In this paper we elaborate a near-duplicate and plagiarism detection service that combines both Crowd and Cloud computing in searching for and evaluating matching documents. We believe that our approach could be used across collaborating or competing Enterprises, or against the web, without any Enterprise needing to reveal the contents of its corporate (confidential) documents. The Cloud service involves a novel document fingerprinting approach which derives grammatical patterns but does not require grammatical knowledge and does not rely on hash-based approaches. Our approach generates a lossy and highly compressed document signature from which it is possible to generate fixed-length patterns as fingerprints or shingles. Fingerprint sizes...
We describe a network-based data-leak detection (DLD) technique, the main feature of which is that t...
Abstract—Provenance is derivative journal information about the origin and activities of system data...
This paper introduces a novel technique to detect spoof or fake software systems via the generation ...
In this paper we elaborate a near-duplicate and plagiarism detection service that combines both Cro...
AbstractCloud outpouring is careful when an information distributor has given sensitive data to a se...
Abstract. We describe a network-based data-leak detection (DLD) technique, the main feature of which...
The article can be viewed at: http://www.digitalforensics-conference.org/subscriptions/issues/CDFSL-...
In the virtual and widely distributed network, the process of handover sensitive data from the distr...
Today the present world mostly depends on exchange of information i.e. transfer of data from one per...
Since the internet is so big and most of its content is public, it is very hard to find out where th...
This paper provides an overview of the dual challenges involved in protecting intellectual property ...
The KOPI Online Plagiarism Search Portal ? a nationwide plagiarism service in Hungary ? is a unique,...
This paper introduces two concepts: Canary Files and a Canary File management system. A Canary File ...
With the emerging growth of digital data in information systems, technology faces the challenge of k...
The Cloud is an environment designed for the provision of on-demand resource sharing and data access...
We describe a network-based data-leak detection (DLD) technique, the main feature of which is that t...
Abstract—Provenance is derivative journal information about the origin and activities of system data...
This paper introduces a novel technique to detect spoof or fake software systems via the generation ...
In this paper we elaborate a near-duplicate and plagiarism detection service that combines both Cro...
AbstractCloud outpouring is careful when an information distributor has given sensitive data to a se...
Abstract. We describe a network-based data-leak detection (DLD) technique, the main feature of which...
The article can be viewed at: http://www.digitalforensics-conference.org/subscriptions/issues/CDFSL-...
In the virtual and widely distributed network, the process of handover sensitive data from the distr...
Today the present world mostly depends on exchange of information i.e. transfer of data from one per...
Since the internet is so big and most of its content is public, it is very hard to find out where th...
This paper provides an overview of the dual challenges involved in protecting intellectual property ...
The KOPI Online Plagiarism Search Portal ? a nationwide plagiarism service in Hungary ? is a unique,...
This paper introduces two concepts: Canary Files and a Canary File management system. A Canary File ...
With the emerging growth of digital data in information systems, technology faces the challenge of k...
The Cloud is an environment designed for the provision of on-demand resource sharing and data access...
We describe a network-based data-leak detection (DLD) technique, the main feature of which is that t...
Abstract—Provenance is derivative journal information about the origin and activities of system data...
This paper introduces a novel technique to detect spoof or fake software systems via the generation ...