Cargando…
An Encrypted File Detection Algorithm
Despite the availability of data leak detection and prevention tools, there are currently a growing number of confidential data leaks through the fault of insiders. One of the possible data leak channels is encrypted or compressed data transfer, because the existing data leak detection tools use con...
Autores principales: | Kozachok, A. V., Kozachok, V. I., Spirin, A. A. |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Pleiades Publishing
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8886193/ http://dx.doi.org/10.3103/S0146411621080162 |
Ejemplares similares
-
Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit
por: Shaik, Vaheedbasha, et al.
Publicado: (2022) -
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification
por: Davies, Simon R., et al.
Publicado: (2022) -
Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective
por: Kapil, Gayatri, et al.
Publicado: (2020) -
ABEBox: end-to-end encryption for file sharing cloud services
por: Bracciale, Lorenzo
Publicado: (2022) -
Antioxidative and Potentially Anti-inflammatory Activity of Phenolics from Lovage Leaves Levisticum officinale Koch Elicited with Jasmonic Acid and Yeast Extract
por: Złotek, Urszula, et al.
Publicado: (2019)