Repozitorij Univerze v Novi Gorici

Iskanje po repozitoriju
A+ | A- | Pomoč | SLO | ENG

Iskalni niz: išči po
išči po
išči po
išči po
* po starem in bolonjskem študiju

Opcije:
  Ponastavi


1 - 2 / 2
Na začetekNa prejšnjo stran1Na naslednjo stranNa konec
1.
Understanding fraudulent activities through m-commerce transactions
Saibal K. Pal, Rajan Gupta, Sunil K. Muttoo, 2016, samostojni znanstveni sestavek ali poglavje v monografski publikaciji

Opis: Technology changes its facet quicker than anything else. Every few years there is a revolution that changes the way we perceive technology and the way it impacts our lives. Mobile commerce industry has been swiftly bringing about an alteration in how we access the wireless network and marks a shift from personal computers to mobile devices. This chapter gives an outline of mobile commerce and will discuss about the various frauds prevalent on the internet and on mobiles specifically, and ways in which it can be curbed. The purpose of this chapter will be to make readers aware of the different types of fraudulent activities that can occur due to m-commerce transactions and their possible solutions will be elaborated at the end. The work will be beneficial for the students as well as researchers to form a basic background about m-commerce, various risks associated with it and their possible solutions.
Najdeno v: ključnih besedah
Povzetek najdenega: ...mobile commerce, attacks, frauds, digital hacking...
Ključne besede: mobile commerce, attacks, frauds, digital hacking
Objavljeno: 31.03.2021; Ogledov: 848; Prenosov: 28
URL Polno besedilo (0,00 KB)
Gradivo ima več datotek! Več...

2.
Internet traffic surveillance & network monitoring in India
Rajan Gupta, Sunil K. Muttoo, 2016, izvirni znanstveni članek

Opis: Internet traffic surveillance is gaining importance in today’s digital world. Lots of international agencies are putting in efforts to monitor the network around their countries to see suspicious activities and illegal or illegitimate transmission of messages. India, being a center of attraction for terrorist activities, is also working towards the development of such surveillance systems. NETRA or Network Traffic Analysis is one such effort being taken by the Indian Government to filter suspicious keywords from messages in the network. But is it good enough to be used at the highest level for security analysis or does the system design needs to be improved as compared to other similar systems around the world; this question is answered through this study. The comparison of NETRA is done against Dish Fire, Prism, and Echelon. The design of the NETRA scheme and implementation level analysis of the system shows few weaknesses like limited memory options, limited channels for monitoring, pre-set filters, ignoring big data demands, security concerns, social values breach and ignoring ethical issues. These can be covered through alternate options which can improve the existing system. The Inclusion of self-similarity models, Self-Configuring Network Monitoring, and smart monitoring through early intrusion detections can be embedded in the architecture of existing surveillance system to give it more depth and make it more robust.
Najdeno v: ključnih besedah
Povzetek najdenega: ...cyber attacks, NETRA, network monitoring, network traffic analysis, surveillance...
Ključne besede: cyber attacks, NETRA, network monitoring, network traffic analysis, surveillance system, spy system
Objavljeno: 01.04.2021; Ogledov: 718; Prenosov: 28
URL Polno besedilo (0,00 KB)
Gradivo ima več datotek! Več...

Iskanje izvedeno v 0 sek.
Na vrh