[go: up one dir, main page]

Naryshkin, 2010 - Google Patents

Study on the Leakage of Private User Information Via a Range of Popular Websites

Naryshkin, 2010

View PDF
Document ID
7235422095634471618
Author
Naryshkin K
Publication year

External Links

Snippet

On the modern web, many sites have third party content, be it through maps, embedded objects, ads, or through other types. Users pay little attention to the source of this content since it is such a common occurrence. Unfortunately, this content can be an avenue for third …
Continue reading at digital.wpi.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Similar Documents

Publication Publication Date Title
Papadopoulos et al. Cookie synchronization: Everything you always wanted to know but were afraid to ask
Brandenburg The newest way to screen job applicants: A social networker's nightmare
Falahrastegar et al. Tracking personal identifiers across the web
Aimeur et al. Towards a privacy-enhanced social networking site
Moore et al. The impact of incentives on notice and take-down
Chen et al. Privacy issues and solutions in social network sites
Rooke Four pillars of internet research ethics with Web 2.0
Kalpakis et al. OSINT and the Dark Web
Cutillo et al. Security and privacy in online social networks
Han et al. On the infrastructure providers that support misinformation websites
Ge et al. Your privacy information are leaking when you surfing on the social networks: A survey of the degree of online self-disclosure (DOSD)
Hanser Gang-related cyber and computer crimes: Legal aspects and practical points of consideration in investigations
Bradbury Anonymity and privacy: a guide for the perplexed
Venugeetha et al. Social networking sites in daily life: Benefits and threats
Sanvenero Social media and our misconceptions of the realities
US20200034487A1 (en) Method of Implementing A Topic Based Social Media Network
Lisičar et al. Implementation of GDPR transparency principle in personal data processing by croatian online news sites
Al Jawaheri Deanonymizing Tor hidden service users through Bitcoin transactions analysis
Décary-Hétu Online crime monitoring
Johnson et al. Inadvertent Disclosure-Information Leaks in the Extended Enterprise.
Naryshkin Study on the Leakage of Private User Information Via a Range of Popular Websites
Henricks Social Media, Publicly Available Information, and the Intelligence Community
Bossler 3 Cybercrime research at the crossroads: where the field currently stands and innovative strategies to move forward
Freudiger et al. Towards privacy-friendly online advertising
Haddadi et al. To add or not to add: privacy and social honeypots