Against Employer Dumpster Diving for E-Mail

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Energy Dumpster Diving

Power data alone cannot identify sources of energy inefficiency. However, correlating power data with utilization statistics can reveal where power is used well and where it is wasted. We describe a sensing infrastructure, PowerNet, that monitors power and utilization in a building environment. The deployment includes both wired and wireless sensors and covers offices, networking closets, and s...

متن کامل

Linguistic Dumpster Diving: Geographical Classification of Arabic Text

In many applied natural language processing tasks, information is thrown out. For example, in speech recognition systems, prosodic information is commonly discarded; in information retrieval systems, a document is commonly treated as an unordered bag of words and syntactic information is thrown out; and in machine translation systems, pragmatic information (e.g., topic-comment structure and ref...

متن کامل

Trap E-mail Address for Combating E-mail Viruses

The biggest infection events show that the most dangerous viruses propagate via the Internet email systems. We propose a new solution to accelerate the identification of infected computers after an attack by e-mail viruses. Our approach uses trap e-mail addresses secured by a feasible cryptographic technique. The novelty of our work is the introduction of virtual e-mail addresses to identify vi...

متن کامل

Cyber Dumpster-Diving: $Recycle.Bin Forensics for Windows 7 and Windows Vista

Analysis of deleted files often provides useful information for the forensic computer examiner. Knowing where to find the deleted files, and how to interpret the metadata associated with the file’s deletion, make up the cornerstone of a successful forensic computer examination. Much like an office trash-can, the Microsoft Windows Recycle Bin is a temporary holding container for files that have ...

متن کامل

Dumpster diving in RNA - sequencing to find the source of every last read

High throughput RNA sequencing technologies have provided invaluable research opportunities across distinct scientific domains by producing quantitative readouts of the transcriptional activity of both entire cellular populations and single cells. The majority of RNA-Seq analyses begin by mapping each experimentally produced sequence (i.e., read) to a set of annotated reference sequences for th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SSRN Electronic Journal

سال: 2012

ISSN: 1556-5068

DOI: 10.2139/ssrn.2129523