Data-Leakage-Detection

Implemented Data allocation strategies that improve the probability of identifying leakages. Application can detect agent when the distributor’s sensitive data has been leaked by agents. Developed unobtrusive techniques for detecting leakage of a set of objects or records Developed a model for assessing the “guilt” of agents.