Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Data leakage ad security of data is an essential component of cloud computing, most of the data has been proceed through third party application (TPA) and user are unaware about the security essentials. The internet based computing model... more
    • by  and +2
    •   6  
      Cloud ComputingData SecurityData leakageSHA
Çalışan bir sistem dışarıya belli oranlarda radyo dalga emisyonu, ışık, ses veya titreşim gönderir. Bu sinyaller sistemin o anki çalışması ile ilgili bilgi veren anlamlı bir yapıdadır. Örneğin TEMPEST güvenliği alınmamış bir... more
    • by 
    •   6  
      RF Design and ApplicationsRadio FrequencyThe TempestRadio Emissions
The parrhesiastic spaces brought about by networked technologies have transformed what counts as truth-telling today. While the notion of truth has been thoroughly scrutinized within organization theory as well in studies on the ethics of... more
    • by 
    •   16  
      Gender StudiesMedia StudiesFeminist TheoryOrganizational Change
The amount of data in world is increasing rapidly. Data is developing as a direct result of utilization of web and increased usage of mobile phones. Big data is an assortment of data sets which is extremely enormous in size. Presently,... more
    • by 
    •   20  
      Data MiningDatabase SystemsData AnalysisData Management
Industrial Control Systems (ICS) are used for controlling, operating and monitoring industrial processes. That current ICS infrastructures and elements are not amply secured against cyber threats in context of security. Woefully, due to... more
    • by 
    •   8  
      Industrial Control SystemsDistributed Control System (DCS)Supervisor Control and Data Acqusition Systems (SCADA)Programmable Logic Controllers (PLCs)
Data leakage means sending confidential data to an unauthorized person. Nowadays, identifying confidential data is a big challenge for the organizations. We developed a system by using data mining techniques, which identifies confidential... more
    • by 
    •   6  
      Data Mining TechniquesThresholdData leakageConfidential terms
Cloud computing environment provides on-demand access to shared resources that can be managed with minimal interaction of cloud service provider and validated service to the user. Cloud storage can be either public or private. Data in the... more
    • by 
    •   6  
      EncryptionCloud ComputingAESPrivate Key
The Data Distributors organizations outsource their sensitive data to some outside trusted third party. The objective would be to detect when their sensitive data has been leaked by agents, and if possible to identify them. An application... more
    • by 
    •   5  
      Guilty PleaPerturbation AnalysisData leakageIdentifying of fakes and forgeries of art objects
Many schemes have been recently advanced for storing data on multiple clouds. Distributing data over different cloud storage providers (CSPs) automatically provides users with a certain degree of information leakage control, as no single... more
    • by 
    •   3  
      Bloom FilterStoreData leakage