I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
p
ute
r
E
ng
in
ee
ring
(
I
J
E
CE
)
Vo
l.
8
,
No
.
4
,
A
u
g
u
s
t
201
8
,
p
p
.
2
2
4
7
~
2
2
5
3
I
SS
N:
2088
-
8708
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ec
e
.
v
8
i
4
.
p
p
2
2
4
7
-
2253
2247
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
co
r
e
.
co
m/
jo
u
r
n
a
ls
/in
d
ex
.
p
h
p
/
I
JE
C
E
A
Surv
ey
:
Da
ta L
ea
k
age
De
tec
tion
Techniqu
es
K
.
S.
Wa
g
h
De
p
a
rtme
n
t
o
f
Co
m
p
u
ter E
n
g
in
e
e
rin
g
,
A
ll
In
d
ia S
h
ri
S
h
iv
a
ji
M
e
m
o
rial
S
o
c
iety
'
s
In
stit
u
te o
f
In
f
o
rm
a
ti
o
n
T
e
c
h
n
o
lo
g
y
,
S
a
v
it
rib
ia
P
h
u
le
P
u
n
e
U
n
iv
e
rsity
,
P
u
n
e
,
In
d
ia
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Sep
26
,
2
0
1
7
R
ev
i
s
ed
Feb
19
,
2
0
1
8
A
cc
ep
ted
A
p
r
1
3
,
2
0
1
8
Da
ta
is
a
n
im
p
o
rtan
t
p
r
o
p
e
rty
o
f
v
a
rio
u
s
o
rg
a
n
iza
ti
o
n
s
a
n
d
it
is
i
n
tellec
tu
a
l
p
ro
p
e
rty
o
f
o
rg
a
n
iza
ti
o
n
.
Ev
e
ry
o
rg
a
n
iza
ti
o
n
in
c
l
u
d
e
s
se
n
siti
v
e
d
a
ta
a
s
c
u
sto
m
e
r
in
f
o
r
m
a
ti
o
n
,
f
in
a
n
c
ial
d
a
ta,
d
a
ta o
f
p
a
ti
e
n
t,
p
e
rs
o
n
a
l
c
re
d
i
t
c
a
rd
d
a
ta
a
n
d
o
th
e
r
i
n
f
o
rm
a
ti
o
n
b
a
se
d
o
n
th
e
k
in
d
s
o
f
m
a
n
a
g
e
m
e
n
t,
i
n
stit
u
te
o
r
in
d
u
stry
.
F
o
r
th
e
a
re
a
s
li
k
e
th
is,
l
e
a
k
a
g
e
o
f
in
f
o
r
m
a
ti
o
n
is
th
e
c
ru
c
i
a
l
p
ro
b
lem
th
a
t
th
e
o
rg
a
n
iza
ti
o
n
h
a
s
to
f
a
c
e
,
th
a
t
p
o
se
s
h
ig
h
c
o
st
if
in
f
o
r
m
a
ti
o
n
lea
k
a
g
e
is
d
o
n
e
.
A
ll
th
e
m
o
re
d
e
f
in
it
e
l
y
,
in
f
o
rm
a
ti
o
n
lea
k
a
g
e
is
c
h
a
ra
c
te
rize
a
s
th
e
in
ten
ti
o
n
a
l
e
x
p
o
s
u
re
o
f
in
d
iv
id
u
a
l
o
r
a
n
y
so
rt
o
f
in
f
o
rm
a
ti
o
n
to
u
n
a
p
p
r
o
v
e
d
o
u
tsi
d
e
rs
.
W
h
e
n
th
e
im
p
o
rtan
t
i
n
f
o
rm
a
ti
o
n
is
g
o
e
s
to
u
n
a
p
p
r
o
v
e
d
h
a
n
d
s
o
r
m
o
v
e
s
to
w
a
rd
s
u
n
a
u
t
h
o
rize
d
d
e
s
ti
n
a
ti
o
n
.
T
h
is
w
il
l
p
r
o
m
p
ts
th
e
d
irec
t
a
n
d
in
d
irec
t
l
o
ss
o
f
p
a
rti
c
u
lar
in
d
u
str
y
in
ter
m
s
o
f
c
o
st
a
n
d
ti
m
e
.
T
h
e
i
n
f
o
rm
a
ti
o
n
lea
k
a
g
e
is
o
u
tco
m
e
s
in
v
u
ln
e
ra
b
i
li
ty
o
r
it
s
m
o
d
if
ica
ti
o
n
.
S
o
i
n
f
o
rm
a
ti
o
n
c
a
n
b
e
p
r
o
tec
ted
b
y
th
e
o
u
tsi
d
e
r
lea
k
a
g
e
s.
T
o
so
lv
e
th
is
issu
e
th
e
re
m
u
st
b
e
a
n
e
ff
ici
e
n
t
a
n
d
e
ff
e
c
ti
v
e
s
y
ste
m
to
a
v
o
id
a
n
d
p
ro
tec
t
a
u
th
o
rize
d
i
n
f
o
r
m
a
ti
o
n
.
F
ro
m
n
o
t
so
lo
n
g
m
a
n
y
m
e
th
o
d
s
h
a
v
e
b
e
e
n
i
m
p
le
m
e
n
ted
to
so
lv
e
sa
m
e
t
y
p
e
o
f
p
ro
b
lem
s
th
a
t
a
re
a
n
a
ly
z
e
d
h
e
re
in
th
is
su
rv
e
y
.
T
h
is
p
a
p
e
r
a
n
a
ly
z
e
s
li
tt
le
late
st
tec
h
n
iq
u
e
s
a
n
d
p
ro
p
o
se
d
n
o
v
e
l
S
a
m
p
li
n
g
a
lg
o
rit
h
m
b
a
se
d
d
a
ta
lea
k
a
g
e
d
e
tec
ti
o
n
tec
h
n
i
q
u
e
s.
K
ey
w
o
r
d
:
C
o
n
te
n
t i
n
s
p
ec
tio
n
Data
leak
a
g
e
d
etec
tio
n
D
y
n
a
m
ic
p
r
o
g
r
a
m
m
i
n
g
I
n
tr
u
s
io
n
d
etec
tio
n
s
y
s
te
m
Sa
m
p
li
n
g
al
g
o
r
it
h
m
Co
p
y
rig
h
t
©
2
0
1
8
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts
re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
K.
S.
W
ag
h
,
Dep
ar
t
m
en
t o
f
C
o
m
p
u
ter
E
n
g
i
n
ee
r
in
g
,
A
ll I
n
d
ia
Sh
r
i
Sh
i
v
aj
i M
e
m
o
r
i
al
So
ciet
y
'
s
I
n
s
ti
tu
te
o
f
I
n
f
o
r
m
atio
n
T
ec
h
n
o
lo
g
y
,
Sav
itrib
ia
P
h
u
le
P
u
n
e
U
n
i
v
er
s
it
y
,
P
u
n
e
,
I
n
d
ia.
E
m
ail:
w
a
g
h
k
s
@
g
m
ail.
co
m
1.
I
NT
RO
D
UCT
I
O
N
Data
leak
ag
e
i
n
n
o
th
i
n
g
b
u
t
a
g
etti
n
g
ac
ce
s
s
o
f
a
i
m
p
o
r
tan
t
d
ata
o
f
a
p
er
s
o
n
o
r
o
f
an
o
r
g
an
izatio
n
b
y
u
n
a
u
t
h
o
r
ized
u
s
er
.
I
m
p
o
r
ta
n
t
d
ata
o
f
o
r
g
an
izatio
n
ca
n
h
a
v
e
in
f
o
r
m
atio
n
c
u
s
to
m
er
,
b
u
s
i
n
ess
p
la
n
s
,
f
i
n
an
cia
l
co
n
d
itio
n
,
i
n
f
o
r
m
atio
n
o
f
p
ati
en
ts
,
cr
ed
it
-
ca
r
d
d
ata
o
f
e
m
p
lo
y
s
a
n
d
s
o
o
n
d
ep
en
d
in
g
o
n
th
e
b
u
s
i
n
es
s
o
r
a
p
er
s
o
n
o
r
in
d
u
s
tr
y
.
B
u
t i
n
v
ar
i
o
u
s
ca
s
e
s
o
w
n
er
m
u
s
t s
h
ar
e
it
s
d
ata
w
ith
its
e
m
p
lo
y
ee
s
l
ik
e
w
h
e
n
an
e
m
p
lo
y
ee
s
ar
e
w
o
r
k
i
n
g
f
o
r
h
o
m
e
u
s
i
n
g
h
i
s
o
w
n
d
ev
ice
o
r
w
ith
t
h
e
cu
s
to
m
er
s
etc.
T
h
is
w
ill
r
aise
a
p
o
s
s
ib
ilit
y
o
f
i
m
p
o
r
tan
t
d
ata
f
allin
g
in
to
w
r
o
n
g
h
a
n
d
s
.
W
h
ich
m
a
y
b
e
th
e
r
esu
lt
o
f
s
o
m
e
ac
cid
en
t
o
r
a
m
is
tak
e
b
y
t
h
e
p
er
s
o
n
m
a
y
b
e
f
r
o
m
t
h
e
o
n
e
w
h
o
is
w
o
r
k
i
n
g
in
th
e
o
r
g
an
izatio
n
o
r
b
y
t
h
e
o
u
ts
id
er
s
s
u
ch
as
h
ac
k
er
s
,
ca
n
af
f
ec
t
t
h
e
o
r
g
an
izat
io
n
.
T
h
e
o
r
g
an
izat
io
n
ca
n
s
u
f
f
er
f
r
o
m
m
aj
o
r
d
am
ag
e
d
u
e
to
d
ata
leak
.
P
r
esen
t
s
y
s
te
m
s
f
o
r
d
ata
leak
d
etec
tio
n
ar
e
d
e
p
en
d
in
g
o
n
s
et
i
n
ter
s
ec
t
io
n
.
Set
i
n
ter
s
ec
tio
n
is
d
o
n
e
o
n
t
w
o
s
ets
o
f
n
-
g
r
a
m
s
,
o
n
e
f
r
o
m
t
h
e
co
n
te
n
t
a
n
d
o
n
e
f
r
o
m
s
e
n
s
i
tiv
e
d
ata.
T
h
e
s
et
i
n
t
er
s
ec
tio
n
g
iv
e
s
th
e
n
u
m
b
er
o
f
s
e
n
s
i
tiv
e
n
-
g
r
a
m
s
a
p
p
ea
r
in
g
in
t
h
e
co
n
te
n
t.
