A Methodology for Identification of the Guilt Agent based on IP Binding with MAC using Bivariate Gaussian Model
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 11
Abstract
Enormous increase in data in the current world presents a major threat to the organization. Most of the organization maintains some sort of data that is sensitive and must be protected against the loss and leakage. In the IT field, the large amount of data will be exchanged between the multiple points at every moment. During this allocation of the data from the organization to the third party, there are enormous probabilities of data loss, leakages or alteration. Mostly an email is being utilized for correspondence in the working environment and from web-based like logins to ledgers; thereby an email is turning into a standard business application. An email can be abused to leave organization's elusive information open to trade off. Along these lines, it might be of little surprise that muggings on messages are normal and these issues need to be addressed. This paper completely focuses on the concept of data leakage, the technique to detect the data leakage and prevention.
Authors and Affiliations
B. Raja Koti, Dr. G. V. S. Raj Kumar, Dr. Y. Srinivas, Dr. K. Naveen Kumar
Towards Enhancing Supportive E-Learning Courses using Smart Tags
E-learning management systems have emerged as a method of education development in many universities in the Arab world. E-learning management system tools provide a basic environment for interaction between faculty membe...
A Frame Work for Preserving Privacy in Social Media using Generalized Gaussian Mixture Model
Social networking sites helps in developing virtual communities for people to share their thoughts, interest activities or to increase their horizon of camaraderie. Social networking sites come under few of the most freq...
Analysis of Guess and Determined Attack on Non Linear Modified SNOW 2.0 Using One LFSR
stream ciphers encrypt the data bit by bit. In this research a new model of stream cipher SNOW 2.0 has been proposed i.e. Non linear modified SNOW 2.0 using one Linear Feedback Shift Register (LFSR) with the embedding of...
A Proposed Fuzzy Stability Model to Improve Multi-Hop Routing Protocol
Today’s wide spread use of mobile devices such as: mobile phones, tablets, laptops and many others had driven the wireless Mobile Network growth especially the Mobile Ad hoc Networks commonly referred to as MANETs. Since...
Face Detection and Recognition Using Viola-Jones with PCA-LDA and Square Euclidean Distance
In this paper, an automatic face recognition system is proposed based on appearance-based features that focus on the entire face image rather than local facial features. The first step in face recognition system is face...