scispace - formally typeset
Search or ask a question
Topic

Data Corruption

About: Data Corruption is a research topic. Over the lifetime, 435 publications have been published within this topic receiving 6784 citations.


Papers
More filters
Patent
09 Jan 2020
TL;DR: In this article, the first electronic navigational plan data comprising a plurality of waypoints and storing it in a data store are disclosed for detecting data corruption or tampering in vehicle data systems.
Abstract: Systems and methods are disclosed for detecting data corruption in vehicle data systems. Systems and methods of detecting data corruption or tampering in vehicle data systems may include steps for receiving first electronic navigational plan data, the first electronic navigational plan data comprising a plurality of waypoints, and storing the first electronic navigational plan data in a data store. Systems and methods may further comprise receiving second electronic navigational plan data from a vehicle management system, the second electronic navigational plan data comprising a second plurality of waypoints, and, upon determining a discrepancy between the first plurality of waypoints and the second plurality of waypoints, generating an alert indicating possible data corruption in the second electronic navigational plan.
01 Jan 2015
TL;DR: The radiation in the space environment creates multiple upsets in the memories, when the datas are travelling from one system to another system, and the reliability of data transmission gets severely affected by these errors.
Abstract: The radiation in the space environment creates multiple upsets in the memories, when the datas are travelling from one system to another system. These upsets can become a serious problem in terms of accuracy and performance of the digital system. The reliability of data transmission gets severely affected by these errors.so it is essential to detect and correct the errors and protect the memories from data corruption. The various Error detecting and correcting codes are used to detect and correct the upsets.
Journal ArticleDOI
TL;DR: A Case History is presented which was developed as a result of a personal interview with the victims of an occurrence of operator corruption and suggests a possible approach to reducing the identified avenue of data corruption.
Abstract: Integrity is frequently a highly critical concern for computing systems, especially those which deal with financial concerns and in areas with high legal liability exposure in the event of loss or corruption of data. Systems for which data integrity is a high concern must consider system operators as a possible source of data corruption. A Case History is presented which was developed as a result of a personal interview with the victims of an occurrence of operator corruption. It gives the history of that occurrence and suggests a possible approach to reducing the identified avenue of data corruption.
Book ChapterDOI
01 Jan 2021
TL;DR: In this paper, the details of different models of information and data security and also the management of risk and different challenges is possessed by security and different threats and also importance of security.
Abstract: Information security and data security are the processes that are mainly based on preventing information from unauthorized access or in other words to secure information and data corruption throughout its lifecycle be it the information that is stored as physical format such as files which are subject to thefts or vandalism, etc. Since the very beginning of communication, everyone understood it was important to have a mechanism to preserve the private information. In the nineteenth century, more complex systems were made to let the government manage the information effectively. During the First World War, multi-tier systems were introduced to communicate info from one place to another. This study shows the details of different models of information and data security and also the management of risk and different challenges is possessed by security and different threats and also the importance of security.

Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
82% related
Software
130.5K papers, 2M citations
81% related
Wireless sensor network
142K papers, 2.4M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Cluster analysis
146.5K papers, 2.9M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20221
202121
202025
201927
201827
201727