I
n
s
u
c
h
a
w
a
y
d
ata
leak
a
g
e
b
ec
o
m
e
th
e
h
u
g
e
i
s
s
u
e
f
o
r
v
ar
io
u
s
i
n
d
iv
id
u
al
u
s
er
,
in
d
u
s
tr
ie
s
an
d
in
s
t
itu
tes.
A
h
u
g
e
p
r
o
b
lem
o
f
th
e
h
o
n
es
t
y
o
f
t
h
e
u
s
er
s
o
f
th
o
s
e
o
r
g
an
izat
io
n
/s
y
s
te
m
s
i
s
r
a
is
ed
.
I
t
w
ill
to
u
g
h
f
o
r
th
e
p
er
s
o
n
to
f
i
n
d
o
u
t
t
h
e
d
ata
leak
in
t
h
e
v
ar
io
u
s
u
s
er
s
.
I
t
also
ca
n
cr
ea
te
eth
ical
p
r
o
b
lem
s
in
w
o
r
k
in
g
o
r
g
an
izatio
n
.
T
h
e
p
o
ten
tial
h
a
r
m
an
d
an
ta
g
o
n
is
tic
r
es
u
lt
s
o
f
an
in
f
o
r
m
atio
n
leak
e
v
e
n
t
ca
n
b
e
r
eq
u
ested
in
to
th
e
t
w
o
cla
s
s
e
s
:
d
ir
ec
t
an
d
in
d
ir
ec
t
lo
s
s
.
Dir
ec
t
lo
s
s
lin
k
to
u
n
m
is
tak
ab
le
h
ar
m
th
a
t
is
d
ef
i
n
itel
y
n
o
t
h
ar
d
to
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
8
,
No
.
4
,
A
u
g
u
s
t
201
8
:
2
2
4
7
–
2
2
5
3
2248
m
ea
s
u
r
e
an
d
ass
e
s
s
q
u
a
n
titat
iv
el
y
.
I
n
d
ir
ec
t
lo
s
s
is
m
u
c
h
h
ar
d
er
to
m
ea
s
u
r
e
an
d
h
as
a
s
u
b
s
ta
n
tiall
y
m
o
r
e
ex
ten
s
i
v
e
ef
f
ec
t
r
eg
ar
d
in
g
co
s
t
an
d
ti
m
e.
Dir
ec
t
lo
s
s
allu
d
es
to
b
r
ea
k
in
g
t
h
e
g
u
id
eli
n
es
ca
n
co
m
e
ab
o
u
t
u
p
lo
s
s
o
f
f
u
tu
r
e
s
ales,
e
x
p
en
s
es
o
f
ex
a
m
i
n
atio
n
a
n
d
m
ed
icin
al
/r
eb
u
ild
in
g
ch
ar
g
es.
I
n
d
ir
ec
t
lo
s
s
ca
n
b
e
r
es
u
lt
i
n
less
s
h
ar
e
-
co
s
t
as
a
co
n
s
eq
u
e
n
ce
o
f
th
e
n
e
g
ati
v
e
p
u
b
licit
y
;
ca
n
in
f
l
u
e
n
ce
th
e
r
ep
u
tatio
n
o
f
o
r
g
an
izatio
n
o
r
I
n
tel
lect
u
al
P
r
o
p
er
ty
to
co
m
p
etito
r
s
.
No
v
el
s
o
lu
tio
n
i
s
f
o
r
s
ea
r
c
h
i
n
g
t
h
e
tr
an
s
f
o
r
m
ed
leak
a
g
e
in
i
n
f
o
r
m
atio
n
u
s
i
n
g
a
s
eq
u
e
n
ce
alig
n
m
e
n
t
alg
o
r
ith
m
,
w
h
ic
h
is
ex
ec
u
ted
o
n
th
e
s
a
m
p
led
d
eleg
ate
d
ata
s
eq
u
en
ce
as
w
ell
as
t
h
e
s
a
m
p
l
ed
s
u
b
s
tan
ce
s
.
T
h
e
alig
n
m
e
n
t
p
r
o
ce
s
s
s
co
r
es
ar
e
s
h
o
w
i
n
g
t
h
e
m
ea
s
u
r
e
o
f
d
el
icate
in
f
o
r
m
atio
n
h
a
v
i
n
g
i
n
t
h
e
s
u
b
s
ta
n
ce
.
Ou
r
s
o
lu
tio
n
w
h
ic
h
i
s
ali
g
n
m
e
n
t
-
b
ased
,
co
u
n
t
t
h
e
o
r
d
er
o
f
n
-
g
r
a
m
s
.
I
t
li
k
e
w
is
e
ta
k
es
ca
r
e
o
f
a
r
b
itra
r
y
v
ar
ietie
s
o
f
p
atter
n
s
w
it
h
o
u
t a
n
u
n
eq
u
i
v
o
c
al
p
ar
ticu
lar
o
f
all
co
n
ce
i
v
ab
le
v
ar
iet
y
p
atter
n
s
.
2.
L
I
T
E
R
AT
U
RE
R
E
VI
E
W
I
n
th
i
s
p
ap
er
[
1
]
,
au
th
o
r
m
a
k
es
u
s
e
o
f
s
eq
u
e
n
ce
ali
g
n
m
e
n
t
m
eth
o
d
f
o
r
s
ea
r
ch
i
n
g
co
m
p
lex
d
ata
-
leak
ag
e
p
atter
n
s
.
T
h
is
a
lg
o
r
it
h
m
is
e
n
g
a
g
ed
f
o
r
r
ec
o
g
n
izi
n
g
lo
n
g
as
w
ell
a
s
i
m
p
o
r
tan
t
d
ata
p
atter
n
s
.
T
h
i
s
id
en
ti
f
icatio
n
is
p
air
ed
w
ith
a
s
a
m
p
li
n
g
alg
o
r
it
h
m
t
h
at
allo
w
s
o
n
e
to
lo
o
k
at
t
h
e
s
i
m
ilit
u
d
e
o
f
t
w
o
in
d
ep
en
d
en
tl
y
te
s
ted
s
u
cc
es
s
io
n
s
.
T
h
is
s
tr
u
ct
u
r
e
ac
co
m
p
l
is
h
e
s
g
r
ea
t
d
i
s
co
v
er
y
e
x
ac
t
n
ess
i
n
p
er
ce
iv
i
n
g
tr
an
s
f
o
r
m
ed
leak
a
g
e.
P
ap
er
[
2
]
au
th
o
r
,
i
m
p
le
m
en
te
d
t
w
o
alg
o
r
ith
m
s
f
o
r
s
ea
r
ch
i
n
g
an
d
tr
an
s
f
o
r
m
ed
leak
ag
e
i
n
f
o
r
m
atio
n
.
T
h
is
f
r
a
m
e
w
o
r
k
f
u
l
f
ill
s
h
i
g
h
r
ec
o
g
n
itio
n
ex
ac
t
n
es
s
an
d
f
i
n
d
s
tr
an
s
f
o
r
m
ed
leak
a
g
e
ap
p
ea
r
ed
d
if
f
er
en
tl
y
i
n
r
elatio
n
to
th
e
cu
t
tin
g
ed
g
e
i
n
s
p
ec
tio
n
s
y
s
te
m
s
.
T
h
e
y
p
ar
allelize
t
h
eir
d
esi
g
n
o
n
g
r
ap
h
i
cs
p
r
ep
ar
in
g
u
n
it
as
w
ell
as
e
x
h
ib
it
t
h
e
s
o
lid
s
ca
la
b
ilit
y
o
f
th
eir
d
etec
tio
n
s
o
lu
ti
o
n
n
ee
d
ed
b
y
a
s
izab
le
ass
o
ci
atio
n
.
I
n
p
ap
er
[
3
]
au
th
o
r
s
h
a
v
e
d
e
s
ig
n
s
f
u
zz
y
f
i
n
g
er
p
r
in
t,
w
h
ich
is
a
p
r
iv
ac
y
-
p
r
eser
v
in
g
d
ata
-
lea
k
d
et
ec
tio
n
s
y
s
te
m
al
s
o
p
r
o
v
id
es
its
r
ea
lizatio
n
.
B
y
m
ak
in
g
u
s
e
o
f
s
p
ec
ial
d
i
g
est
s
,
t
h
e
ex
p
o
s
u
r
e
o
f
t
h
e
v
ital
d
ata
i
s
k
ep
t
to
v
er
y
le
s
s
w
h
ile
d
etec
tio
n
.
Au
t
h
o
r
s
h
a
v
e
co
n
d
u
cted
f
e
w
te
s
ts
to
co
n
f
o
r
m
t
h
e
ac
c
u
r
ac
y
,
p
r
iv
ac
y
,
a
s
well
as
e
f
f
icie
n
c
y
o
f
o
u
r
s
o
lu
tio
n
s
.
I
n
p
ap
er
[
4
]
au
th
o
r
d
ev
elo
p
ed
th
e
A
q
u
i
f
er
s
ec
u
r
it
y
s
y
s
te
m
t
h
at
as
s
ig
n
s
h
o
s
t
e
x
p
o
r
t
li
m
itat
io
n
s
o
n
al
l
d
ata
tak
en
as
p
ar
t
o
f
a
u
s
er
in
ter
f
ac
e
(
UI
)
w
o
r
k
f
lo
w
.
K
e
y
u
n
d
er
s
tan
d
i
n
g
w
as
t
h
at
wh
en
ap
p
licatio
n
s
i
n
m
o
d
er
n
w
o
r
k
i
n
g
f
r
a
m
e
w
o
r
k
s
o
f
f
er
d
ata,
it
i
s
a
p
iece
o
f
a
n
en
o
r
m
o
u
s
w
o
r
k
p
r
o
ce
s
s
to
p
l
a
y
o
u
t
a
u
s
er
ta
s
k
.
E
ac
h
ap
p
licatio
n
o
n
t
h
e
UI
w
o
r
k
p
r
o
ce
s
s
i
s
a
p
o
ten
tial
i
n
f
o
r
m
atio
n
o
w
n
er
,
a
n
d
i
n
ad
d
itio
n
th
u
s
ca
n
ad
d
to
th
e
s
ec
u
r
it
y
li
m
itatio
n
s
.
T
h
e
r
estrictio
n
s
ar
e
h
eld
w
it
h
d
ata
as
it
is
co
m
p
o
s
ed
to
s
to
r
ag
e
an
d
p
r
o
p
ag
ated
to
f
u
tu
r
e
UI
w
o
r
k
f
o
r
m
s
t
h
at
r
ea
d
it.
