This document describes a proposed framework for e-iris enrollment and authentication to be incorporated into financial sector applications. The framework consists of two main modules: e-enrollment, which involves registering users' iris biometrics through a Java interface, and e-authentication, which authenticates users by scanning and matching their iris features. Key steps in the framework include iris image acquisition, preprocessing, feature extraction and encryption. The goal is to authenticate authorized users to different application functions based on access levels, while addressing issues like image quality and distance variations during enrollment. Implementation results demonstrating the framework's use for internet and mobile banking are also discussed.
IRJET- Phishing Attack based on Visual CryptographyIRJET Journal
This document proposes a novel anti-phishing framework based on visual cryptography to address the problem of phishing. It involves using an image-based authentication with visual cryptography. When a user registers, an image captcha is selected and decomposed into two shares - one stored with the user and one with the server. This prevents either party from seeing the full captcha alone. When logging in, the shares are combined to reveal the original captcha image for the user to enter as a password. This allows the user to verify the authenticity of the website before entering credentials, protecting against phishing attacks. The proposed system aims to improve online security for tasks like corporate elections that currently require in-person voting.
A Bring Your Own Device Risk Assessment ModelCSCJournals
Bring Your Own Device (BYOD), a technology where individuals or employees use their own devices on the organization’s network to perform tasks assigned to them by the organization has been widely embraced. The reasons for adoption are diverse in every organization. In spite of the security control strategies implemented by these organizations to safeguard their information resources, there has been an upsurge in information security breaches as a result of existing vulnerabilities in these systems and the legacy systems in use. Various approaches have been employed to deal with security challenges in BYOD, but according to literature, risk assessment has proved to be the first key step towards improving security of the BYOD environment in an enterprise. Risk assessment models have been proposed by various researchers, although, most are largely influenced by the degree of technological advancement and utilization as well as the working cultures within institutions. The existing models were largely developed in technologically advanced countries and thus do not fit well in developing countries. This study sought to develop flexible BYOD risk assessment model that can be adopted by varied institutions to secure their information resources. The study was carried out in Five (5) purposively selected state universities in Kenya. The research adopted a mixed research design approach with mixed sampling technique utilized to select the participants. Reliability and validity of data collection tools were evaluated and recommended by IT security and network experts. The qualitative and quantitative data was collected by interviewing experts and administering a questionnaire to sampled participants. The developed model was validated both statistically and by experts. The findings revealed that threats and vulnerabilities contributed to 39.9% and 69.2% respectively to the risk of the BYOD environment while Data Encryption (DE) and Software Updates (SU) came out strongly as intervening variables which have a major impact on the relationship between the dependent and independent variables.
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
The purpose of this research is to implement a smart receptionist system with facial recognition and voice interaction using deep learning. The facial recognition component is implemented using real time image processing techniques, and it can be used to learn new faces as well as detect and recognize existing faces. The first time a customer uses this system, it will take the person’s facial data to create a unique user facial model, and this model will be triggered if the person comes the second time. The recognition is done in real time and after which voice interaction will be applied. Voice interaction is used to provide a life-like human communication and improve user experience. Our proposed smart receptionist system could be integrated into the self check-in kiosks deployed in hospitals or smart buildings to streamline the user recognition process and provide customized user interactions. This system could also be used in smart home environment where smart cameras have been deployed and voice assistants are in place.
Phishing is a method that hackers use to fraudulently acquire sensitive or private information from a victim by impersonating a real entity (Turban, Leidner, McLean, & Wetherbe, 2010). Phishing can be defined as the act of soliciting or stealing sensitive information such as usernames, passwords, bank account numbers, credit card numbers, and social security or citizen ID numbers from individuals using the Internet (Ohaya, 2006). Phishing often involves some kind of deception. The results from a study of Jagatic et al. (2007) indicate that Internet users are four times more likely to become phishing victims if they receive a request from someone appearing to be a known friend or colleague. The Anti-Phishing Work Group indicates that at least five percent of users responded to phishing scams and about two million users gave away their information to spoofed websites (APWG, 2009). This results in direct losses of $1.2 billion for banks and credit card companies (Dhamija, 2006). In order to understand how phishing can be conducted, the researcher set up a phishing experiment in one of Thailand’s higher education institutions. The subjects were MBA students. A phishing email was sent to the subjects, and the message led the subject to visit the phishing website. One hundred seventy students became victims. The data collection included a survey, an interview, and a focus group. The results indicated that phishing could be easily conducted, and the result can have a great impact on the security of an organization. Organizations can use and apply the lessons learned from this study to formulate an effective security policy and security awareness training programs.
This document proposes and evaluates a context-based access control (CBAC) mechanism for Android systems. The CBAC mechanism allows users to set configuration policies over applications' usage of device resources and services based on the user's context. The proposed system uses context sensing and machine learning to classify contexts and then dynamically grants or revokes application privileges. Experiments show the CBAC mechanism incurs negligible energy overhead compared to the stock Android system. The CBAC framework provides improved privacy and security over existing location-based policy systems.
Cyber Security: User Access Pitfalls, A Case Study Approach Aviva Spectrum™
Worried your passwords are not strong enough for today’s sophisticated hackers? Cyber security breaches happen every day, as evidenced in recent headlines. Presentation covers key User Access threats both internal and external and ways to protect yourself and your company from malicious hackers. Learn from key case studies.
Smartphone is one of the important assets of today’s generation it makes people more responsive, productive and effective in work and in personal dealings. Remarkably it is used as the primary repository of individual confidential files because of its portability and reliability which provide a scheme to smartphone companies to embed security features and users install security application freely available in the market. In most various studies, facial recognition marked the highest security features. So, this study aims to develop a facial recognition application specifically for an android phone using a local binary histogram algorithm and V-Model to process the development of the application. Furthermore, this application is tested and evaluated by the experts with a score of 4.59 weighted mean “Excellent” based on its functionality, reliability, usability, efficiency and portability.
Two aspect authentication system using secure mobileUvaraj Shan
This document presents a two-factor authentication system that uses a user's mobile device. It combines one-time passwords as the first factor with encrypted user credentials stored on the mobile device as the second factor. The system is designed to provide strong authentication while reducing costs compared to hardware token-based systems. It analyzes the security of the approach and evaluates usability through a study. The study found participants were willing to accept lower usability for improved security when using untrusted computers.
IRJET- Phishing Attack based on Visual CryptographyIRJET Journal
This document proposes a novel anti-phishing framework based on visual cryptography to address the problem of phishing. It involves using an image-based authentication with visual cryptography. When a user registers, an image captcha is selected and decomposed into two shares - one stored with the user and one with the server. This prevents either party from seeing the full captcha alone. When logging in, the shares are combined to reveal the original captcha image for the user to enter as a password. This allows the user to verify the authenticity of the website before entering credentials, protecting against phishing attacks. The proposed system aims to improve online security for tasks like corporate elections that currently require in-person voting.
A Bring Your Own Device Risk Assessment ModelCSCJournals
Bring Your Own Device (BYOD), a technology where individuals or employees use their own devices on the organization’s network to perform tasks assigned to them by the organization has been widely embraced. The reasons for adoption are diverse in every organization. In spite of the security control strategies implemented by these organizations to safeguard their information resources, there has been an upsurge in information security breaches as a result of existing vulnerabilities in these systems and the legacy systems in use. Various approaches have been employed to deal with security challenges in BYOD, but according to literature, risk assessment has proved to be the first key step towards improving security of the BYOD environment in an enterprise. Risk assessment models have been proposed by various researchers, although, most are largely influenced by the degree of technological advancement and utilization as well as the working cultures within institutions. The existing models were largely developed in technologically advanced countries and thus do not fit well in developing countries. This study sought to develop flexible BYOD risk assessment model that can be adopted by varied institutions to secure their information resources. The study was carried out in Five (5) purposively selected state universities in Kenya. The research adopted a mixed research design approach with mixed sampling technique utilized to select the participants. Reliability and validity of data collection tools were evaluated and recommended by IT security and network experts. The qualitative and quantitative data was collected by interviewing experts and administering a questionnaire to sampled participants. The developed model was validated both statistically and by experts. The findings revealed that threats and vulnerabilities contributed to 39.9% and 69.2% respectively to the risk of the BYOD environment while Data Encryption (DE) and Software Updates (SU) came out strongly as intervening variables which have a major impact on the relationship between the dependent and independent variables.
