Academic literature on the topic 'Privacy leak'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Privacy leak.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Privacy leak"
Fan, Le-Jun, Yuan-Zhuo Wang, Jing-Yuan Li, Xue-Qi Cheng, and Chuang Lin. "Privacy Petri Net and Privacy Leak Software." Journal of Computer Science and Technology 30, no. 6 (2015): 1318–43. http://dx.doi.org/10.1007/s11390-015-1601-7.
Full textFan, Lejun, Yuanzhuo Wang, Xiaolong Jin, Jingyuan Li, Xueqi Cheng, and Shuyuan Jin. "Comprehensive Quantitative Analysis on Privacy Leak Behavior." PLoS ONE 8, no. 9 (2013): e73410. http://dx.doi.org/10.1371/journal.pone.0073410.
Full textValecha, Rohit, Shambhu Upadhyaya, and H. Raghav Rao. "An Activity Theory Approach to Leak Detection and Mitigation in Patient Health Information (PHI)." Journal of the Association for Information Systems 22, no. 4 (2021): 1007–36. http://dx.doi.org/10.17705/1jais.00687.
Full textJing, Tao, Qiancheng Chen, and Yingkun Wen. "A Probabilistic Privacy Preserving Strategy for Word-of-Mouth Social Networks." Wireless Communications and Mobile Computing 2018 (July 8, 2018): 1–12. http://dx.doi.org/10.1155/2018/6031715.
Full textLuo, Xiaohui. "A Method for Privacy-Safe Synthetic Health Data." Academic Journal of Science and Technology 10, no. 1 (2024): 445–50. http://dx.doi.org/10.54097/f7fjss40.
Full textTandon, Rajat, Pithayuth Charnsethikul, Ishank Arora, Dhiraj Murthy, and Jelena Mirkovic. "I know what you did on Venmo: Discovering privacy leaks in mobile social payments." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (2022): 200–221. http://dx.doi.org/10.56553/popets-2022-0069.
Full textVivekanandam, B., and Midhunchakkaravarthy. "Preventive Measures for the Impacts of Social Media Networks in Security and Privacy - A Review." Journal of ISMAC 3, no. 4 (2022): 291–300. http://dx.doi.org/10.36548/jismac.2021.4.001.
Full textWang, Xiaolei, and Yuexiang Yang. "PrivacyContext: identifying malicious mobile privacy leak using program context." International Journal of Information and Computer Security 11, no. 6 (2019): 562. http://dx.doi.org/10.1504/ijics.2019.10024486.
Full textWang, Xiaolei, and Yuexiang Yang. "PrivacyContext: identifying malicious mobile privacy leak using program context." International Journal of Information and Computer Security 11, no. 6 (2019): 562. http://dx.doi.org/10.1504/ijics.2019.103054.
Full textHeeger, Julian, Simon Bugert, Waldemar Berchtold, Alexander Gruler, and Martin Steinebach. "Privacy preserving leak detection in peer-to-peer communication." Electronic Imaging 35, no. 4 (2023): 377——1–377–6. http://dx.doi.org/10.2352/ei.2023.35.4.mwsf-377.
Full textDissertations / Theses on the topic "Privacy leak"
Abid, Younes. "Analyse automatisée des risques sur la vie privée dans les réseaux sociaux." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0088/document.
Full textAbid, Younes. "Analyse automatisée des risques sur la vie privée dans les réseaux sociaux." Electronic Thesis or Diss., Université de Lorraine, 2018. http://www.theses.fr/2018LORR0088.
Full textFarrell-Poe, Kitt, Lisa Jones-McLean, and Scott McLean. "Lead in Private Water Wells." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2010. http://hdl.handle.net/10150/156927.
Full textPieper, Kelsey J. "Characterizing Waterborne Lead in Private Water Systems." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/74273.
Full textOlejnik, Lukasz. "Measuring the Privacy Risks and Value of Web Tracking." Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GRENM002.
Full textMalek, Ramtin. "Lean principles application in public-private partnership project procurement." Bowling Green State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1394924437.
Full textCuri, Isadora Volpato. "Juristas e o Regime Militar (1964-1985): atuação de Victor Nunes Leal no STF e de Raymundo Faoro na OAB." Universidade de São Paulo, 2008. http://www.teses.usp.br/teses/disponiveis/8/8138/tde-21012009-104742/.
Full textCoster, Coenraad Jorke, and Wijk Sjoerd Van. "Lean project management : An exploratory research into lean project management in the Swedish public and private sector." Thesis, Umeå universitet, Företagsekonomi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-108020.