I
n
d
o
in
g
all
th
in
g
s
co
n
s
id
er
ed
th
e
y
en
g
ag
e
ap
p
licatio
n
s
to
s
en
s
ib
l
y
h
o
ld
co
n
tr
o
l
o
f
th
eir
d
ata
af
ter
it h
a
s
b
ee
n
s
h
ar
ed
as a
m
aj
o
r
asp
ec
t o
f
th
e
cli
en
t
'
s
ta
s
k
s
.
I
n
p
ap
er
[
5
]
au
th
o
r
s
p
r
esen
t
A
tt
ir
e:
an
ap
p
f
o
r
co
m
p
u
ter
s
as
w
ell
a
s
s
m
ar
t
p
h
o
n
e
s
w
h
ic
h
s
h
o
w
s
th
e
u
s
er
w
i
th
an
av
atar
.
Attire
c
o
n
v
e
y
s
r
ea
l
-
ti
m
e
d
ata
ex
p
o
s
u
r
e
in
a
lig
h
t
w
ei
g
h
t
an
d
u
n
o
b
tr
u
s
i
v
e
m
an
n
er
v
ia
u
p
d
atin
g
to
t
h
e
a
v
atar
’
s
clo
t
h
in
g
.
I
n
p
ap
er
[
6
]
au
th
o
r
s
g
iv
e
n
th
e
Data
-
Dr
iv
e
n
Se
m
i
-
Glo
b
al
A
li
g
n
m
en
t
(
DDSG
A
)
,
DDSG
A
m
eth
o
d
.
Fro
m
t
h
e
p
o
in
t
o
f
s
ec
u
r
it
y
ef
f
ec
tiv
e
n
ess
,
DDSG
A
in
cr
ea
s
e
t
h
e
s
co
r
in
g
s
y
s
te
m
s
b
y
ad
o
p
tin
g
d
is
ti
n
ct
ali
g
n
m
e
n
t
p
ar
a
m
eter
s
f
o
r
e
v
er
y
s
i
n
g
le
u
s
er
.
A
l
s
o
,
it
en
d
u
r
es
f
e
w
tr
an
s
f
o
r
m
a
tio
n
s
i
n
u
s
er
co
m
m
a
n
d
s
eq
u
en
ce
s
b
y
p
e
r
m
itti
n
g
f
e
w
ch
a
n
g
es
in
t
h
e
lo
w
-
le
v
el
r
ep
r
esen
ta
tio
n
o
f
th
e
co
m
m
a
n
d
s
f
u
n
ctio
n
alit
y
.
I
t
ad
d
itio
n
all
y
a
d
j
u
s
ts
to
m
o
d
i
f
icatio
n
in
t
h
e
u
s
er
co
n
d
u
ct
b
y
u
p
g
r
ad
in
g
th
e
s
ig
n
at
u
r
e
o
f
a
u
s
er
as
p
er
its
p
r
esen
t
b
e
h
av
io
r
.
T
o
o
p
tim
ize
t
h
e
r
u
n
ti
m
e
o
v
er
h
ea
d
,
DDSG
A
r
ed
u
ce
t
h
e
ali
g
n
m
e
n
t
o
v
er
h
ea
d
a
s
w
ell
a
s
p
ar
allelize
s
t
h
e
d
etec
ti
o
n
an
d
also
m
o
d
if
y
.
I
n
p
ap
er
[
7
]
au
th
o
r
,
p
r
o
p
o
s
ed
n
o
v
el
m
et
h
o
d
f
o
r
g
etti
n
g
r
ic
h
er
s
e
m
an
t
ics
o
f
t
h
e
u
s
er
’
s
d
eter
m
i
n
ed
.
T
h
e
tech
n
iq
u
e
i
s
d
ep
en
d
i
n
g
o
n
t
h
e
o
b
s
er
v
a
tio
n
w
h
ic
h
f
o
r
m
o
s
t
tex
t
-
b
ased
ap
p
licatio
n
s
,
th
e
u
s
er
’
s
d
eter
m
i
n
ed
ar
e
s
h
o
w
n
f
u
l
l
y
o
n
s
cr
ee
n
,
a
s
tex
t,
a
s
w
ell
as
t
h
e
u
s
er
w
ill
d
o
s
o
m
e
m
o
d
if
icat
io
n
s
i
f
w
h
at
is
o
n
s
cr
ee
n
is
n
o
t
w
h
at
h
e
n
ee
d
ed
.
Dep
en
d
in
g
o
n
th
i
s
co
n
ce
p
t,
d
ev
elo
p
m
e
n
t
o
f
p
r
o
to
ty
p
e
k
n
o
w
n
as
G
y
r
u
s
th
at
en
f
o
r
ce
s
r
ig
h
t
w
o
r
k
i
n
g
o
f
ap
p
licatio
n
s
b
y
t
ak
in
g
u
s
er
d
eter
m
i
n
an
t
is
d
o
n
e.
B
y
m
a
k
i
n
g
u
s
e
o
f
G
y
r
u
s
,
r
ep
r
esen
tatio
n
o
f
s
to
p
p
in
g
d
es
tr
u
cti
v
e
ac
t
iv
i
ties
w
h
ic
h
ca
n
m
o
d
if
y
t
h
e
h
o
s
t
s
y
s
te
m
to
f
o
r
w
ar
d
d
estru
ct
iv
e
tr
af
f
ic,
li
k
e
s
o
cia
l
n
et
w
o
r
k
i
m
p
er
s
o
n
atio
n
attac
k
s
,
as
w
e
ll
as
o
n
li
n
e
f
i
n
an
cial
s
er
v
ices
f
r
au
d
is
d
o
n
e.
T
h
e
ev
alu
a
tio
n
o
u
tco
m
e
s
h
o
w
s
t
h
at
G
y
r
u
s
s
u
cc
es
s
f
u
l
l
y
p
r
o
h
ib
its
m
o
d
er
n
m
al
w
ar
e,
as
w
e
ll a
s
s
t
u
d
y
d
e
m
o
n
s
tr
ated
t
h
at
it
w
o
u
ld
b
e
v
er
y
to
u
g
h
f
o
r
f
u
t
u
r
e
attac
k
s
to
d
ef
ea
t
it.
A
t
las
t,
th
e
p
er
f
o
r
m
a
n
c
e
an
al
y
s
is
d
e
m
o
n
s
tr
ated
th
a
t
G
y
r
u
s
is
a
co
u
n
tab
le
o
p
tio
n
f
o
r
p
o
s
itio
n
in
g
o
n
s
t
an
d
alo
n
e
p
c
w
it
h
co
n
ti
n
u
es
u
s
er
in
ter
ac
tio
n
.
G
y
r
u
s
f
ills
an
i
m
p
o
r
tan
t
g
ap
,
en
ab
lin
g
s
ec
u
r
it
y
ac
tio
n
s
th
at
t
ak
in
g
u
s
er
co
n
ce
n
tr
atio
n
i
n
f
in
d
in
g
t
h
e
leg
iti
m
ac
y
o
f
n
et
w
o
r
k
tr
af
f
ic.
I
n
p
ap
er
[
8
]
au
th
o
r
s
i
m
p
le
m
e
n
ted
a
d
o
m
ai
n
-
s
p
ec
if
ic
co
n
cu
r
r
en
c
y
m
o
d
el
th
at
b
ac
k
s
a
lar
g
e
class
o
f
I
DS
an
al
y
s
i
s
n
o
t
d
ep
en
d
s
o
n
a
p
ar
ticu
lar
d
etec
tio
n
tec
h
n
iq
u
e.
I
m
p
le
m
en
ted
tech
n
iq
u
e
d
i
v
id
es
t
h
e
s
tr
ea
m
o
f
n
et
w
o
r
k
ev
e
n
ts
i
n
s
u
b
s
e
ts
th
at
th
e
I
DS
w
ill
p
r
o
ce
s
s
n
o
t
r
elat
ed
,
as
w
ell
as,
w
h
i
le
m
a
k
in
g
s
u
r
e
ea
ch
s
u
b
s
et
h
a
s
ea
ch
ev
e
n
t
r
elev
a
n
t
to
a
d
etec
tio
n
ca
s
e.
P
r
o
p
o
s
ed
p
ar
titi
o
n
in
g
m
et
h
o
d
is
b
ased
o
n
th
e
co
n
ce
p
t
o
f
d
etec
tio
n
s
co
p
e,
i.e
.
,
th
e
less
“
s
lice”
o
f
t
r
af
f
ic
t
h
at
a
d
etec
to
r
m
u
s
t
s
tu
d
y
f
o
r
p
er
f
o
r
m
i
n
g
its
f
u
n
ctio
n
.
As th
i
s
co
n
ce
p
t h
a
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8708
A
S
u
r
ve
y:
Da
ta
Lea
k
a
g
e
Dete
ctio
n
Tech
n
iq
u
es (
K
.
S
.
W
a
g
h
)
2249
s
o
m
e
co
m
m
o
n
ap
p
licab
ilit
y
,
d
esig
n
ed
m
o
d
el
w
il
l
s
u
p
p
o
r
t
s
i
m
p
le,
p
er
-
f
lo
w
d
etec
t
io
n
t
ec
h
n
iq
u
e
a
n
d
m
o
r
e
co
m
p
le
x
,
h
i
g
h
-
lev
e
l d
etec
to
r
s
.
Fin
d
i
n
g
s
o
f
au
t
h
o
r
[
9
]
,
th
e
in
tr
o
d
u
ctio
n
o
f
ess
e
n
tial
d
ata
is
n
o
t
b
asic
b
ec
au
s
e
o
f
in
f
o
r
m
at
i
o
n
ch
an
g
e
in
th
e
co
n
ten
t.
T
r
an
s
f
o
r
m
atio
n
s
(
f
o
r
ex
a
m
p
le,
in
s
er
tio
n
,
an
d
d
ele
tio
n
)
r
esu
lts
in
s
ig
n
i
f
ic
an
tl
y
u
n
p
r
ed
ictab
le
leak
ag
e
p
atter
n
s
.
P
r
esen
t
au
to
m
ata
-
b
ased
s
tr
in
g
co
o
r
d
in
atin
g
alg
o
r
it
h
m
s
ar
e
illo
g
ical
f
o
r
f
in
d
in
g
tr
an
s
f
o
r
m
ed
d
ata
leak
ag
e
a
s
a
r
es
u
lt
o
f
its
f
o
r
m
id
ab
le
co
m
p
lex
it
y
n
atu
r
e
w
h
ile
e
x
h
ib
iti
n
g
th
e
r
eq
u
ir
ed
co
n
s
is
te
n
t
ex
p
r
ess
io
n
s
.
