the headform and PAPR system, and (4) post-processing the simulation results to visually display the distribution of exhaled particles inside the PAPR and determine the particle concentration of outside the PAPR compared with the concentration inside. We assume that there was no ambient particle, and only exhaled particles existed. The results showed that the ratio of the exhaled particle concentration outside to inside the PAPR were influenced by exhaled particle sizes, breathing workloads, and supplied-air flow rates. We found that outward concentration leakage from PAPR wearers was approximately 9% with a particle size of 0.1 and 1 μm at the light breathing and 205 L/min supplied-air flow rates, which is similar to the respiratory physiology of a health care worker in operative settings, The range of the ratio of exhaled particle concentration leaking outside the PAPR to the exhaled particle concentration inside the PAPR is from 7.6% to 49. We found that supplied air flow rates and work rates have significant impact on outward leakage, the outward concentration leakage increased as particle size decreased, breathing workload increased, and supplied-air flow rate decreased. The results of our simulation study should help provide a foundation for future clinical studies.
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Threat of information leakage"

1

Johnson, Christopher S., Mark Lee Badger, David A. Waltermire, Julie Snyder, and Clem Skorupka. Guide to Cyber Threat Information Sharing. National Institute of Standards and Technology, October 2016. http://dx.doi.org/10.6028/nist.sp.800-150.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Anderson, Emory A., Cynthia E. Irvine, and Roger R. Schell. Subversion as a Threat in Information Warfare. Fort Belvoir, VA: Defense Technical Information Center, June 2004. http://dx.doi.org/10.21236/ada435312.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Pearcy, Richard E. The Information Warfare Threat to Air Expeditionary Forces. Fort Belvoir, VA: Defense Technical Information Center, February 2000. http://dx.doi.org/10.21236/ada378513.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Thiruvathukal, George K. Ad Hoc Human Information Nets for Asymmetric Threat Surveillance. Fort Belvoir, VA: Defense Technical Information Center, June 2003. http://dx.doi.org/10.21236/ada416466.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Lasley, Jennifer. Denial and Deception: A Serious Threat to Information Superiority? Fort Belvoir, VA: Defense Technical Information Center, April 2000. http://dx.doi.org/10.21236/ada431704.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Yoshihara, Toshi. Chinese Information Warfare: A Phantom Menace or Emerging Threat. Fort Belvoir, VA: Defense Technical Information Center, November 2001. http://dx.doi.org/10.21236/ada397266.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

McKeown, Wendell B. Information Operations: Countering the Asymmetric Threat to the United States. Fort Belvoir, VA: Defense Technical Information Center, April 1999. http://dx.doi.org/10.21236/ada363692.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Thompson, Herbert H., and James A. Whittaker. Information Centric Security: Innovative Protections to Mitigate the Insider Threat. Fort Belvoir, VA: Defense Technical Information Center, February 2004. http://dx.doi.org/10.21236/ada421489.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Thomas, Cathy H. The Dissemination of Terrorist Threat Information: Who Should Be Warned. Fort Belvoir, VA: Defense Technical Information Center, May 1990. http://dx.doi.org/10.21236/ada220703.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Warren, Paul S. A New Kind of War: Adaptive Threat Doctrine and Information Operations. Fort Belvoir, VA: Defense Technical Information Center, February 2001. http://dx.doi.org/10.21236/ada395701.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії