Cybercrime and cybercriminal activities continue to impact communities as the steady growth of electronic information systems enables more online business. The collective views …
DF Spake, R Zachary Finney, M Joseph - Journal of Research in …, 2011 - emerald.com
Purpose–The purpose of this paper is to examine antecedents of consumer online spending. Design/methodology/approach–A sample of 766 college students in the USA …
A Altaher, S Ramadass, A Ali - Australian Journal of Basic and Applied …, 2011 - Citeseer
Computer virus is a computer program that can copy itself and infect a computer, computer virus have become an increasingly important problem that threatens the security of computer …
Although network intrusion detection systems (IDSs) have been studied for several years, their operators are still overwhelmed by a large number of false-positive alerts. In this work …
As the computer networks continue to increase in size, complexity and importance, the network security issue becomes more and more important. In this paper, we propose a real …
KP Kumar, N Jaisankar, N Mythili - Journal of Advances in …, 2011 - academia.edu
In today's web world web sites became attackers' main target. Since days before virus signatures had been used to detect malicious web pages. In this paper the malicious web …
The defense of computer systems from malicious software attacks, such as viruses and worms, is a key aspect of computer security. The analogy between malicious software and …
A Altaher, S Ramadass, A Ali - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
The exhaustion of IPv4 addresses on November 2011 has made the future of the internet in the IPv6 and raised new challenges in the network security research. This paper proposed a …