T
h
e
y
cr
ea
te
t
w
o
n
o
v
el
alg
o
r
it
h
m
s
f
o
r
r
ec
o
g
n
izin
g
lo
n
g
an
d
also
w
r
o
n
g
d
ata
leak
ag
e.
T
h
eir
f
r
a
m
e
w
o
r
k
ac
h
ie
v
es
h
i
g
h
d
etec
tio
n
p
r
ec
is
io
n
in
p
er
ce
iv
in
g
ch
an
g
ed
b
r
ea
k
s
co
n
tr
asted
a
n
d
t
h
e
b
est
i
n
cla
s
s
in
s
p
ec
tio
n
tech
n
iq
u
e
s
.
T
h
e
y
p
ar
allelize
o
u
r
d
es
ig
n
o
n
g
r
ap
h
ics
p
r
o
ce
s
s
in
g
u
n
it
a
n
d
in
ad
d
itio
n
d
e
m
o
n
s
tr
ated
th
e
s
o
lid
s
ca
lab
ilit
y
o
f
d
ata
lea
k
ag
e
d
etec
tio
n
ar
r
an
g
e
m
e
n
t e
x
a
m
i
n
in
g
e
n
o
r
m
o
u
s
in
f
o
r
m
at
io
n
.
P
ap
er
[
1
0
]
au
th
o
r
s
g
i
v
en
t
h
at
n
u
m
b
er
o
f
th
e
ap
p
ar
en
t
d
is
tan
ce
m
etr
ics
u
til
ized
f
o
r
co
m
p
u
ti
n
g
b
eh
av
io
r
al
s
i
m
ilar
it
y
b
et
w
ee
n
n
et
w
o
r
k
h
o
s
ts
f
ail
to
ca
p
tu
r
e
th
e
s
e
m
an
tic
s
i
g
n
i
f
ican
ce
i
m
b
u
ed
b
y
n
et
w
o
r
k
p
r
o
to
co
ls
.
M
o
r
eo
v
er
,
th
ey
als
o
ten
d
to
n
eg
lect
lo
n
g
-
ter
m
te
m
p
o
r
al
s
tr
u
ctu
r
e
o
f
t
h
e
o
b
j
ec
t
s
b
ein
g
co
u
n
ted
.
T
o
co
n
s
id
er
th
e
r
o
le
o
f
th
e
s
e
s
e
m
an
tic
a
s
w
ell
as
te
m
p
o
r
al
a
ttrib
u
tes,
t
h
e
y
cr
ea
te
a
n
o
th
er
b
eh
av
io
r
al
d
is
ta
n
ce
m
etr
ic
f
o
r
n
et
w
o
r
k
h
o
s
ts
as
w
ell
as
co
m
p
ar
e
its
ex
ec
u
tio
n
w
it
h
a
m
etr
ic
w
h
ic
h
d
is
r
eg
ar
d
s
in
f
o
r
m
a
tio
n
li
k
e
th
is
.
Sp
ec
if
ical
l
y
,
t
h
e
y
p
r
o
p
o
s
e
s
e
m
a
n
tical
l
y
i
m
p
o
r
tan
t
m
etr
ics
f
o
r
co
m
m
o
n
d
ata
t
y
p
es
f
o
u
n
d
in
n
et
w
o
r
k
d
ata,
in
d
icate
h
o
w
t
h
ese
m
e
tr
ics
ca
n
b
e
co
n
s
o
lid
ated
to
tr
ea
t
n
etw
o
r
k
i
n
f
o
r
m
atio
n
a
s
a
u
n
i
f
ied
m
etr
ic
s
p
ac
e,
as
w
e
ll
as d
ep
ict
a
te
m
p
o
r
al
s
eq
u
en
ci
n
g
alg
o
r
it
h
m
w
h
ic
h
ca
p
tu
r
e
s
lo
n
g
-
ter
m
ca
u
s
al
r
elatio
n
s
h
ip
s
.
Sh
o
u
lin
Yin
et
a
l
.
[
1
1
]
in
tr
o
d
u
ce
d
n
o
v
el
c
o
n
ce
p
t
s
ea
r
ch
ab
l
e
as
y
m
m
etr
ic
en
cr
y
p
tio
n
,
w
h
i
ch
is
u
s
e
f
u
l
f
o
r
s
ec
u
r
it
y
an
d
s
ea
r
c
h
o
p
er
a
tio
n
s
o
n
e
n
cr
y
p
ted
d
ata.
I
t
g
r
ea
tl
y
en
h
an
ce
s
t
h
e
in
f
o
r
m
ati
o
n
p
r
o
tectio
n
,
an
d
p
r
ev
en
t
t
h
e
leak
a
g
e
o
f
th
e
u
s
er
'
s
s
ea
r
ch
cr
iter
ia
-
Sear
ch
P
at
ter
n
.
I
n
p
ap
er
[
1
2
]
au
th
o
r
s
d
escr
ib
es
th
e
Ka
m
a
n
-
Ker
b
er
o
s
ass
is
tan
t
m
o
b
ile
ad
-
h
o
c
n
et
w
o
r
k
(
K
A
M
A
N)
p
r
o
to
co
l
to
av
o
id
u
s
er
s
in
f
o
r
m
a
tio
n
leak
i
n
clo
u
d
en
v
ir
o
n
m
e
n
t
f
o
r
v
ir
t
u
al
s
id
e
ch
an
n
el
at
tack
.
Mo
ez
A
lta
y
e
b
et
a
l
.
[
1
3
]
d
escr
ib
ed
th
e
co
n
ce
p
ts
o
f
r
ad
iatio
n
leak
s
an
d
d
ata
i
n
w
ir
ele
s
s
s
en
s
o
r
n
et
w
o
r
k
.
T
o
lo
ca
te
l
ea
k
ag
e
s
ta
tio
n
an
d
co
n
tr
o
l
t
h
e
s
tatio
n
s
p
o
w
er
co
n
s
u
m
p
tio
n
b
y
s
e
n
d
in
g
a
s
p
e
cial
co
m
m
a
n
d
to
it f
r
o
m
s
er
v
e
r
n
o
d
e.
T
ab
le
1
s
h
o
w
s
t
h
e
v
ar
io
u
s
a
u
t
h
o
r
s
p
ap
er
s
d
etails
w
i
th
m
et
h
o
d
u
s
ed
,
ad
v
an
ta
g
es a
n
d
d
is
ad
v
an
tag
e
s
.
T
ab
le
1
.
Var
io
u
s
A
u
th
o
r
s
P
ap
er
s
Deta
ils
w
it
h
Me
t
h
o
d
Used
,
A
d
v
a
n
ta
g
es a
n
d
Dis
ad
v
a
n
ta
g
es
S
r
.
N
o
.
T
i
t
l
e
P
a
p
e
r
D
e
t
a
i
l
s
M
e
t
h
o
d
U
se
d
A
d
v
a
n
t
a
g
e
s
D
i
sad
v
a
n
t
a
g
e
s
1.
F
a
st
D
e
t
e
c
t
i
o
n
o
f
T
r
a
n
sf
o
r
me
d
D
a
t
a
L
e
a
k
s
U
t
i
l
i
z
e
se
q
u
e
n
c
e
a
l
i
g
n
me
n
t
t
e
c
h
n
i
q
u
e
s
f
o
r
d
e
t
e
c
t
i
n
g
c
o
mp
l
e
x
d
a
t
a
-
l
e
a
k
p
a
t
t
e
r
n
s.
C
o
mp
a
r
a
b
l
e
samp
l
i
n
g
a
l
g
o
r
i
t
h
m
a
l
i
g
n
me
n
t
a
s
w
e
l
l
a
s
samp
l
i
n
g
-
o
b
l
i
v
i
o
u
s
a
l
g
o
r
i
t
h
m.
T
h
i
s p
r
o
t
o
t
y
p
e
p
r
o
v
i
d
e
s su
b
s
t
a
n
t
i
a
l
sp
e
e
d
u
p
a
n
d
i
n
d
i
c
a
t
e
s
h
i
g
h
sc
a
l
a
b
i
l
i
t
y
o
f
t
h
e
d
e
si
g
n
.
d
a
t
a
-
mo
v
e
me
n
t
t
r
a
c
k
i
n
g
a
p
p
r
o
a
c
h
e
d
i
s
n
o
t
u
se
d
.
2.
R
a
p
i
d
s
c
r
e
e
n
i
n
g
o
f
t
r
a
n
sf
o
r
me
d
d
a
t
a
l
e
a
k
s w
i
t
h
e
f
f
i
c
i
e
n
t
a
l
g
o
r
i
t
h
ms
a
n
d
p
a
r
a
l
l
e
l
c
o
mp
u
t
i
n
g
D
e
si
g
n
t
w
o
n
o
v
e
l
a
l
g
o
r
i
t
h
ms f
o
r
se
a
r
c
h
i
n
g
l
o
n
g
a
s w
e
l
l
a
s t
r
a
n
sf
o
r
me
d
i
n
f
o
r
mat
i
o
n
l
e
a
k
s.
S
e
q
u
e
n
c
e
a
l
i
g
n
me
n
t
a
l
g
o
r
i
t
h
m
T
h
i
s t
e
c
h
n
i
q
u
e
h
a
s
h
i
g
h
l
e
v
e
l
o
f
p
r
e
c
i
si
o
n
i
n
f
i
n
d
i
n
g
t
r
a
n
sf
o
r
me
d
i
n
f
o
r
mat
i
o
n
l
e
a
k
s
c
o
mp
a
r
e
d
w
i
t
h
t
h
e
st
a
t
e
-
of
-
t
h
e
-
a
r
t
se
t
i
n
t
e
r
se
c
t
i
o
n
t
e
c
h
n
i
q
u
e
.
Ti
me
C
o
n
su
m
i
n
g
P
r
o
c
e
ss.
3.
P
r
i
v
a
c
y
-
P
r
e
se
r
v
i
n
g
D
e
t
e
c
t
i
o
n
o
f
S
e
n
si
t
i
v
e
D
a
t
a
Ex
p
o
su
r
e
P
r
o
v
i
d
e
s a
p
r
i
v
a
c
y
p
r
e
se
r
v
i
n
g
d
a
t
a
-
l
e
a
k
d
e
t
e
c
t
i
o
n
(
D
L
D
)
a
n
sw
e
r
f
o
r
t
h
e
p
r
o
b
l
e
m i
n
w
h
i
c
h
a
sp
e
c
i
a
l
se
t
o
f
i
mp
o
r
t
a
n
t
i
n
f
o
r
ma
t
i
o
n
d
i
g
e
st
s
i
s
u
t
i
l
i
z
e
d
i
n
d
e
t
e
c
t
i
o
n
.
M
a
p
R
e
d
u
c
e
a
l
g
o
r
i
t
h
m
C
a
p
a
b
i
l
i
t
y
t
o
a
r
b
i
t
r
a
r
i
l
y
sca
l
e
a
s
w
e
l
l
a
s u
se
o
f
p
u
b
l
i
c
r
e
so
u
r
c
e
s fo
r
t
h
e
p
r
o
c
e
ss
S
y
st
e
m i
s n
o
t
d
e
v
e
l
o
p
e
d
f
o
r
i
n
t
e
n
t
i
o
n
a
l
i
n
f
o
r
mat
i
o
n
e
x
f
i
l
t
r
a
t
i
o
n
,
w
h
i
c
h
t
y
p
i
c
a
l
l
y
u
se
s st
r
o
n
g
e
n
c
r
y
p
t
i
o
n
4.
P
r
e
v
e
n
t
i
n
g
a
c
c
i
d
e
n
t
a
l
d
a
t
a
d
i
s
c
l
o
su
r
e
i
n
mo
d
e
r
n
o
p
e
r
a
t
i
n
g
sy
st
e
ms (
2
0
1
3
)
D
e
v
e
l
o
p
s A
q
u
i
f
e
r
a
s
a
p
o
l
i
c
y
s
y
st
e
m a
s w
e
l
l
a
s sy
st
e
m fo
r
a
v
o
i
d
i
n
g
a
c
c
i
d
e
n
t
a
l
d
a
t
a
d
i
s
c
l
o
su
r
e
i
n
mo
d
e
r
n
o
p
e
r
a
t
i
n
g
sy
st
e
ms.
A
q
u
i
f
e
r
a
s a
p
o
l
i
c
y
sy
st
e
m a
s we
l
l
a
s
f
r
a
mew
o
r
k
F
o
r
a
v
o
i
d
i
n
g
a
c
c
i
d
e
n
t
a
l
d
a
t
a
d
i
s
c
l
o
su
r
e
i
n
mo
d
e
r
n
o
p
e
r
a
t
i
n
g
sy
st
e
ms
I
n
A
q
u
i
f
e
r
,
a
p
p
l
i
c
a
t
i
o
n
d
e
v
e
l
o
p
e
r
s g
i
v
e
se
c
r
e
c
y
r
e
st
r
i
c
t
i
o
n
s
w
h
i
c
h
p
r
o
t
e
c
t
t
h
e
e
n
t
i
r
e
u
se
r
i
n
t
e
r
f
a
c
e
w
o
r
k
f
l
o
w
d
u
r
i
n
g
t
h
e
u
se
r
t
a
s
k
.
M
a
l
i
c
i
o
u
s
a
p
p
l
i
c
a
t
i
o
n
s
a
r
e
n
o
t
t
a
k
e
n
i
n
t
o
c
o
n
si
d
e
r
a
t
i
o
n
s
a
r
e
n
o
t
t
a
k
e
n
i
n
t
o
c
o
n
si
d
e
r
a
t
i
o
n
5.
A
t
t
i
r
e
:
C
o
n
v
e
y
i
n
g
i
n
f
o
r
mat
i
o
n
e
x
p
o
su
r
e
t
h
r
o
u
g
h
a
v
a
t
a
r
a
p
p
a
r
e
l
(
2
0
1
3
)
D
e
v
e
l
o
p
e
d
A
t
t
i
r
e
:
a
n
a
p
p
f
o
r
c
o
m
p
u
t
e
r
s a
s
w
e
l
l
a
s sma
r
t
p
h
o
n
e
s
w
h
i
c
h
d
i
sp
l
a
y
s t
h
e
u
se
r
w
i
t
h
a
n
a
v
a
t
a
r
.
A
t
t
i
r
e
:
M
o
b
i
l
e
a
p
p
A
t
t
i
r
e
p
a
sse
s re
a
l
-
t
i
me
d
a
t
a
e
x
p
o
su
r
e
i
n
a
l
i
g
h
t
w
e
i
g
h
t
a
s w
e
l
l
a
s
u
n
o
b
t
r
u
si
v
e
ma
n
n
e
r
v
i
a
u
p
d
a
t
i
n
g
t
o
t
h
e
a
v
a
t
a
r
's
c
l
o
t
h
i
n
g
.
T
h
i
s sy
st
e
m c
a
n
b
e
mo
d
i
f
i
e
d
t
o
h
a
n
d
l
e
o
t
h
e
r
so
r
t
of
d
a
t
a
w
i
t
h
l
o
c
a
t
i
o
n
,
S
u
c
h
a
s
v
i
e
w
s o
f
p
h
o
t
o
g
r
a
p
h
s
,
`
me
n
t
i
o
n
s'
a
s w
e
l
l
a
s `r
e
t
w
e
e
t
s' o
f
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
8
,
No
.
4
,
A
u
g
u
s
t
201
8
:
2
2
4
7
–
2
2
5
3
2250
S
r
.
N
o
.
T
i
t
l
e
P
a
p
e
r
D
e
t
a
i
l
s
M
e
t
h
o
d
U
se
d
A
d
v
a
n
t
a
g
e
s
D
i
sad
v
a
n
t
a
g
e
s
t
w
e
e
t
s,
c
o
mm
e
n
t
s
o
n
st
a
t
u
s
me
ssag
e
s,
e
t
c
.
6.
D
D
S
G
A
:
A
d
a
t
a
-
d
r
i
v
e
n
se
mi
-
g
l
o
b
a
l
a
l
i
g
n
me
n
t
a
p
p
r
o
a
c
h
f
o
r
d
e
t
e
c
t
i
n
g
masq
u
e
r
a
d
e
a
t
t
a
c
k
s
G
i
v
e
n
t
h
e
D
a
t
a
-
D
r
i
v
e
n
S
e
mi
-
G
l
o
b
a
l
A
l
i
g
n
me
n
t
,
D
D
S
G
A
me
t
h
o
d
.
F
r
o
m t
h
e
se
c
u
r
i
t
y
e
f
f
e
c
t
i
v
e
n
e
ss
v
i
e
w
p
o
i
n
t
,
D
D
S
G
A
u
p
g
r
a
d
e
s t
h
e
sco
r
i
n
g
sy
st
e
ms b
y
a
d
o
p
t
i
n
g
d
i
s
t
i
n
c
t
a
l
i
g
n
me
n
t
p
a
r
a
me
t
e
r
s
f
o
r
e
v
e
r
y
u
se
r
.
D
D
S
G
A
a
p
p
r
o
a
c
h
D
D
S
G
A
r
e
su
l
t
s
i
mp
r
o
v
e
b
o
t
h
t
h
e
h
i
t
r
a
t
i
o
a
s w
e
l
l
a
s fal
se
p
o
si
t
i
v
e
r
a
t
e
s w
i
t
h
a
n
a
c
c
e
p
t
a
b
l
e
c
a
l
c
u
l
a
t
i
o
n
o
v
e
r
h
e
a
d
.
N
e
e
d
t
o
d
e
t
e
c
t
masq
u
e
r
a
d
e
a
t
t
a
c
k
s
i
n
c
l
o
u
d
e
n
v
i
r
o
n
me
n
t
b
y
i
mp
r
o
v
i
n
g
t
h
i
s
C
I
D
S
f
r
a
mew
o
r
k
7.
G
y
r
u
s:
A
f
r
a
mew
o
r
k
f
o
r
u
se
r
-
i
n
t
e
n
t
mo
n
i
t
o
r
i
n
g
o
f
t
e
x
t
-
b
a
se
d
n
e
t
w
o
r
k
e
d
a
p
p
l
i
c
a
t
i
o
n
s
D
e
v
e
l
o
p
a
w
a
y
t
o
b
r
e
a
k
t
h
i
s
c
y
c
l
e
b
y
mak
i
n
g
s
u
r
e
w
h
i
c
h
a
sy
st
e
m’
s b
e
h
a
v
i
o
r
mat
c
h
e
s t
h
e
u
se
r
’
s
i
n
t
e
n
t
.
G
y
r
u
s fr
a
me
w
o
r
k
G
y
r
u
s su
c
c
e
ssf
u
l
l
y
st
o
p
s mo
d
e
r
n
mal
w
a
r
e
T
h
e
p
r
e
se
n
t
d
e
si
g
n
c
a
n
b
e
a
d
a
p
t
e
d
t
o
o
p
e
r
a
t
e
i
n
a
c
l
o
u
d
c
o
mp
u
t
i
n
g
mo
d
e
l
i
n
w
h
i
c
h
t
h
e
r
e
mo
t
e
h
o
st
i
s
a
n
i
n
s
t
a
n
c
e
i
n
a
n
I
a
a
S
c
l
o
u
d
.
I
t
mu
st
i
m
p
l
e
me
n
t
G
y
r
u
s o
n
o
t
h
e
r
p
l
a
t
f
o
r
ms.
8.
B
e
y
o
n
d
p
a
t
t
e
r
n
mat
c
h
i
n
g
:
A
c
o
n
c
u
r
r
e
n
c
y
mo
d
e
l
f
o
r
st
a
t
e
f
u
l
d
e
e
p
p
a
c
k
e
t
i
n
sp
e
c
t
i
o
n
G
i
v
e
n
a
n
o
v
e
l
d
o
mai
n
-
sp
e
c
i
f
i
c
c
o
n
c
u
r
r
e
n
c
y
mo
d
e
l
w
h
i
c
h
so
l
v
e
s
t
h
i
s i
ssu
e
b
y
h
a
v
i
n
g
t
h
e
n
o
t
i
o
n
o
f
d
e
t
e
c
t
i
o
n
sco
p
e
:
a
u
n
i
t
f
o
r
p
a
r
t
i
t
i
o
n
i
n
g
n
e
t
w
o
r
k
t
r
a
f
f
i
c
l
i
k
e
t
h
e
t
r
a
f
f
i
c
h
a
v
i
n
g
i
n
e
v
e
r
y
r
e
su
l
t
i
n
g
"
sl
i
c
e
"
i
s
i
n
d
e
p
e
n
d
e
n
t
f
o
r
d
e
t
e
c
t
i
o
n
p
u
r
p
o
se
s
I
n
t
r
u
si
o
n
d
e
t
e
c
t
i
o
n
sy
st
e
ms (
I
D
S
s
)
T
h
i
s t
e
c
h
n
i
q
u
e
c
o
r
r
e
c
t
l
y
p
a
r
t
i
t
i
o
n
s
e
x
i
st
i
n
g
se
q
u
e
n
t
i
a
l
I
D
S
st
u
d
i
e
sb
y
h
a
v
i
n
g
a
c
c
u
r
a
c
y
,
w
h
i
l
e
e
x
p
l
o
i
t
i
n
g
t
h
e
n
e
t
w
o
r
k
t
r
a
f
f
i
c
’
s
i
n
h
e
r
e
n
t
c
o
n
c
u
r
r
e
n
c
y
p
o
t
e
n
t
i
a
l
f
o
r
t
h
r
o
u
g
h
p
u
t
u
p
g
r
a
d
e
s.
