Sensitive Data Leak Detection Based on Boundary Detection
暂无分享,去创建一个
Shang Gao | Tao Li | Xue Fei Jia | Ning Bu
[1] Tadao Takaoka,et al. On improving the average case of the Boyer-Moore string matching algorithm , 1988 .
[2] Sin Yeung Lee,et al. Network Forensics on Packet Fingerprints , 2006, SEC.
[3] Leonidas J. Guibas,et al. A New Proof of the Linearity of the Boyer-Moore String Searching Algorithm , 1980, SIAM J. Comput..
[4] Daniel Sunday,et al. A very fast substring search algorithm , 1990, CACM.
[5] Ricardo A. Baeza-Yates,et al. String Searching Algorithms Revisited , 1989, WADS.
[6] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[7] Martin A. Green,et al. High-efficiency silicon solar cells , 1984, IEEE Transactions on Electron Devices.
[8] Hector Garcia-Molina,et al. A Model for Data Leakage Detection , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[9] Zheng Tao. Dynamic privacy protection model based on Android permissions , 2012 .
[10] Boris Beizer,et al. Black Box Testing: Techniques for Functional Testing of Software and Systems , 1996, IEEE Software.
[11] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[12] Ron Y. Pinter,et al. Efficient String Matching with Don’t-Care Patterns , 1985 .
[13] Hector Garcia-Molina,et al. Data Leakage Detection , 2011, IEEE Transactions on Knowledge and Data Engineering.
[14] D. Maric,et al. Interstitial H and {H,B}, {H,C}and {H,Si} Pairs in Si and Ge , 1992 .
[15] Bo Qu,et al. Test Case Prioritization for Black Box Testing , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).