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
The purpose of this research is to implement a smart receptionist system with facial recognition and voice interaction using deep learning. The facial recognition component is implemented using real time image processing techniques, and it can be used to learn new faces as well as detect and recognize existing faces. The first time a customer uses this system, it will take the person’s facial data to create a unique user facial model, and this model will be triggered if the person comes the second time. The recognition is done in real time and after which voice interaction will be applied. Voice interaction is used to provide a life-like human communication and improve user experience. Our proposed smart receptionist system could be integrated into the self check-in kiosks deployed in hospitals or smart buildings to streamline the user recognition process and provide customized user interactions. This system could also be used in smart home environment where smart cameras have been deployed and voice assistants are in place.
Phishing is a method that hackers use to fraudulently acquire sensitive or private information from a victim by impersonating a real entity (Turban, Leidner, McLean, & Wetherbe, 2010). Phishing can be defined as the act of soliciting or stealing sensitive information such as usernames, passwords, bank account numbers, credit card numbers, and social security or citizen ID numbers from individuals using the Internet (Ohaya, 2006). Phishing often involves some kind of deception. The results from a study of Jagatic et al. (2007) indicate that Internet users are four times more likely to become phishing victims if they receive a request from someone appearing to be a known friend or colleague. The Anti-Phishing Work Group indicates that at least five percent of users responded to phishing scams and about two million users gave away their information to spoofed websites (APWG, 2009). This results in direct losses of $1.2 billion for banks and credit card companies (Dhamija, 2006). In order to understand how phishing can be conducted, the researcher set up a phishing experiment in one of Thailand’s higher education institutions. The subjects were MBA students. A phishing email was sent to the subjects, and the message led the subject to visit the phishing website. One hundred seventy students became victims. The data collection included a survey, an interview, and a focus group. The results indicated that phishing could be easily conducted, and the result can have a great impact on the security of an organization. Organizations can use and apply the lessons learned from this study to formulate an effective security policy and security awareness training programs.
This document proposes and evaluates a context-based access control (CBAC) mechanism for Android systems. The CBAC mechanism allows users to set configuration policies over applications' usage of device resources and services based on the user's context. The proposed system uses context sensing and machine learning to classify contexts and then dynamically grants or revokes application privileges. Experiments show the CBAC mechanism incurs negligible energy overhead compared to the stock Android system. The CBAC framework provides improved privacy and security over existing location-based policy systems.
Cyber Security: User Access Pitfalls, A Case Study Approach Aviva Spectrum™
Worried your passwords are not strong enough for today’s sophisticated hackers? Cyber security breaches happen every day, as evidenced in recent headlines. Presentation covers key User Access threats both internal and external and ways to protect yourself and your company from malicious hackers. Learn from key case studies.
Smartphone is one of the important assets of today’s generation it makes people more responsive, productive and effective in work and in personal dealings. Remarkably it is used as the primary repository of individual confidential files because of its portability and reliability which provide a scheme to smartphone companies to embed security features and users install security application freely available in the market. In most various studies, facial recognition marked the highest security features. So, this study aims to develop a facial recognition application specifically for an android phone using a local binary histogram algorithm and V-Model to process the development of the application. Furthermore, this application is tested and evaluated by the experts with a score of 4.59 weighted mean “Excellent” based on its functionality, reliability, usability, efficiency and portability.