Full textSiqueiros, José Luis. "ROBERTO MAC LEAN. Las Personas Jurídicas en el Derecho Internacional Privado. Lima. 1963." Pontificia Universidad Católica del Perú, 2015. http://repositorio.pucp.edu.pe/index/handle/123456789/116711.
Full textKaukonen, Ulla Haapanen Heta-Liisa. "To lead or to follow? : a case study of an internationalization process /." Uppsala : Uppsala University. Department of Business Studies, 2008. http://www.diva-portal.org/smash/get/diva2:132312/FULLTEXT01.
Full textBooks on the topic "Privacy leak"
Liu, Wen Ming, and Lingyu Wang. Preserving Privacy Against Side-Channel Leaks. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-42644-0.
Full textBruijn, Hans. The Governance of Privacy. Amsterdam University Press, 2021. http://dx.doi.org/10.5117/9789463729673.
Full textBoyle, Alistair. What now, King Lear?: A Gil Yates private investigator novel. Allen A. Knoll, Publishers, 2001.
Find full textEd, Goodgold, ed. The armchair conductor: How to lead a symphony orchestrain the privacy of your own home. Titan, 1994.
Find full textAmerasinghe, Nihal. Losing the lead role: Has private capital flows edged out ODA? Gov. Jose B. fernances Jr. Center for Banking and Finance, 2006.
Find full textAna, Branco, and Caixa Cultural Rio de Janeiro, eds. Fotografia brasileira contemporânea na Coleção Carlos Leal. Francisco Alves, 2006.
Find full textDavid, Butcher. Pages from presses: Kelmscott, Ashendene, Doves, Vale, Eragny & Essex House. Whittington Press, 2006.
Find full textill, Smith Jamie, and Preller James, eds. The case of the four-leaf clover. Scholastic, 2008.
Find full textBook chapters on the topic "Privacy leak"
Wijaya, Dimaz Ankaa, Joseph K. Liu, Ron Steinfeld, and Dongxi Liu. "Transparency or Anonymity Leak: Monero Mining Pools Data Publication." In Information Security and Privacy. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90567-5_22.
Full textNegre, Christophe, and Guilherme Perin. "Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNS." In Information Security and Privacy. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19962-7_7.
Full textSlokom, Manel, Peter-Paul de Wolf, and Martha Larson. "When Machine Learning Models Leak: An Exploration of Synthetic Training Data." In Privacy in Statistical Databases. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13945-1_20.
Full textPrior, Suzanne, and Natalie Coull. "Parents Unwittingly Leak Their Children’s Data: A GDPR Time Bomb?" In HCI for Cybersecurity, Privacy and Trust. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50309-3_31.
Full textJain, Vineeta, Vijay Laxmi, Manoj Singh Gaur, and Mohamed Mosbah. "APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android." In Communications in Computer and Information Science. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-7561-3_16.
Full textLiang, Hongliang, Yudong Wang, Tianqi Yang, and Yue Yu. "AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applications." In Secure IT Systems. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03638-6_4.
Full textBakas, Alexandros, and Antonis Michalas. "Nowhere to Leak: A Multi-client Forward and Backward Private Symmetric Searchable Encryption Scheme." In Data and Applications Security and Privacy XXXV. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81242-3_5.
Full textKim, Chungha, Kangsoo Jung, and Seog Park. "A Method of Pre-detecting Privacy Leak in Social Network Service Using Collaborative Filtering." In Database Systems for Advanced Applications. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40270-8_13.
Full textLi, Zhizhou, and Ten H. Lai. "$$\delta $$-privacy: Bounding Privacy Leaks in Privacy Preserving Data Mining." In Lecture Notes in Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67816-0_8.
Full textSoroush, Hamed, Keen Sung, Erik Learned-Miller, Brian Neil Levine, and Marc Liberatore. "Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet." In Privacy Enhancing Technologies. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39077-7_6.
Full textConference papers on the topic "Privacy leak"
Shuba, Anastasia, Evita Bakopoulou, and Athina Markopoulou. "Privacy Leak Classification on Mobile Devices." In 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). IEEE, 2018. http://dx.doi.org/10.1109/spawc.2018.8445948.
Full textDeodhar, Leena, Dinil Mon Divakaran, and Mohan Gurusamy. "Analysis of Privacy Leak on Twitter." In 2017 IEEE Global Communications Conference (GLOBECOM 2017). IEEE, 2017. http://dx.doi.org/10.1109/glocom.2017.8254496.
