Enterprise data breach: causes, challenges, prevention, and future directions

L Cheng, F Liu, D Yao - Wiley Interdisciplinary Reviews: Data …, 2017 - Wiley Online Library
A data breach is the intentional or inadvertent exposure of confidential information to
unauthorized parties. In the digital era, data has become one of the most critical components …

A tutorial on Reed–Solomon coding for fault‐tolerance in RAID‐like systems

JS Plank - Software: Practice and Experience, 1997 - Wiley Online Library
It is well‐known that Reed‐Solomon codes may be used to provide error correction for
multiple failures in RAID‐like systems. The coding technique itself, however, is not as well …

A comprehensive study of the past, present, and future of data deduplication

W **a, H Jiang, D Feng, F Douglis… - Proceedings of the …, 2016 - ieeexplore.ieee.org
Data deduplication, an efficient approach to data reduction, has gained increasing attention
and popularity in large-scale storage systems due to the explosive growth of digital data. It …

On the resemblance and containment of documents

AZ Broder - … and Complexity of SEQUENCES 1997 (Cat. No …, 1997 - ieeexplore.ieee.org
Given two documents A and B we define two mathematical notions: their resemblance r (A,
B) and their containment c (A, B) that seem to capture well the informal notions of" roughly …

Summary cache: a scalable wide-area web cache sharing protocol

L Fan, P Cao, J Almeida… - IEEE/ACM transactions on …, 2000 - ieeexplore.ieee.org
The sharing of caches among Web proxies is an important technique to reduce Web traffic
and alleviate network bottlenecks. Nevertheless it is not widely deployed due to the …

[КНИГА][B] Network anomaly detection: A machine learning perspective

DK Bhattacharyya, JK Kalita - 2013 - books.google.com
With the rapid rise in the ubiquity and sophistication of Internet technology and the
accompanying growth in the number of network attacks, network intrusion detection has …

A survey on data leakage prevention systems

S Alneyadi, E Sithirasenan… - Journal of Network and …, 2016 - Elsevier
Protection of confidential data from being leaked to the public is a growing concern among
organisations and individuals. Traditionally, confidentiality of data has been preserved using …

Identifying and filtering near-duplicate documents

AZ Broder - Annual symposium on combinatorial pattern matching, 2000 - Springer
The mathematical concept of document resemblance captures well the informal notion of
syntactic similarity. The resemblance can be estimated using a fixed size “sketch” for each …

Mercator: A scalable, extensible web crawler

A Heydon, M Najork - World Wide Web, 1999 - Springer
This paper describes Mercator, a scalable, extensible Web crawler written entirely in Java.
Scalable Web crawlers are an important component of many Web services, but their design …

WITHDRAWN: Dynamic remote data auditing for securing big data storage in cloud computing

M Sookhak, A Gani, MK Khan, R Buyya - 2017 - Elsevier
WITHDRAWN: Dynamic remote data auditing for securing big data storage in cloud
computing - ScienceDirect Skip to main contentSkip to article Elsevier logo Journals & …