Two aspect authentication system using secure mobileUvaraj Shan
This document presents a two-factor authentication system that uses a user's mobile device. It combines one-time passwords as the first factor with encrypted user credentials stored on the mobile device as the second factor. The system is designed to provide strong authentication while reducing costs compared to hardware token-based systems. It analyzes the security of the approach and evaluates usability through a study. The study found participants were willing to accept lower usability for improved security when using untrusted computers.
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document describes a web vulnerability scanner created by students at D.Y.Patil College of Engineering. The scanner focuses on detecting and preventing common web vulnerabilities like SQL injection, cross-site scripting, file inclusions, and OS command injection. It was developed using the waterfall model, with phases for requirements gathering, system design including UML diagrams, and implementation. The motivation was that cyber attacks cost the global economy over $400 billion annually, so an automatic tool is needed to identify vulnerabilities in web applications.
Biometric technologies use biological features such as fingerprints, veins, faces and irises to identify individuals. They greatly improve the accuracy and reliability of identification and verification systems by taking out the element of human error. In the area of public safety, biometric technologies in the form of fingerprinting, iris and facial recognition have made a significant contribution to border control and law enforcement. Brought to you by NEC. To find out more, do visit http://www.nec.com/safety
The Auto response system for legal consultation will provide the knowledge of cyber laws. The objective is to implement the legal consultant system service by using chat bot Technology. It was implemented based on the information of the offence, previous records of cyber crimes and under sections of INDIAN IT ACT 2008 and their penalty all the records are gathered. User will input the offence then the chat bot will take the keyword from that offence and search for the law for that particular offence or crime and it will show the penalties, sections, and imprisonment for that offence or crime. Nikita Bhanushali | Shruti Habibkar | Sagar Shah | Amol Dhumal | Radhika Fulzele "Auto Response System for Legal Consultation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31045.pdf Paper Url :https://www.ijtsrd.com/engineering/computer-engineering/31045/auto-response-system-for-legal-consultation/nikita-bhanushali
Security issues vs user awareness in mobile devices a surveyIAEME Publication
- The document discusses security issues with mobile devices and user awareness of these issues. It provides an overview of how mobile phones have evolved beyond simple calling devices and are now used for many applications, storing sensitive data, and accessing the internet which has made them targets for attacks.
- It then summarizes a survey that was conducted online about possible attacks on mobile devices and also outlines some case studies of specific attacks that have occurred, including banking trojans that target two-factor authentication and hijack SMS messages to steal authentication codes.
This document provides a brief survey of mobile forensics analysis on social networking applications. It discusses two popular social networking applications, Tagged and Hi5, and describes some of their key features that could be relevant to forensic investigations. Specifically, it outlines features like registration details, friend networks, media sharing, instant messaging, status updates, and other profile building features. The document suggests electronic evidence retrieved from activities on these social networking platforms could help investigate criminal cases by incriminating or proving the innocence of suspects.
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
This document proposes a method for human identification using major and minor finger knuckle patterns. A team of researchers led by Dr. Raja developed a novel person identification system that extracts knuckle print features using Radon transform. The knuckle print image is treated as a texture image, and Radon transform computes line integrals along parallel paths in certain directions to represent the texture information in the image. The proposed method aims to provide contactless and unrestricted access control using finger knuckle biometrics, which are user-centric and have stable and unique features.
The document summarizes the findings of a global study on consumer confidence and trust in mobile technologies. It found that while mobile device usage is widespread, many users lack confidence in the security of their devices and the networks and services they access. The rapid growth of mobile threats has not been matched with adequate security precautions by users. Building greater trust will require coordinated efforts across the entire mobile industry to address security and reliability issues.
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...IRJET Journal
This document reports on a survey and educational seminar about social media usage and cybercrime awareness among youth in government colleges in India. The survey found that most students use social media frequently but have little knowledge about cyber threats. It also found that students spend most evenings on social media and it negatively impacts their studies. However, most wanted to learn about cybercrime. To address this, researchers conducted an educational seminar on cybercrime trends, detection and legal issues. The seminar aimed to provide necessary information on cyber safety to students since many have smartphones and internet access but lack awareness of associated risks.