I
t
i
s c
o
mp
l
e
x
p
r
o
c
e
ss
9
R
a
p
i
d
a
n
d
p
a
r
a
l
l
e
l
c
o
n
t
e
n
t
s
c
r
e
e
n
i
n
g
f
o
r
d
e
t
e
c
t
i
n
g
t
r
a
n
sf
o
r
me
d
d
a
t
a
e
x
p
o
su
r
e
.
D
e
v
e
l
o
p
e
d
t
w
o
n
o
v
e
l
a
l
g
o
r
i
t
h
ms f
o
r
f
i
n
d
i
n
g
l
o
n
g
a
s w
e
l
l
a
s i
n
e
x
a
c
t
i
n
f
o
r
mat
i
o
n
l
e
a
k
s.
S
e
q
u
e
n
c
e
c
o
mp
a
r
i
so
n
t
e
c
h
n
i
q
u
e
T
h
i
s t
e
c
h
n
i
q
u
e
i
s
c
a
n
b
e
u
se
d
f
o
r
b
i
g
d
a
t
a
a
n
a
l
y
t
i
c
s
a
s w
e
l
l
a
sf
i
n
d
i
n
g
t
r
a
n
sf
o
r
me
d
se
n
si
t
i
v
e
i
n
f
o
r
mat
i
o
n
e
x
p
o
su
r
e
.
T
i
me
c
o
n
su
m
i
n
g
P
r
o
c
e
ss.
10
O
n
me
a
s
u
r
i
n
g
t
h
e
si
mi
l
a
r
i
t
y
o
f
n
e
t
w
o
r
k
h
o
st
s:
P
i
t
f
a
l
l
s,
n
e
w
me
t
r
i
c
s,
a
n
d
e
mp
i
r
i
c
a
l
a
n
a
l
y
se
s
P
r
o
p
o
se
d
a
b
e
h
a
v
i
o
r
a
l
d
i
s
t
a
n
c
e
me
t
r
i
c
f
o
r
n
e
t
w
o
r
k
h
o
st
s
a
s w
e
l
l
a
sa
n
a
l
y
z
e
d
i
t
s
p
e
r
f
o
r
man
c
e
t
o
a
me
t
r
i
c
w
h
i
c
h
n
e
g
l
e
c
t
sd
a
t
a
l
i
k
e
t
h
a
t
.
D
y
n
a
mi
c
T
i
me
W
a
r
p
i
n
g
(
D
T
W
)
M
e
t
h
o
d
g
i
v
e
s
c
o
n
si
s
t
e
n
t
a
n
d
u
se
f
u
l
c
h
a
r
a
c
t
e
r
i
z
a
t
i
o
n
s
o
f
h
o
st
b
e
h
a
v
i
o
r
c
o
mp
a
r
e
d
w
i
t
h
t
h
e
L
1
me
t
r
i
c
.
T
h
i
s me
t
h
o
d
n
o
t
w
o
r
k
o
n
a
l
l
o
w
f
o
r
l
o
c
a
l
i
z
e
d
r
e
o
r
d
e
r
i
n
g
o
f
p
o
i
n
t
s
11
D
i
st
r
i
b
u
t
e
d
S
e
a
r
c
h
a
b
l
e
A
s
y
mm
e
t
r
i
c
En
c
r
y
p
t
i
o
n
I
n
t
h
i
s
p
a
p
e
r
a
u
t
h
o
r
d
i
s
c
u
sse
d
p
r
e
v
e
n
t
i
o
n
o
f
l
e
a
k
a
g
e
o
f
t
h
e
u
se
r
's se
a
r
c
h
c
r
i
t
e
r
i
a
-
S
e
a
r
c
h
P
a
t
t
e
r
n
.
P
o
l
y
f
u
n
c
t
i
o
n
a
l
c
o
n
c
e
p
t
o
f
S
e
a
r
c
h
a
b
l
e
e
n
c
r
y
p
t
i
o
n
.
T
o
g
e
t
h
i
g
h
e
r
e
f
f
i
c
i
e
n
c
y
a
n
d
se
c
u
r
i
t
y
i
n
i
n
f
o
r
mat
i
o
n
r
e
t
r
i
e
v
a
C
o
mp
l
e
x
se
a
r
c
h
q
u
e
r
y
a
n
d
t
h
e
l
e
a
k
i
n
g
o
f
se
a
r
c
h
i
n
c
r
e
a
se
s
e
x
e
c
u
t
i
o
n
t
i
me
.
12
K
A
M
A
N
P
r
o
t
o
c
o
l
f
o
r
P
r
e
v
e
n
t
i
n
g
V
i
r
t
u
a
l
S
i
d
e
C
h
a
n
n
e
l
A
t
t
a
c
k
s
i
n
C
l
o
u
d
En
v
i
r
o
n
me
n
t
I
n
t
h
i
s
p
a
p
e
r
a
u
t
h
o
r
p
r
o
v
i
d
e
s so
l
u
t
i
o
n
f
o
r
c
l
o
u
d
e
n
v
i
r
o
n
me
n
t
t
o
a
v
o
i
d
t
h
e
l
e
a
k
a
g
e
o
f
u
se
r
i
n
f
o
r
ma
t
i
o
n
.
V
i
r
t
u
a
l
si
d
e
c
h
a
n
n
e
l
a
t
t
a
c
k
i
s
d
e
scr
i
b
e
d
a
n
d
h
o
w
t
h
i
s
a
t
t
a
c
k
p
r
o
v
i
d
e
s t
h
e
u
se
r
s
c
r
e
d
e
n
t
i
a
l
t
o
a
c
c
e
ss
u
se
r
i
n
f
o
r
ma
t
i
o
n
.
K
a
man
-
K
e
r
b
e
r
o
s
a
ssi
s
t
a
n
t
mo
b
i
l
e
a
d
-
h
o
c
n
e
t
w
o
r
k
(
K
A
M
A
N
)
p
r
o
t
o
c
o
l
i
s
u
se
d
t
o
a
v
o
i
d
u
se
r
s
i
n
f
o
r
marm
a
t
i
o
n
l
e
a
k
.
W
o
r
k
i
s p
r
e
se
n
t
e
d
c
o
n
t
r
o
l
l
e
d
e
n
v
i
r
o
n
me
n
t
,
i
n
r
e
a
l
c
l
o
u
d
e
n
v
i
r
o
n
me
n
t
,
h
o
w
p
r
o
v
i
d
e
d
so
l
u
t
i
o
n
i
s e
f
f
e
c
t
i
v
e
n
o
t
d
i
s
c
u
sse
d
.
13
W
i
r
e
l
e
ss Se
n
so
r
N
e
t
w
o
r
k
f
o
r
R
a
d
i
a
t
i
o
n
D
e
t
e
c
t
i
o
n
I
n
t
h
i
s
p
a
p
e
r
,
w
h
e
n
w
i
r
e
l
e
ss se
n
so
r
n
e
t
w
o
r
k
(
W
S
N
)
se
n
d
o
r
r
e
c
i
v
e
d
a
t
a
f
r
o
m
o
t
h
e
r
n
o
d
e
s.
I
t
r
e
p
o
r
t
s
r
a
d
i
a
t
i
o
n
l
e
a
k
s
,
i
n
a
d
d
i
t
i
o
n
t
o
t
h
e
d
a
t
a
.
T
o
l
o
c
a
t
e
l
e
a
k
a
g
e
st
a
t
i
o
n
a
n
d
c
o
n
t
r
o
l
t
h
e
st
a
t
i
o
n
s
p
o
w
e
r
c
o
n
su
mp
t
i
o
n
b
y
se
n
d
i
n
g
a
sp
e
c
i
a
l
c
o
mm
a
n
d
t
o
i
t
f
r
o
m
se
r
v
e
r
n
o
d
e
.
G
S
M
n
e
t
w
o
r
k
i
s u
se
d
t
o
a
v
o
i
d
r
a
d
i
a
t
i
o
n
l
e
a
k
a
n
d
d
a
t
a
l
e
a
k
.
Ef
f
e
c
t
o
f
e
n
v
i
r
o
n
me
n
t
a
l
p
a
r
a
me
r
s,
w
h
i
l
e
t
r
a
n
s
mi
t
t
i
n
g
d
a
t
a
i
n
w
i
r
l
e
ss se
n
so
r
ne
t
w
o
r
k
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8708
A
S
u
r
ve
y:
Da
ta
Lea
k
a
g
e
Dete
ctio
n
Tech
n
iq
u
es (
K
.
S
.
W
a
g
h
)
2251
3.
RE
S
E
ARCH
M
E
T
H
O
D
Fo
u
r
w
a
y
s
,
w
e
ca
n
s
ec
u
r
e
o
r
g
an
izatio
n
d
ata:
I
d
en
tify
C
r
it
ical
d
ata:
o
r
g
an
iz
atio
n
id
en
ti
f
y
s
e
n
s
it
iv
e
d
ata
o
f
o
r
g
an
izatio
n
a
n
d
u
s
e
latest
al
g
o
r
ith
m
o
r
s
o
f
t
w
ar
e
to
p
r
o
tect
cr
itical
d
ata.
B
ased
o
n
o
r
g
an
izatio
n
p
o
licies
clas
s
if
y
d
ata,
ed
u
ca
te
t
h
e
u
s
er
s
a
n
d
p
r
o
v
id
e
s
en
s
i
tiv
e
d
ata
to
em
p
lo
y
ee
b
ased
o
n
ac
c
e
s
s
co
n
tr
o
l
m
ec
h
a
n
is
m
.
Mo
n
ito
r
Net
w
o
r
k
A
cc
es
s
:
to
m
o
n
ito
r
all
n
et
w
o
r
k
tr
af
f
ic
a
n
d
g
en
er
ate
r
ea
l
tim
e
n
et
w
o
r
k
a
cc
ess
r
ep
o
r
t.
