JM Beaver… - 2011 - osti.gov The host-based detection of malicious data exfiltration activities is currently a sparse area of research and mostly limited to methods that analyze network traffic or signature based detection methods that target specific processes. In this paper we explore an alternative method to ... Cached
C Karpf… - Water Science & Technology, 2011 - iwaponline.com Exfiltration of waste water from sewer systems represents a potential danger for the soil and the aquifer. Common models, which are used to describe the exfiltration process, are based on the law of Darcy, extended by a more or less detailed consideration of the expansion of leaks, ...
RA Brown… - Journal of Environmental Engineering, 2011 - link.aip.org The bioretention drainage configuration of raising the outlet to create an internal water storage (IWS) layer in the media was originally intended to promote denitrifying conditions. The goal was to reduce nitrate and total nitrogen concentrations in nutrient sensitive watersheds. ... Cited by 1
E Bertino… - Proceedings of the 6th ACM Symposium on …, 2011 - portal.acm.org ABSTRACT Data represent an extremely important asset for any organization. Confidential data such as military secrets or intellectual property must never be disclosed outside the organization. Therefore, one of the most severe threats in the case of cyber-insider ... Related articles
Y Liu - 2011 - gradworks.umi.com To conceal (namely, hide ) sensitive data in network traffic, we propose a method to establish advance covert timing channels that can evade detection by mimicking the statistical characteristics of legitimate (also referred to as overt) traffic. In addition, we combine this scheme with an ... Cached