File size attribute list

File size attribute list

Source publication
Article
Full-text available
Objective The aim of this study is to explore the analysis methods of data from citizens' personal information infringement cases. Methods We distinguish various types of case data according to inspection methods, and proposes three kinds of inspection methods including the methods of data conversion extraction, inspection of file size property and...

Similar publications

Article
Full-text available
With the technology advancements and easy availability of internet, every day millions of users share information electronically through emails, file sharing, e-commerce, etc. As, internet is highly vulnerable to various attacks, sending sensitive information over the Internet may be dangerous. One of the ways to protect the sensitive Information i...
Article
Full-text available
Fuzzing is a systematic large-scale search for software vulnerabilities achieved by feeding a sequence of randomly mutated input files to the program of interest with the goal being to induce a crash. The information about inputs, software execution traces, and induced call stacks (crashes) can be used to pinpoint and fix errors in the code or expl...
Article
Full-text available
Technical question and answer Q&A platforms, such as Stack Overflow, provide a platform for users to ask and answer questions about a wide variety of programming topics. These platforms accumulate a large amount of knowledge, including hundreds of thousands lines of source code. Developers can benefit from the source code that is attached to the qu...
Conference Paper
Full-text available
Despite the efforts of national governments and international organizations, inequality in the labor market remains. At the same time, its depth and manifestations are different within each country. The study offers a comprehensive method and information support for assessing the differentiation of inequality in the regional labor markets of Ukrain...