Detection and prevention method of rooting attack on the android phonesIAEME Publication
This document summarizes a thesis about detecting and preventing rooting attacks on Android phones. It discusses how personal information and authentication certificates are saved on Android devices and vulnerable to exploitation during financial transactions if the phone is rooted. The document outlines two common rooting methods, RageAgainstTheCage and GingerBreak, that gain root access by exploiting vulnerabilities in the Android OS. It proposes analyzing how information is stored and establishing countermeasures to protect against rooting attacks and prevent leakage of financial data from Android phones.
Many applications on smart Phones can use various sensors embedded in the mobiles to provide users’ private information. This can result in a variety of privacy issues that may lessening level of mobile apps usage. To understand this issue better the researcher identified the root causes of privacy concerns. The study proposed a model identifies the root causes of privacy concerns and perceived benefits based on our interpretation for information boundary theory. The proposed model also addresses the usage behavior and behavioral intention toward using mobile apps by using the Theory of Planned Behavior. The result shows that “Cultural values” alone explains 70% of “Perceived privacy concerns” followed by “Self-defense” which explains around 23% of “Perceived privacy concerns”, and then “Context of the situation” with 5%. Whereas, the findings show that “Perceived effectiveness of privacy policy” and “Perceived effectiveness of industry self-regulation” both are factors which have the ability to reduce individuals “Perceived privacy concerns” by 9% and 8% respectively.
This document is a project report on cybercrime in the banking sector submitted by Praveen Singh Pokharia to the University of Lucknow. It contains an introduction that defines cybercrime and notes that cybercrime in banking involves crimes like ATM fraud, money laundering, and credit card fraud. It also provides an index of topics to be covered in the report such as the reasons for cybercrime, cybercriminals, cybercrime in the banking sector, case studies, and recent cases. The report aims to analyze cybercrime affecting the banking sector in India.
Information Leakage Prevention Using Public Key Encryption System and Fingerp...CSCJournals
This document proposes and evaluates a system using RSA public key encryption, fingerprint authentication, and the Apriori algorithm to prevent information leakage. The system generates encryption keys for users based on registration details including fingerprints. Users encrypt messages with the public key before sending. The administrator verifies identities using fingerprints matched with the Apriori algorithm before decrypting messages with the private key. The system was tested on a university network and achieved high security preventing unauthorized access to data.
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
This document discusses an automated model for detecting fake profiles and botnets in online social networks. It begins with background on the prevalence of fake accounts, which can compromise user privacy and security. Next, it reviews related work on using data hiding techniques like steganography and watermarking to embed information in profile pictures in order to identify suspicious accounts. The proposed model aims to automatically detect fake profiles and botnets to replace current manual methods that are costly and labor-intensive.
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
As data represent a key asset for today's organizations. The problem is that how to protect this data from
attackers, theft and misuse is at the forefront of any organization’s mind. Even though today several data
security techniques are available to protect database and computing infrastructure, many such as network
security and firewalls tools are unable to prevent attacks from insider. Insider is a person working in
organization who can try to access the sensitive data. This paper proposes a two-way authentication method
which fuses knowledge-based secret and personal trait information.
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...CSCJournals
The growing usage of smart speakers raises many privacy and trust concerns compared to other technologies such as smart phones and computers. In this study, a proxy measure of trust is used to gauge users’ opinions on three different technologies based on an empirical study, and to understand which technology most people are most likely to trust. The collected data were analyzed using the Kruskal-Wallis H test to determine the statistical differences between the users’ trust level of the three technologies: smart speaker, computer and smart phone. The findings of the study revealed that despite the wide acceptance, ease of use and reputation of smart speakers, people find it difficult to trust smart speakers with their sensitive information via the Direct Voice Input (DVI) and would prefer to use a keyboard or touchscreen offered by computers and smart phones. Findings from this study can inform future work on users’ trust in technology based on perceived ease of use, reputation, perceived credibility and risk of using technologies via DVI.
