We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 9,735 results
  1. Data-driven approaches and model-based methods for detecting and locating leaks in water distribution systems: a literature review

    Water distribution systems are made up of interconnected components that should allow water systems to meet demand, but leaks can waste enough water...

    Waid Nimri, Yong Wang, ... Kristofor Sellstrom in Neural Computing and Applications
    Article 06 April 2023
  2. Analyzing Memory Leaks

    Before we discuss memory leaks, let’s analyze a simple case study. It will help you understand how memory leaks can hamper the smooth execution of an...
    Chapter 2023
  3. Case Study: Resource Leaks

    In this chapter, you will use the pattern approach to diagnose and debug a common problem type in the Windows operating system: resource leaks.
    Chapter 2024
  4. From Whistle to Echo: Data Leaks in Web-Based Whistleblowing Channels

    Whistleblowing refers to reporting misconduct to responsible authorities. With accelerating digitalization and the European Union’s new whistleblower...
    Esko Vuorinen, Panu Puhtila, ... Ville Leppänen in Secure IT Systems
    Conference paper 2024
  5. Detecting Illicit Data Leaks on Android Smartphones Using an Artificial Intelligence Models

    In today’s digital landscape, hackers and espionage agents are increasingly targeting Android, the world’s most prevalent mobile operating system. We...
    Serge Lionel Nikiema, Aminata Sabane, ... Tégawendé F. Bissyande in Artificial Intelligence Applications and Innovations
    Conference paper 2024
  6. Automatic and Incremental Repair for Speculative Information Leaks

    We present CureSpec, the first model-checking based framework for automatic repair of programs with respect to information leaks in the presence of...
    Joachim Bard, Swen Jacobs, Yakir Vizel in Verification, Model Checking, and Abstract Interpretation
    Conference paper 2024
  7. Time Will Tell: Exploiting Timing Leaks Using HTTP Response Headers

    To execute timing attacks, an attacker has to collect a large number of samples to overcome network jitter. Methods to reduce such jitter, which is a...
    Vik Vanderlinden, Tom Van Goethem, Mathy Vanhoef in Computer Security – ESORICS 2023
    Conference paper 2024
  8. Detecting Privacy Leaks Utilizing Digital Forensics and Reverse Engineering Methodologies

    Most commercial iOS forensics and data acquisition tools will effectively do the job in general, but in cases of data leaks presented, we need to...
    Chapter 2022
  9. Frequency-Domain Generalized Phase Transform Method in Pipeline Leaks Locating

    This article considers the problem of instrumental-assisted determination of the location of leaks in water pipes using acoustic correlation leak...
    Conference paper 2023
  10. Quantitative estimation of side-channel leaks with neural networks

    Information leaks via side channels remain a challenging problem to guarantee confidentiality. Static analysis is a prevalent approach for detecting...

    Saeid Tizpaz-Niari, Pavol Černý, ... Ashutosh Trivedi in International Journal on Software Tools for Technology Transfer
    Article 26 May 2021
  11. Listening Between the Bits: Privacy Leaks in Audio Fingerprints

    Audio content recognition is an emerging technology that forms the basis for mobile services, such as automatic song recognition, second-screen...
    Moritz Pfister, Robert Michael, ... Daniel Arp in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  12. Data in Transit Security

    Data in transit, or network traffic, can be eavesdropped on and potentially leak sensitive information. This information can be in the payload,...
    Chapter Open access 2023
  13. Leak detection and localization in water distribution networks by combining expert knowledge and data-driven models

    Leaks represent one of the most relevant faults in water distribution networks (WDN), resulting in severe losses. Despite the growing research...

    Adrià Soldevila, Giacomo Boracchi, ... Vicenç Puig in Neural Computing and Applications
    Article 14 November 2021
  14. Data Protection and Data Privacy

    In this chapter, we specify the business requirements and propose the solution concept for data protection and data privacy. ERP systems must fulfill...
    Chapter 2024
  15. Analysis of Information Quality and Data Security in the KPU (General Elections Commission) SIDALIH (Voter Data Information System) Application

    The purpose of this study was to determine the quality of services provided and data security in the use of the KPU’s SIDALIH (Voter Data Information...
    Jaka Raharja, Achmad Nurmandi, ... Dimas Subekti in HCI for Cybersecurity, Privacy and Trust
    Conference paper 2023
  16. Data Management

    The speed and accuracyAccuracy of data management are essential advantages offered by AIArtificial Intelligence (AI) systems. A further advantage...
    Svetlana Bialkova in The Rise of AI User Applications
    Chapter 2024
  17. FD-Leaks: Membership Inference Attacks Against Federated Distillation Learning

    With the enhanced sensing and computing power of mobile devices, emerging technologies and applications generate massive amounts of data at the edge...
    Zilu Yang, Yanchao Zhao, Jiale Zhang in Web and Big Data
    Conference paper 2023
  18. An Empirical Study on Mobile Payment Credential Leaks and Their Exploits

    Recently, mobile apps increasingly integrate with payment services, enabling the user to pay orders with a third-party payment service provider,...
    Shangcheng Shi, **anbo Wang, ... Wing Cheong Lau in Security and Privacy in Communication Networks
    Conference paper 2021
  19. Incorporating Physics-Based Models into Data Driven Approaches for Air Leak Detection in City Buses

    In this work-in-progress paper two types of physics-based models, for accessing elastic and non-elastic air leakage processes, were evaluated and...
    Conference paper 2023
  20. Image-based random rotation for preserving the data in data mining process

    The privacy and security of big data have become a major concern in recent years, necessitating privacy-preserving data mining strategies to preserve...

    Nadella Sunil, G. Narsimha in Signal, Image and Video Processing
    Article 19 March 2024
Did you find what you were looking for? Share feedback.