Data Flow for Effective Data Leakage Prevention using Elliptic Curve Digital Signature Algorithm Journal title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY Authors: Tony Thomas , V.Balajishanmuga Subject(s):
An Analysis of Security Challenges in Cloud Computing Journal title: International Journal of Advanced Computer Science & Applications Authors: Ms.Disha H. Parekh , Dr. R. Sridaran Subject(s):
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations Journal title: IOSR Journals (IOSR Journal of Computer Engineering) Authors: B. Sruthi Patel Subject(s):
AUTOMATIC DETECTION AND PREVENTION OF VIRUS IN MOBILE ENVIRONMENT Journal title: International Journal of Computer Science & Engineering Technology Authors: R.Priya Subject(s):
Improved 3-Dimensional Security in Cloud Computing Journal title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY Authors: Sagar Tirodkar , Yazad Baldawala , Sagar Ulane , Ashok Jori Subject(s):
Review in Cloud Computing Security Journal title: IOSR Journals (IOSR Journal of Computer Engineering) Authors: Anchal Pokharana , Shweta Meena Subject(s):
A Novel Data Leakage Detection Journal title: International Journal of Modern Engineering Research (IJMER) Authors: Priyanka Barge Subject(s):
A Survey on Cloud Computing Security, Challenges and Threats Journal title: International Journal on Computer Science and Engineering Authors: Rajnish Choubey , Rajshree Dubey , Joy Bhattacharjee Subject(s):
General Data Protection Regulation in the Focus of Data Leakage Journal title: Asigurarea Calităţii – Quality Assurance Authors: Michael BEST Subject(s):
Malicious Agent Detection In Multi Party Data Access Structure Journal title: International journal of Emerging Trends in Science and Technology Authors: Prof.Devendra Shamkuwar Subject(s):
Data leakage Detection and Security in Cloud Computing Journal title: GRD Journal for Engineering Authors: Chandu Vaidya, Prashant Khobragade, Ashish Golghate Subject(s):
PERSONAL CUSTOMER’S DATA PROTECTION: NORMATIVE REQUIREMENTS IN UKRAINE AND EUROPEAN UNION Journal title: Сталий розвиток економіки Authors: Iryna Andrushkiv, Bohdan Mushynskyi Subject(s):
A Methodology for Identification of the Guilt Agent based on IP Binding with MAC using Bivariate Gaussian Model Journal title: International Journal of Advanced Computer Science & Applications Authors: B. Raja Koti, Dr. G. V. S. Raj Kumar, Dr. Y. Srinivas, Dr. K. Naveen Kumar Subject(s):
Server Monitoring Application for Insider Attack Detection and Prevention Journal title: Gazi Üniversitesi Fen Bilimleri Dergisi Part C: Tasarım ve Teknoloji Authors: Halil İbrahim ULUS, Mehmet DEMİRCİ Subject(s):
ALGORITHM OF USER’S PERSONAL DATA PROTECTION AGAINST DATA LEAKS IN WINDOWS 10 OS Journal title: Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska Authors: Olexander Zadereyko, Olena Trofymenko, Nataliia Loginova Subject(s):