Login / Signup

Active Credential Leakage for Observing Web-Based Attack Cycle.

Mitsuaki AkiyamaTakeshi YagiKazufumi AokiTakeo HariuYouki Kadobayashi
Published in: RAID (2013)
Keyphrases
  • data leakage prevention
  • information leakage
  • countermeasures
  • multimedia
  • insider threat
  • neural network
  • metadata
  • personal information
  • attack graph