A Methodology for Identification of the Guilt Agent based on IP Binding with MAC using Bivariate Gaussian Model
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 11
Abstract
Enormous increase in data in the current world presents a major threat to the organization. Most of the organization maintains some sort of data that is sensitive and must be protected against the loss and leakage. In the IT field, the large amount of data will be exchanged between the multiple points at every moment. During this allocation of the data from the organization to the third party, there are enormous probabilities of data loss, leakages or alteration. Mostly an email is being utilized for correspondence in the working environment and from web-based like logins to ledgers; thereby an email is turning into a standard business application. An email can be abused to leave organization's elusive information open to trade off. Along these lines, it might be of little surprise that muggings on messages are normal and these issues need to be addressed. This paper completely focuses on the concept of data leakage, the technique to detect the data leakage and prevention.
Authors and Affiliations
B. Raja Koti, Dr. G. V. S. Raj Kumar, Dr. Y. Srinivas, Dr. K. Naveen Kumar
Improvement of Persian Spam Filtering by Game Theory
There are different methods for dealing with spams; however, since spammers continuously use tricks to defeat the proposed methods, hence, filters should be constantly updated. In this study, Stackelberg game was used to...
Modeling and Analyzing Anycast and Geocast Routing in Wireless Mesh Networks
Wireless technology has become an essential part of this era’s human life and has the capability of connecting virtually to any place within the universe. A mesh network is a self healing wireless network, built through...
Efficient Arnold and Singular Value Decomposition based Chaotic Image Encryption
This paper proposes an efficient image encryption that is based on Arnold transform (AT) and the Singular value decomposition (SVD). The proposed method employs AT on a plain image to transpose all image pixels in the p...
A Unified Forensic Framework for Data Identification and Collection in Mobile Cloud Social Network Applications
Mobile Cloud Computing (MCC) is the emerging and well accepted concept that significantly removes the constraints of mobile devices in terms of storage and computing capabilities and improves productivity, enhances perfo...
Effective Performance of Information Retrieval by using Domain Based Crawler
World Wide Web continuously introduces new capabilities and attracts many people[1]. It consists of more than 60 billion pages online. Due to this explosion in size, the information retrieval system or Search Engines are...