The regulation and use of artificial intelligence and 5g technology to combat cybercrime and financial crime in south african banks

H Chitimira, P Ncube - Potchefstroom Electronic Law Journal …, 2021 - ajol.info
Artificial intelligence (AI) and fifth generation network technology (5G) are now being utilised
by some companies and financial institutions such as banks to enhance their …

[PDF][PDF] Biometrics: effectiveness and applications within the blended learning environment

M Sayed, F Jradi - Computer Engineering and Intelligent Systems, 2014 - academia.edu
Learning methods have been benefited by a large act of recent systems based on the
merging of several models of teaching. Blended learning philosophy has undergone a deep …

Wireless network attack: Raising the awareness of Kampung WiFi residents

S Fahmy, A Nasir, N Shamsuddin - … International Conference on …, 2012 - ieeexplore.ieee.org
The rapid growth of Information and Communication Technology has made people around
the world spending more time on the Internet than ever before. Online activities are carried …

[图书][B] System forensics, investigation, and response

J Vacca, K Rudolph - 2010 - books.google.com
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS
SECURITY & ASSURANCE SERIES! Computer crimes call for forensics specialists, people …

Gaziantep'te faaliyet gösteren orta ve büyük ölçekli işletmelerin siber güvenlik yönetim yaklaşımlarının analizi

A Bozgeyik - 2018 - openaccess.hku.edu.tr
Bilgi ve İletişim Teknolojilerinin (BİT), hayatımızın her alanına girdiği bir zamanda
yaşamaktayız. BİT hemen hemen herkes tarafından sosyalleşmede, bilgiye erişimde …

Symmetric key management and distribution techniques in wireless ad hoc networks

MB Krishna, M Doja - 2011 International Conference on …, 2011 - ieeexplore.ieee.org
In secure ad hoc network authorized nodes access the network based on network
initialization, authentication and secure communication. Authentication forms the core in …

Detection and prevention from different attacks in VANET: A Survey

AS Kaurav, SR Dutta - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
Routing attacks will have distressing effects over the network and bequest a significant
challenge once planning strong security mechanisms for vehicular communication. In this …

[图书][B] Towards a Baltic Sea region strategy in critical infrastructure protection

C Pursiainen - 2007 - diva-portal.org
Towards a Baltic Sea Region Strategy in Critical Infrastructure Protection Page 1 Towards a
Baltic Sea Region Strategy in Critical Infrastructure Protection Christer Pursiainen (ed.) with the …

An integrated security model for WLAN

ON Odhiambo, E Biermann, G Noel - AFRICON 2009, 2009 - ieeexplore.ieee.org
IEEE802. 11 wireless local Area Networks (WLAN) are widely deployed as extension to
corporate wired LAN infrastructures. The implication of including WLAN as part of the …

A survey of different tools and approaches for alddos attack

B Bargot, U Kulkarni - 2019 6th International Conference on …, 2019 - ieeexplore.ieee.org
Application layer is the upper layer in OSI and TCP/IP layered model which supports
application and end user processes. Application layer Distributed Denial of service (AL …