Naryshkin, 2010 - Google Patents
Study on the Leakage of Private User Information Via a Range of Popular WebsitesNaryshkin, 2010
View PDF- Document ID
- 7235422095634471618
- Author
- Naryshkin K
- Publication year
External Links
Snippet
On the modern web, many sites have third party content, be it through maps, embedded objects, ads, or through other types. Users pay little attention to the source of this content since it is such a common occurrence. Unfortunately, this content can be an avenue for third …
- 235000014510 cooky 0 description 30
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Papadopoulos et al. | Cookie synchronization: Everything you always wanted to know but were afraid to ask | |
Brandenburg | The newest way to screen job applicants: A social networker's nightmare | |
Falahrastegar et al. | Tracking personal identifiers across the web | |
Aimeur et al. | Towards a privacy-enhanced social networking site | |
Moore et al. | The impact of incentives on notice and take-down | |
Chen et al. | Privacy issues and solutions in social network sites | |
Rooke | Four pillars of internet research ethics with Web 2.0 | |
Kalpakis et al. | OSINT and the Dark Web | |
Cutillo et al. | Security and privacy in online social networks | |
Han et al. | On the infrastructure providers that support misinformation websites | |
Ge et al. | Your privacy information are leaking when you surfing on the social networks: A survey of the degree of online self-disclosure (DOSD) | |
Hanser | Gang-related cyber and computer crimes: Legal aspects and practical points of consideration in investigations | |
Bradbury | Anonymity and privacy: a guide for the perplexed | |
Venugeetha et al. | Social networking sites in daily life: Benefits and threats | |
Sanvenero | Social media and our misconceptions of the realities | |
US20200034487A1 (en) | Method of Implementing A Topic Based Social Media Network | |
Lisičar et al. | Implementation of GDPR transparency principle in personal data processing by croatian online news sites | |
Al Jawaheri | Deanonymizing Tor hidden service users through Bitcoin transactions analysis | |
Décary-Hétu | Online crime monitoring | |
Johnson et al. | Inadvertent Disclosure-Information Leaks in the Extended Enterprise. | |
Naryshkin | Study on the Leakage of Private User Information Via a Range of Popular Websites | |
Henricks | Social Media, Publicly Available Information, and the Intelligence Community | |
Bossler | 3 Cybercrime research at the crossroads: where the field currently stands and innovative strategies to move forward | |
Freudiger et al. | Towards privacy-friendly online advertising | |
Haddadi et al. | To add or not to add: privacy and social honeypots |