Sy
s
te
m
f
i
n
d
an
o
m
alo
u
s
b
eh
a
v
io
r
p
atter
n
an
d
au
to
n
o
ti
f
y
th
i
s
p
atter
n
to
n
et
w
o
r
k
ad
m
i
n
i
s
tr
ato
r
an
d
b
lo
ck
ac
ce
s
s
co
n
tr
o
l su
s
p
icio
u
s
u
s
e
r.
A
d
ap
tiv
e
Secu
r
it
y
Me
c
h
an
i
s
m
: to
p
r
o
v
id
e
ad
a
p
tiv
e
to
ch
an
g
e
s
ec
u
r
it
y
m
ec
h
a
n
is
m
as p
er
at
tack
s
f
o
r
d
ata
leak
.
A
p
p
l
y
Secu
r
it
y
o
r
E
n
cr
y
p
tio
n
T
ec
h
n
iq
u
es:
A
p
p
l
y
e
x
cr
etio
n
alg
o
r
ith
m
to
cr
itical
s
e
n
s
i
tiv
e
i
n
f
o
r
m
atio
n
.
4.
P
RO
P
O
SE
D
SYS
T
E
M
T
h
e
ar
ch
itectu
r
e
an
d
f
lo
w
o
f
t
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
i
n
Fi
g
u
r
e
1
:
Fig
u
r
e
1
.
T
h
e
ar
ch
itectu
r
e
an
d
f
lo
w
o
f
t
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
I
n
t
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
i
n
it
ial
l
y
u
s
er
b
r
o
w
s
e
s
t
h
e
in
p
u
t
d
at
aset
a
n
d
f
etch
e
s
t
h
e
s
e
n
s
it
iv
e
d
ata
f
r
o
m
in
p
u
t
d
ata
s
et.
Fo
r
g
e
n
er
ati
n
g
t
h
e
s
a
m
p
le
li
s
t,
s
u
b
s
eq
u
en
ce
p
r
eser
v
in
g
s
a
m
p
li
n
g
al
g
o
r
ith
m
is
u
s
ed
to
g
e
n
er
ate
s
a
m
p
li
n
g
alg
o
r
it
h
m
.
I
f
g
i
v
en
s
tr
in
g
is
p
an
d
its
s
u
b
s
tr
in
g
is
q
,
th
is
is
d
e
n
o
ted
b
y
p
⊆
q
)
,
th
en
p
0
is
also
a
s
u
b
s
tr
i
n
g
o
f
q
0
(
p
0
⊆
q
0
)
,
w
h
er
e
p
0
i
s
a
s
en
s
iti
v
e
d
ata
o
f
p
s
a
m
p
le
a
n
d
s
a
m
p
led
s
e
n
s
iti
v
e
d
ata
s
a
m
p
le
o
f
p
,
a
n
d
q
0
is
a
s
en
s
iti
v
e
s
a
m
p
led
d
ata
o
f
q
.
Af
ter
th
a
t
m
atr
i
x
f
o
r
s
en
s
iti
v
it
y
s
co
r
e
is
ca
lcu
la
ted
b
y
r
ec
u
r
r
en
ce
r
elatio
n
d
y
n
a
m
ic
p
r
o
g
r
a
m
m
i
n
g
alg
o
r
ith
m
.
Af
ter
t
h
at
s
y
s
te
m
i
s
co
m
p
ar
ed
th
r
es
h
o
ld
v
a
lu
e
w
it
h
s
en
s
iti
v
it
y
s
co
r
e
v
al
u
e
i
f
s
en
s
iti
v
it
y
s
co
r
e
i
s
g
r
ea
ter
th
a
n
th
r
es
h
o
ld
v
al
u
e
t
h
en
d
ata
leak
is
d
etec
ted
,
o
th
er
w
i
s
e
d
ata
is
n
o
t le
a
k
.
5.
RE
SU
L
T
S
A
ND
D
I
SCU
SS
I
O
N
Sa
m
p
li
n
g
al
g
o
r
ith
m
b
ased
o
n
co
n
tex
t
-
a
w
ar
e
s
elec
tio
n
.
Selec
tio
n
d
ec
is
io
n
o
f
s
a
m
p
le
lis
t
d
ep
en
d
s
o
n
s
elec
tio
n
f
u
n
ctio
n
,
h
o
w
s
elec
tio
n
co
m
p
ar
e
w
it
h
s
u
r
r
o
u
n
d
in
g
d
ata.
Sa
m
p
li
n
g
al
g
o
r
ith
m
g
i
v
es
r
es
u
lts
as
a
d
eter
m
in
i
s
tic
a
n
d
p
r
eser
v
in
g
t
h
e
s
u
b
s
eq
u
e
n
ce
.
R
ec
u
r
r
en
ce
R
elatio
n
in
D
y
n
a
m
ic
P
r
o
g
r
a
m
m
i
n
g
al
g
o
r
ith
m
s
w
o
r
k
s
o
n
co
m
p
ac
t
s
a
m
p
le
lis
t.
T
h
is
alg
o
r
ith
m
i
s
ali
g
n
m
e
n
t
-
b
ased
to
d
etec
t
d
ata
leak
s
u
s
i
n
g
o
r
d
er
-
a
w
ar
e
co
m
p
ar
is
o
n
a
n
d
p
r
o
v
id
es
h
ig
h
to
ler
an
c
e
to
p
atter
n
v
ar
iatio
n
s
.
Als
o
s
u
p
p
o
r
ts
p
ar
tial le
ak
d
etec
tio
n
w
i
t
h
h
i
g
h
d
ata
leak
d
etec
tio
n
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
8
,
No
.
4
,
A
u
g
u
s
t
201
8
:
2
2
4
7
–
2
2
5
3
2252
S
y
s
te
m
is
i
m
p
le
m
en
ted
in
C
+
+
an
d
d
ataset
i
s
u
s
ed
E
n
r
o
n
[
1
4
]
,
th
at
co
n
tain
s
1
5
0
u
s
er
s
e
m
ail
d
ata
w
it
h
f
u
ll
h
ea
d
er
a
n
d
b
o
d
ies.
T
o
f
in
d
d
ata
lea
k
d
etec
tio
n
r
ate
an
d
f
al
s
e
p
o
s
iti
v
e
r
ate,
u
s
in
g
E
q
u
atio
n
s
(
1)
an
d
(
2
)
.
(
1
)
(
2
)
w
h
er
e
T
P
is
tr
u
e
p
o
s
itiv
e,
FP
is
f
al
s
e
p
o
s
iti
v
e,
FN
i
s
f
a
ls
e
n
eg
at
iv
e
a
n
d
T
N
is
tr
u
e
n
e
g
at
iv
e.
T
ab
le
2
s
h
o
w
s
d
ata
leak
an
d
n
o
d
ata
leak
i
n
t
er
m
s
o
f
ab
o
v
e
eq
u
at
io
n
s
.
T
ab
le
2
.
Data
leak
in
T
er
m
s
o
f
T
P
,
F
P
an
d
n
o
D
ata
leak
in
T
er
m
s
o
f
F
N,
T
N
T
r
u
e
L
e
a
k
N
o
L
e
a
k
D
a
t
a
L
e
a
k
D
e
t
e
c
t
e
d
TP
FP
N
o
D
a
t
a
L
e
a
k
D
e
t
e
c
t
e
d
FN
TN
6.
CO
NCLU
SI
O
N
I
n
r
ea
l
w
o
r
ld
,
th
e
o
r
g
a
n
izatio
n
s
ar
e
f
ac
in
g
t
h
e
p
r
o
b
lem
o
f
d
ata
leak
ag
e.
T
h
e
d
ata
m
a
y
b
e
s
ee
n
i
n
o
th
er
lap
to
p
s
o
r
w
eb
s
ite
s
.
Fro
m
t
h
i
s
s
u
r
v
e
y
w
e
co
n
c
lu
d
e
th
at
t
h
e
d
ata
leak
ag
e
d
etec
tio
n
s
y
s
te
m
is
lar
g
e
l
y
u
s
e
f
u
l
f
o
r
p
r
o
tectin
g
t
h
e
i
lle
g
al
u
s
e
o
f
d
ata
o
f
v
ar
i
o
u
s
in
d
u
s
tr
ies.
So
t
h
er
e
i
s
n
ee
d
to
d
ev
elo
p
a
co
n
ten
t
in
s
p
ec
tio
n
m
et
h
o
d
w
h
ic
h
d
et
ec
t
leak
s
o
f
i
m
p
o
r
tan
t
d
ata
i
n
t
h
e
co
n
ten
t
o
f
f
iles
o
r
n
et
w
o
r
k
tr
af
f
ic.
Als
o
p
r
o
p
o
s
ed
s
y
s
te
m
is
u
s
e
f
u
l
to
d
etec
t
m
o
d
if
icatio
n
in
d
ata.
I
n
f
u
t
u
r
e
s
u
ch
s
y
s
te
m
s
ar
e
n
ec
e
s
s
ar
y
to
d
etec
t
d
ata
leak
o
f
p
er
s
o
n
al,
f
in
a
n
ce
tr
a
n
s
ac
tio
n
s
,
o
n
li
n
e
s
h
o
p
p
in
g
,
a
n
d
s
o
cial
m
ed
ia
an
d
s
o
o
n
.
RE
F
E
R
E
NC
E
S
[1
]
X
.
S
h
u
,
e
t
a
l
.
,
“
F
a
st
De
tec
ti
o
n
o
f
T
ra
n
s
f
o
r
m
e
d
Da
ta
L
e
a
k
s,
”
in
IEE
E
T
ra
n
s
a
c
ti
o
n
s
o
n
In
f
o
rm
a
ti
o
n
Fo
re
n
sic
s
a
n
d
S
e
c
u
rity
,
v
o
l
.
11
,
n
o
.
3
,
p
p
.
5
2
8
-
5
4
2
,
2
0
1
6
.
[2
]
X
.
S
h
u
,
e
t
a
l
.
,
“
P
r
iv
a
c
y
-
p
re
se
r
v
i
n
g
d
e
tec
ti
o
n
o
f
se
n
siti
v
e
d
a
ta
e
x
p
o
su
re
,
”
IEE
E
T
r
a
n
s.
In
f.
F
o
re
n
sic
s
S
e
c
u
rity
,
v
o
l
.
10
,
n
o
.
5
,
p
p
.
1
0
9
2
-
1
1
0
3
,
2
0
1
5
.
[3
]
F
.
L
iu
,
e
t
a
l
.
