Return to Article Details METHOD OF DETECTION OF INFORMATION LEAKAGE BY REJECTING TRAFFIC FROM THE INFORMATION COMMUNICATION NETWORK Download Download PDF