Skip to search formSkip to main contentSkip to account menu

Information leakage

Information leakage happens whenever a system that is designed to be closed to an eavesdropper reveals some information to unauthorized parties… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Information security has become an important concern in healthcare systems, owing to the increasing prevalence of medical devices… 
2010
2010
This study presents the results of a multidisciplinary approach, using hydrogeochemical, isotopic and ecotoxicological analyses… 
Highly Cited
2009
Highly Cited
2009
Abstract. The impact of CO2 seepage on the solubility and distribution of the redox-sensitive metals iron, manganese, and cobalt… 
2008
2008
The relation between the phase separated morphologies and their transport properties in the polymer blend membrane for direct… 
2007
2007
In addition to the inherent qualities that biometrics posses, powerful signal processing tools enabled widespread deployment of… 
Highly Cited
2006
Highly Cited
2006
There are challenges associated with the numerical modelling of unsaturated expansive soils. The challenges are primarily related… 
Highly Cited
2004
Highly Cited
2004
This paper presents the operating principle and steady-state analysis of a novel excitation scheme for a stand-alone three-phase… 
Highly Cited
2001
Highly Cited
2001
This paper presents evidence of persistent anomalies in internet firms' stock returns surrounding their quarterly earnings… 
Review
2000
Review
2000
We review a powerful temporal-based algorithm, a triple temporal filter (TTF) with six input parameters, for detecting and… 
Highly Cited
2000
Highly Cited
2000
We research and document that the abnormal returns earned by Australian bidders and targets over the bid announcement period are…