The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
ATM Security has always been one of the most prominent issues concerning the daily users and the not so frequent ones as well. This paper emphasizes on the hypothetical, yet very possible scenario of an individual's ATM card falling into the wrong hands, and the PIN number being cracked by a theft perpetrating entity. Our proposed model uses certain factors which would be monitored right from the...
Gestures are used in day to day life like nodding and waving without us being aware of them. It has become an important part in the communication among the humans. In the recent years new methods of Human Computer Interaction (HCI) are being developed. Some of them are based on interaction with machines through hand, head, facial expressions, voice, touch and many are still the current topic of research...
ICT has become an indispensable factor in the modern life of every individual. The elements of information and communication technology related sources are perceived as essential parameters in day today operation of banking both in private and public nature while deal with customers and stakeholders. The applications of ICT are augmenting in every sphere of our action includes both consumption and...
Memory Forensics is a novel and fast growing field in computer forensics, providing access to volatile information unavailable from a disk image. The memory forensics commenced when malware writers began reducing their footprints on the victim's hard disk and instead started storing crucial information within the machine's Random Access Memory. Windows 7 claims to be the most secure version of windows...
Intrusion Detection System (IDS) has increasingly become a crucial issue for computer and network systems. Intrusion poses a serious security risk in a network environment. The ever growing new intrusion types pose a serious problem for their detection. The acceptability and usability of Intrusion Detection Systems get seriously affected with the data in network traffic. A large number of false alarms...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.