TIFS   2016
Wall of Fame | Most Viewed TIFS-2016 Paper
246views more  TIFS 2016»
3 years 14 days ago
Fast Detection of Transformed Data Leaks
—The leak of sensitive data on computer systems poses a serious threat to organizational security. Statistics show that the lack of proper encryption on files and communications...
Xiaokui Shu, Jing Zhang, Danfeng (Daphne) Yao, Wu-...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source246
2Download preprint from source79
3Download preprint from source76
4Download preprint from source76
5Download preprint from source75
6Download preprint from source75
7Download preprint from source72
8Download preprint from source70
9Download preprint from source67
10Download preprint from source66
11Download preprint from source65
12Download preprint from source63
13Download preprint from source58
14Download preprint from source57