Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. Hiroki Nishiyama, Desmond Fomo, Zubair Md. Fadlullah,, and NeiKato,Fellow,” Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks” IEEE Transaction on Parallel and Distributed System , Volume 25, No 2 Feb 2014
    2. K. Ramya, D. RamyaDorai, Dr. M. Rajaram “Tracing Illegal Redistributors of Streaming Contents using Traffic Patterns” IJC A 2011.
    3. A. Asano, H. Nishiyama, and N. Kato, “The Effect of Packet Reordering and Encrypted Traffic on Streaming Content Leakage Detection” Proc. Int’l Conf. Computer Comm. Networks (ICCCN ’10), pp. 1 6, Aug. 2010.
    4. Y. Chu, S.G. Rao, S. Seshan, and H. Zhang, “Enabling Conferencing Applications on the Internet Using an Overlay Multicast Architecture,” Proc.ACM SIGCOMM, pp. 55 67,Aug. 2010
    5. O. Adeyinka, “Analysis of IPSec VPNs Performance in a Multimedia Environment,” Proc. Fourth Int’l Conf. Intell igent Environments, pp. 25 - 30, 2008
    6. M. Dobashi, H. Nakayama, N. Kato, Y. Nemoto, and A. Jamalipour, “Traitor Tracing Technology of Streaming Contents Delivery Using Traffic Pattern in Wired/Wireless Environments,” Proc. IEEE Global Telecomm. Conf., pp. 1 5, Nov./Dec. 2006.
    7. S. Amarasing and M. Lertwatechakul, “The Study of Streaming Traffic Behavior,” KKU Eng. J., vol. 33, no. 5, pp. 541 553, Sept./Oct. 2006.
    8. R.S. Naini and Y. Wang, “Sequential Traitor Tracing,” IEEE Trans. Information Theory, vol. 49, no. 5, pp. 1319 1326, May 2003.
    9. D. Geiger, A. Gupta, L.A. Costa, and J. Vlontzos, “Dynamic Programming for Detecting, Tracking, and Matching Deformable C ontours,” Proc. IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 17, no. 3, pp. 294 302, M ar. 1995.
    10. H. A. Kholidy, F. Baiardi, and S. Hariri, “DDSGA: A data-driven semi-global alignment approach for detecting masquerade attacks,” IEEE Trans. Dependable Secure Comput., vol. 12, no. 2, pp. 164–178, Mar./Apr. 2015.
    11. S. F. Altschul, W. Gish, W. Miller, E. W. Myers, and D. J. Lipman, “Basic local alignment search tool,” J. Molecular Biol., vol. 215, no. 3, pp. 403–410, Oct. 1990
    12. V. P. Kemerlis, V. Pappas, G. Portokalidis, and A. D. Keromytis, “iLeak: A lightweight system for detecting inadvertent information leaks,” in Proc. 6th Eur. Conf. Comput. Netw. Defense, Oct. 2010, pp. 21–28.
    13. E. Bertino and G. Ghinita, “Towards mechanisms for detection and prevention of data exfiltration by insiders: Keynote talk paper,” in Proc. 6th ACM Symp. Inf., Comput. Commun. Secur. (ASIACCS), 2011, pp. 10–19.
    14. P. Papadimitriou and H. Garcia-Molina, “Data leakage detection,” IEEE Trans. Knowl. Data Eng., vol. 23, no. 1, pp. 51–63, Jan. 2011.
    15. D. Lin and A. Squicciarini, “Data protection models for service provisioning in the cloud,” in Proc. 15th ACM Symp. Access Control Models Technol., 2010, pp. 183–192
    16. M. O. Rabin, “Fingerprinting by random polynomials,” Center Res. Comput. Technol., Harvard Univ., Cambridge, MA, USA, Tech. Rep. 15-81, 1981.
    17. T. F. Smith and M. S. Waterman, “Identification of common molecular subsequences,” J. Molecular Biol., vol. 147, no. 1, pp. 195–197, Mar. 1981.
    18. C. Kalyan and K. Chandrasekaran, “Information leak detection in financial e-mails using mail pattern analysis under partial information,” in Proc. 7th WSEAS Int. Conf. Appl. Informat. Commun. (AIC), vol. 7. 2007, pp. 104–109.
    19. C. Wüest and E. Florio, “Firefox and malware: When browsers attack,” Symantec Corp., Mountain View, CA, USA, White Paper, Oct. 2009. [Online]. Available: https://www.symantec.com/content/en/us/enterprise/ media/security_response/whitepapers/firefox_and_malwa re.pdf, accessed Feb. 2015.

Recent Article