Login / Signup

Attacker Investigation System Triggered by Information Leakage.

Yuta IkegamiToshihiro Yamauchi
Published in: IIAI-AAI (2015)
Keyphrases
  • information leakage
  • personal information
  • secret information
  • sensitive information
  • social media
  • web search
  • cloud computing
  • bit rate