,
“
P
r
iv
a
c
y
-
p
re
se
r
v
in
g
sc
a
n
n
in
g
o
f
b
ig
c
o
n
ten
t
f
o
r
se
n
siti
v
e
d
a
ta
e
x
p
o
su
re
w
it
h
M
a
p
Re
d
u
c
e
,
”
in
Pro
c
.
5
th
ACM
Co
n
f
.
Da
t
a
A
p
p
l.
S
e
c
u
r.
Priva
c
y
(
COD
AS
PY
)
,
p
p
.
1
9
5
-
206
,
2
0
1
5
.
[4
]
A
.
N
a
d
k
a
rn
i
a
n
d
W
.
En
c
k
,
“
P
re
v
e
n
ti
n
g
a
c
c
id
e
n
tal
d
a
ta
d
isc
lo
su
re
in
m
o
d
e
rn
o
p
e
ra
ti
n
g
s
y
ste
m
s,”
in
Pro
c
.
2
0
t
h
ACM
Co
n
f.
Co
mp
u
t.
Co
mm
u
n
.
S
e
c
u
r
.,
p
p
.
1
0
2
9
-
1
0
4
2
,
2
0
1
3
.
[5
]
R.
Ho
y
le,
e
t
a
l
.
,
“
A
tt
ire:
Co
n
v
e
y
in
g
in
f
o
r
m
a
ti
o
n
e
x
p
o
su
re
th
r
o
u
g
h
a
v
a
tar
a
p
p
a
re
l,
”
in
Pro
c
.
Co
n
f.
C
o
mp
u
t.
S
u
p
p
o
rte
d
Co
o
p
e
ra
t.
W
o
rk
Co
m
p
a
n
i
o
n
(
CS
CW
)
,
p
p
.
1
9
-
22
,
2
0
1
3
.
[6
]
H.
A
.
Kh
o
li
d
y
,
e
t
a
l
.
,
“
DD
S
G
A
:
A
d
a
ta
-
d
riv
e
n
se
m
i
-
g
lo
b
a
l
a
li
g
n
m
e
n
t
a
p
p
ro
a
c
h
f
o
r
d
e
tec
ti
n
g
m
a
s
q
u
e
ra
d
e
a
tt
a
c
k
s,”
IEE
E
T
ra
n
s.
De
p
e
n
d
a
b
le
S
e
c
u
re
Co
mp
u
t
.
,
v
o
l
.
12
,
n
o
.
2
,
p
p
.
1
6
4
-
1
7
8
,
2
0
1
5
.
[7
]
Y.
Ja
n
g
,
e
t
a
l
.
,
“
Gy
ru
s:
A
f
ra
m
e
w
o
rk
f
o
r
u
se
r
-
in
ten
t
m
o
n
it
o
r
in
g
o
f
tex
t
-
b
a
se
d
n
e
tw
o
rk
e
d
a
p
p
li
c
a
t
io
n
s,”
i
n
Pro
c
.
2
3
rd
US
ENIX
S
e
c
u
r.
S
y
mp
.
,
p
p
.
7
9
-
93
,
2
0
1
4
.
[8
]
L
.
D
.
Ca
rli
,
e
t
a
l
.
,
“
Be
y
o
n
d
p
a
tt
e
rn
m
a
t
c
h
in
g
:
A
c
o
n
c
u
rre
n
c
y
m
o
d
e
l
f
o
r
sta
t
e
f
u
l
d
e
e
p
p
a
c
k
e
t
in
sp
e
c
ti
o
n
,
”
in
Pro
c
.
ACM
S
IGS
AC
C
o
n
f
.
Co
m
p
u
t
.
Co
mm
u
n
.
S
e
c
u
r
.
,
p
p
.
1
3
7
8
-
1
3
9
0
,
2
0
1
4
.
[9
]
X
.
S
h
u
,
e
t
al
.
,
“
Ra
p
id
a
n
d
p
a
ra
ll
e
l
c
o
n
ten
t
sc
re
e
n
in
g
f
o
r
d
e
tec
ti
n
g
tran
sf
o
r
m
e
d
d
a
ta
e
x
p
o
su
re
,
”
in
Pro
c
.
3
rd
I
n
t
.
W
o
rk
sh
o
p
S
e
c
u
r.
Priva
c
y
Bi
g
Da
t
a
(
Bi
g
S
e
c
u
rity)
,
p
p
.
1
9
1
-
1
9
6
,
2
0
1
5
.
[1
0
]
S
.
E.
Co
u
ll
,
e
t
a
l
.
,
“
On
m
e
a
su
rin
g
th
e
sim
il
a
rit
y
o
f
n
e
tw
o
rk
h
o
sts:
P
i
tf
a
ll
s,
n
e
w
m
e
tri
c
s,
a
n
d
e
m
p
iri
c
a
l
a
n
a
ly
s
e
s,”
in
Pro
c
.
Ne
tw.
Distrib
.
S
y
st.
S
e
c
u
r.
S
y
mp
.
(
NDS
S
)
,
p
p
.
1
-
16
,
2
0
1
1
.
[1
1
]
S
.
Yin
,
e
t
a
l
.
,
“
Distrib
u
ted
S
e
a
rc
h
a
b
le
A
s
y
m
m
e
tri
c
En
c
r
y
p
ti
o
n
,
”
i
n
In
d
o
n
e
sia
n
J
o
u
rn
a
l
o
f
El
e
c
trica
l
En
g
i
n
e
e
rin
g
a
n
d
Co
m
p
u
ter
S
c
ie
n
c
e
,
v
ol
.
4
,
n
o
.
3
,
p
p
.
6
8
4
-
6
9
4
,
2
0
1
6
.
[1
2
]
H
.
Ka
u
r
a
n
d
M
.
Ka
u
r,
“
K
A
M
A
N
P
ro
to
c
o
l
f
o
r
P
re
v
e
n
ti
n
g
V
irt
u
a
l
S
id
e
Ch
a
n
n
e
l
A
tt
a
c
k
s
in
Clo
u
d
En
v
iro
n
m
e
n
t,
”
in
T
EL
KOM
NIKA
(
T
e
lec
o
mm
u
n
ica
t
io
n
C
o
mp
u
ti
n
g
,
El
e
c
tro
n
ics
a
n
d
Co
n
tro
l)
,
v
ol
.
15
,
n
o
.
1
,
p
p
.
1
8
4
-
1
9
0
,
2
0
1
5
.
[1
3
]
M
.
A
lt
a
y
e
b
,
e
t
a
l
.
,
“
W
irele
ss
S
e
n
so
r
Ne
tw
o
rk
f
o
r
Ra
d
iatio
n
De
tec
ti
o
n
,
”
In
d
o
n
e
sia
n
J
o
u
r
n
a
l
o
f
El
e
c
trica
l
En
g
i
n
e
e
rin
g
a
n
d
I
n
fo
rm
a
ti
c
s (
IJ
EE
I)
,
v
ol
.
5
,
n
o
.
1
,
p
p
.
3
7
-
43
,
2
0
1
7
.
[1
4
]
C.
Ka
l
y
a
n
a
n
d
K.
Ch
a
n
d
ra
se
k
a
r
a
n
,
“
In
f
o
rm
a
ti
o
n
lea
k
d
e
tec
ti
o
n
in
f
in
a
n
c
ial
e
-
m
a
il
s
u
sin
g
m
a
il
p
a
tt
e
rn
a
n
a
ly
sis
u
n
d
e
r
p
a
rti
a
l
i
n
f
o
rm
a
ti
o
n
,
”
Pro
c
.
7
th
W
S
EA
S
In
t.
Co
n
f.
Ap
p
l.
I
n
fo
r
ma
t.
Co
mm
u
n
.
(
AIC)
,
v
o
l.
7
,
p
p
.
1
0
4
-
1
0
9
,
2
0
0
7
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8708
A
S
u
r
ve
y:
Da
ta
Lea
k
a
g
e
Dete
ctio
n
Tech
n
iq
u
es (
K
.
S
.
W
a
g
h
)
2
253
B
I
O
G
RAP
HY
O
F
AUTHO
R
K
ish
o
r
S
.
W
a
g
h
r
e
c
e
iv
e
d
th
e
BE
d
e
g
re
e
in
Co
m
p
u
ter
En
g
in
e
e
rin
g
f
ro
m
No
rth
M
a
h
a
ra
sh
tra
U
n
iv
e
rsit
y
,
Ja
l
g
a
o
n
,
M
a
h
a
ra
sh
tra,
In
d
ia,
in
1
9
9
6
,
M
E
in
c
o
m
p
u
ter
En
g
in
e
e
rin
g
in
2
0
0
6
f
ro
m
P
ICT
,
S
a
v
it
rib
a
i
P
h
u
le
P
u
n
e
Un
iv
e
rsity
,
P
u
n
e
a
n
d
P
h
D
in
C
o
m
p
u
ter
S
c
ien
c
e
a
n
d
En
g
in
e
e
rin
g
f
ro
m
t
h
e
S
w
a
m
i
Ra
m
a
n
a
n
d
T
e
e
rth
M
a
ra
th
w
a
d
a
Un
iv
e
rsit
y
,
Na
n
d
e
d
.
He
is
A
ss
o
c
iate
P
ro
f
e
ss
o
r
w
it
h
t
h
e
d
e
p
a
rtm
e
n
t
o
f
Co
m
p
u
ter
En
g
in
e
e
rin
g
,
A
ll
In
d
ia
S
h
ri
S
h
iv
a
ji
M
e
m
o
rial
S
o
c
iety
’
s
In
stit
u
te
o
f
T
e
c
h
n
o
lo
g
y
,
P
u
n
e
.
His
re
se
a
r
c
h
a
re
a
in
c
lu
d
e
s
W
e
b
S
e
r
v
ice
s,
wire
d
a
n
d
w
irele
s
s
n
e
t
w
o
rk
s,
c
o
u
ld
c
o
m
p
u
ti
n
g
,
M
o
b
i
le
c
o
m
p
u
ti
n
g
a
n
d
Io
T
.
He
h
a
s
p
u
b
li
sh
e
d
se
v
e
ra
l
r
e
se
a
rc
h
p
a
p
e
rs
in
r
e
f
e
re
e
d
jo
u
rn
a
ls
a
n
d
p
r
o
f
e
ss
io
n
a
l
c
o
n
f
e
re
n
c
e
p
ro
c
e
e
d
in
g
s.
He
is
m
e
m
b
e
r
o
f
CS
I
,
IEE
E
a
n
d
L
if
e
m
e
m
b
e
r
o
f
IS
T
E.
Evaluation Warning : The document was created with Spire.PDF for Python.