{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:15:42Z","timestamp":1742998542781,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030562229"},{"type":"electronic","value":"9783030562236"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-56223-6_16","type":"book-chapter","created":{"date-parts":[[2020,9,6]],"date-time":"2020-09-06T15:03:24Z","timestamp":1599404604000},"page":"291-308","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detecting Local Machine Data Leakage in Real Time"],"prefix":"10.1007","author":[{"given":"Jingcheng","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yaping","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuze","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yongheng","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Yao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,6]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"S. Ananthi, M. Sendil and S. Karthik, Privacy preserving keyword search over encrypted cloud data, in Advances in Computing and Communications, A. Abraham, J. Lloret Mauri, J. Buford and S. Thampi (Eds.), Springer, Berlin Heidelberg, Germany, pp. 480\u2013487, 2011.","DOI":"10.1007\/978-3-642-22709-7_47"},{"key":"16_CR2","unstructured":"CALO Project, Enron Email Dataset, SRI International, Menlo Park, California (www.cs.cmu.edu\/\u00a0.\/enron), 2015."},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"F. Chen, D. Wang, R. Li, J. Chen, Z. Ming, A. Liu, H. Duan, C. Wang and J. Qin, Secure hashing based verifiable pattern matching, IEEE Transactions on Information Forensics and Security, vol. 13(11), pp. 2677\u20132690, 2018.","DOI":"10.1109\/TIFS.2018.2825141"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"S. Gog and E. Ohlebusch, Fast and lightweight LCP-array construction algorithms, Proceedings of the Meeting on Algorithm Engineering and Experiments, pp. 25\u201334, 2011.","DOI":"10.1137\/1.9781611972917.3"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"S. Jha, L. Kruger and V. Shmatikov, Towards practical privacy for genomic computation, Proceedings of the IEEE Symposium on Security and Privacy, pp. 216\u2013230, 2008.","DOI":"10.1109\/SP.2008.34"},{"key":"16_CR6","unstructured":"C. Kalyan and K. Chandrasekaran, Information leak detection in financial email using mail pattern analysis under partial information, Proceedings of the Seventh WSEAS International Conference on Applied Informatics and Communications, vol. 7, pp. 104\u2013109, 2007."},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"T. Kasai, G. Lee, H. Arimura, S. Arikawa and K. Park, Linear-time longest-common-prefix computation in suffix arrays and its applications, Proceedings of the Twelfth Annual Symposium on Combinatorial Pattern Matching, pp. 181\u2013192, 2001.","DOI":"10.1007\/3-540-48194-X_17"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"H. Kim, H. Hong, H. Kim and S. Kang, Memory-efficient parallel string matching for intrusion detection systems, IEEE Communications Letters, vol. 13(12), pp. 1004\u20131006, 2009.","DOI":"10.1109\/LCOMM.2009.12.082230"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"K. Li, Z. Zhong and L. Ramaswamy, Privacy-aware collaborative spam filtering, IEEE Transactions on Parallel and Distributed Systems, vol. 20(5), pp. 725\u2013739, 2009.","DOI":"10.1109\/TPDS.2008.143"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"P. Lin, Y. Lin, Y. Lai and T. Lee, Using string matching for deep packet inspection, IEEE Computer, vol. 41(4), pp. 23\u201328, 2008.","DOI":"10.1109\/MC.2008.138"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"F. Liu, X. Shu, D. Yao and A. Butt, Privacy-preserving scanning of big content for sensitive data exposure with MapReduce, Proceedings of the Fifth ACM Conference on Data and Application Security and Privacy, pp. 195\u2013206, 2015.","DOI":"10.1145\/2699026.2699106"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"U. Manber and G. Myers, Suffix arrays: A new method for on-line string searches, SIAM Journal on Computing, vol. 22(5), pp. 935\u2013948, 1993.","DOI":"10.1137\/0222058"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Y. Shi, Z. Jiang and K. Zhang, Policy-based customized privacy preserving mechanism for SaaS applications, Proceedings of the Eighth International Conference on Grid and Pervasive Computing and Collocated Workshops, pp. 491\u2013500, 2013.","DOI":"10.1007\/978-3-642-38027-3_52"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"X. Shu, D. Yao and E. Bertino, Privacy-preserving detection of sensitive data exposure, IEEE Transactions on Information Forensics and Security, vol. 10(5), pp. 1092\u20131103, 2015.","DOI":"10.1109\/TIFS.2015.2398363"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"X. Shu, J. Zhang, D. Yao and W. Feng, Rapid and parallel content screening for detecting transformed data exposure, Proceedings of the IEEE Conference on Computer Communications Workshops, pp. 191\u2013196, 2015.","DOI":"10.1109\/INFCOMW.2015.7179383"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"X. Shu, J. Zhang, D. Yao and W. Feng, Fast detection of transformed data leaks, IEEE Transactions on Information Forensics and Security, vol. 11(3), pp. 528\u2013542, 2016.","DOI":"10.1109\/TIFS.2015.2503271"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"B. Wang, S. Yu, W. Lou and Y. Hou, Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud, Proceedings of the IEEE Conference on Computer Communications, pp. 2112\u20132120, 2014.","DOI":"10.1109\/INFOCOM.2014.6848153"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"D. Wang, X. Jia, C. Wang, K. Yang, S. Fu and M. Xu, Generalized pattern matching string search on encrypted data in cloud systems, Proceedings of the IEEE Conference on Computer Communications, pp. 2101\u20132109, 2015.","DOI":"10.1109\/INFOCOM.2015.7218595"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"H. Wang, K. Tseng and J. Pan, Deep packet inspection with bit-reduced DFA for cloud systems, Proceedings of the International Conference on Computing, Measurement, Control and Sensor Networks, pp. 221\u2013224, 2012.","DOI":"10.1109\/CMCSN.2012.56"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"J. Zhou, Z. Cao and X. Dong, PPOPM: More efficient privacy preserving outsourced pattern matching, Proceedings of the Twenty-First European Symposium on Research in Computer Security, part I, pp. 135\u2013153, 2016.","DOI":"10.1007\/978-3-319-45744-4_7"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics XVI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-56223-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:05:13Z","timestamp":1725581113000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-56223-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030562229","9783030562236"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-56223-6_16","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"6 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DigitalForensics","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Digital Forensics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Delhi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 January 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 January 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"digitalforensics2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ifip119.org\/Conferences\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}