The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet is the main tool for e-business. E-transaction is made faster by Internet. With the increase of e-transaction internet fraud or e-business fraud is increasing. Credit fraud in the banking sector is a growing concern. Few sort of card (debit/credit) fraud is decreasing by providing detection and prevention system from banks and government. But card-not-present fraud losses are increasing at...
Financial industry is a heart of every robust economy, if it collapses so will the economy and it is absolutely evident from current recession in UK, and in turn, Information Technology has become the heart of banking sector. Investment and reliance in e-banking innovation by its providers to offer their services makes it essential to understand how various aspects of consumer behaviour affect the...
In this era of globalization, information security is becoming more important because the world is becoming highly interconnected with the Internet. At present customers can do banking online which is easy and time saving and at the same time they are vulnerable to threats. This paper seeks to investigate the current debate regarding the threats and vulnerabilities of the information security of online...
E-commerce is growing at an exceptional rate as more organizations are offering their goods and services on-line every day. Importantly, this growth is being matched by the number of people gaining access to the Internet in a variety of ways. E-commerce offers opportunities as well as threats. Information is crucial for any organization especially in the e-market. A key negative perception centres...
For over a decade researchers have been reporting the impact of self-similar long-range dependent network traffic. Long-range dependence (LRD) is of great significance in traffic engineering problems such as measurement, queuing strategy, buffer sizing and admission and congestion control. In this research, in order to determine the existence of LRD, we apply three different robust versions of the...
Many researchers have discussed the effects of heavy-tailedness in network traffic patterns and shown that Internet traffic flows exhibit characteristics of self-similarity that can be explained by the heavy-tailedness of the various distributions involved. Self-similarity and heavy-tailedness are of great importance for network capacity planning purposes in which researchers are interested in developing...
Various researchers have reported that traffic measurements demonstrate considerable burstiness on several time scales, with properties of self-similarity. Also, the rapid development of technologies has widened the scope of network and Internet applications and, in turn, increased traffic. The self-similar nature of this data traffic may exhibit spikiness and burstiness on large scales with such...
Long-range dependence characteristics have been observed in many natural or physical phenomena. In particular, a significant impact on data network performance has been shown in several papers. Congested Internet situations, where TCP/IP buffers start to fill, show long-range dependent (LRD) self-similar chaotic behaviour. The exponential growth of the number of servers, as well as the number of users,...
It was discovered that some LAN traffic exhibits self-similar rather than Poisson behaviour and there is ongoing research towards finding and improving suitable estimators which may help to characterize various types of network traffic. Such characterization can be potentially applied for control purposes such as traffic shaping, load balancing, etc. The Hurst exponent is used to measure the intensity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.