Full textFan, Lejun, Yuanzhuo Wang, Xueqi Cheng, and Shuyuan Jin. "Quantitative analysis for privacy leak software with privacy Petri net." In the ACM SIGKDD Workshop. ACM Press, 2012. http://dx.doi.org/10.1145/2331791.2331798.
Full textWang, Xiaolei, Yuexiang Yang, Chuan Tang, Yingzhi Zeng, and Jie He. "DroidContext: Identifying Malicious Mobile Privacy Leak Using Context." In 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2016. http://dx.doi.org/10.1109/trustcom.2016.0142.
Full textHe, Xinglu, Kai Lu, and Gen Li. "Taint Reverse Propagation for Analysis of Privacy Leak." In 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2016. http://dx.doi.org/10.1109/trustcom.2016.0263.
Full textSchindler, Christian, Muslum Atas, Thomas Strametz, Johannes Feiner, and Reinhard Hofer. "Privacy Leak Identification in Third-Party Android Libraries." In 2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ). IEEE, 2022. http://dx.doi.org/10.1109/mobisecserv50855.2022.9727217.
Full textLeu, Patrick, Ivan Puddu, Aanjhan Ranganathan, and Srdjan Čapkun. "I Send, Therefore I Leak." In WiSec '18: 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks. ACM, 2018. http://dx.doi.org/10.1145/3212480.3212508.
Full textChen, Dongyao, Mert D. Pesé, and Kang G. Shin. "Guess Which Car Type I Am Driving: Information Leak via Driving Apps." In Inaugural International Symposium on Vehicle Security & Privacy. Internet Society, 2023. http://dx.doi.org/10.14722/vehiclesec.2023.23048.
Full textYue, Jiarui, Yajuan Qin, Shuai Gao, Wei Su, Guobiao He, and Ningchun Liu. "A Privacy-Preserving Route Leak Protection Mechanism Based on Blockchain." In 2021 IEEE International Conference on Information Communication and Software Engineering (ICICSE). IEEE, 2021. http://dx.doi.org/10.1109/icicse52190.2021.9404125.
Full textZhou, Yifan. "An Automated Pipeline for Privacy Leak Analysis of Android Applications." In 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 2021. http://dx.doi.org/10.1109/ase51524.2021.9678875.
Full textReports on the topic "Privacy leak"
Arnold, Zachary, Ilya Rahkovsky, and Tina Huang. Tracking AI Investment: Initial Findings From the Private Markets. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/20190011.
Full textAgüero, Jorge M., and Verónica Frisancho. Systematic Bias in Sensitive Health Behaviors and Its Impact on Treatment Effects: An Application to Violence against Women. Inter-American Development Bank, 2017. http://dx.doi.org/10.18235/0007031.
Full textStraume, Odd Rune, and Paulo Bastos. Preschool Education in Brazil: Does Public Supply Crowd Out Private Enrollment? Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0011518.
Full textOkwundu, Charles I., and Charles Shey Wiysonge. Which interventions improve the management of dual practice? SUPPORT, 2016. http://dx.doi.org/10.30846/160811.
Full textAmeri, Samuel, and Patrick Szary. PB2006105744 Needs for Oil and Gas Pipeline Safety and Security. Pipeline Research Council International, Inc. (PRCI), 2005. http://dx.doi.org/10.55274/r0012127.
Full textDukarski, Jennifer. Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles. SAE International, 2021. http://dx.doi.org/10.4271/epr2021019.
Full textBassi, Marina, and Catalina Covacevich. Briefly Noted: No. 19: July 2012: How Can We Bring the Best Talent to the Classroom? Preliminary Results of Elige Educar. Inter-American Development Bank, 2012. http://dx.doi.org/10.18235/0008197.
Full textAlbornoz, Facundo, Guillermo Cruces, and María Lombardi. Trusting Covid-19 recommendations: The role of experts, markets and governments. Inter-American Development Bank, 2023. http://dx.doi.org/10.18235/0005097.
Full textMicco, Alejandro, Eduardo Levy Yeyati, and Ugo Panizza. Should the Government Be in the Banking Business?: The Role of State-Owned and Development Banks. Inter-American Development Bank, 2004. http://dx.doi.org/10.18235/0010834.
Full textRibeiro, João A., Paulo J. Pereira, and Elísio M. Brandão. A real options model to determine the optimal contractual penalty for a BOT project. CICEE. Universidade Autónoma de Lisboa, 2021. http://dx.doi.org/10.26619/ual-cicee/wp06.2021.
Full text