This document discusses various financial planning concepts for retirement including choosing a retirement date and standard of living, conducting a financial needs analysis, diversifying investments, paying off high interest debt, replacing appliances before retiring, using capital for growth not purchases, obtaining financial planning services, addressing income and growth needs separately, and being aware of inflation and taxes. It provides tips for comprehensive retirement planning.
El documento presenta la agenda escolar semanal del Instituto Santa María Goretti para la semana del 12 al 16 de mayo de 2014. La agenda incluye el horario diario de clases, eventos como conferencias y talleres, así como días especiales como el Día del Maestro. También proporciona información sobre proyectos escolares y enlaces a la agenda escolar en línea.
Este documento describe la historia y desarrollo de la lengua de signos y el alfabeto dactilológico. Explica que Charles-Michael de l'Epée fue pionero en la enseñanza a sordos en el siglo 18 en Francia. Su trabajo ayudó a establecer la primera escuela gratuita para sordos y difundir la lengua de signos francesa a otras partes de Europa. Más tarde, la lengua de signos estadounidense se desarrolló a partir de una mezcla de signos franceses e ind
This document is Shannon Osendorf's resume. It lists her contact information, objective of helping kids learn, education including graduating from Cathedral High School in 2014, professional experience as a front end manager at Coborn's and student worker at St. Cloud State University, and volunteer activities including at St. John the Baptist Parish since 2007 and St. Cloud Children's Home from 2012 to 2014.
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document describes a web vulnerability scanner created by students at D.Y.Patil College of Engineering. The scanner focuses on detecting and preventing common web vulnerabilities like SQL injection, cross-site scripting, file inclusions, and OS command injection. It was developed using the waterfall model, with phases for requirements gathering, system design including UML diagrams, and implementation. The motivation was that cyber attacks cost the global economy over $400 billion annually, so an automatic tool is needed to identify vulnerabilities in web applications.
Biometric technologies use biological features such as fingerprints, veins, faces and irises to identify individuals. They greatly improve the accuracy and reliability of identification and verification systems by taking out the element of human error. In the area of public safety, biometric technologies in the form of fingerprinting, iris and facial recognition have made a significant contribution to border control and law enforcement. Brought to you by NEC. To find out more, do visit http://www.nec.com/safety
The Auto response system for legal consultation will provide the knowledge of cyber laws. The objective is to implement the legal consultant system service by using chat bot Technology. It was implemented based on the information of the offence, previous records of cyber crimes and under sections of INDIAN IT ACT 2008 and their penalty all the records are gathered. User will input the offence then the chat bot will take the keyword from that offence and search for the law for that particular offence or crime and it will show the penalties, sections, and imprisonment for that offence or crime. Nikita Bhanushali | Shruti Habibkar | Sagar Shah | Amol Dhumal | Radhika Fulzele "Auto Response System for Legal Consultation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31045.pdf Paper Url :https://www.ijtsrd.com/engineering/computer-engineering/31045/auto-response-system-for-legal-consultation/nikita-bhanushali
Security issues vs user awareness in mobile devices a surveyIAEME Publication
- The document discusses security issues with mobile devices and user awareness of these issues. It provides an overview of how mobile phones have evolved beyond simple calling devices and are now used for many applications, storing sensitive data, and accessing the internet which has made them targets for attacks.
- It then summarizes a survey that was conducted online about possible attacks on mobile devices and also outlines some case studies of specific attacks that have occurred, including banking trojans that target two-factor authentication and hijack SMS messages to steal authentication codes.
This document provides a brief survey of mobile forensics analysis on social networking applications. It discusses two popular social networking applications, Tagged and Hi5, and describes some of their key features that could be relevant to forensic investigations. Specifically, it outlines features like registration details, friend networks, media sharing, instant messaging, status updates, and other profile building features. The document suggests electronic evidence retrieved from activities on these social networking platforms could help investigate criminal cases by incriminating or proving the innocence of suspects.
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
This document proposes a method for human identification using major and minor finger knuckle patterns. A team of researchers led by Dr. Raja developed a novel person identification system that extracts knuckle print features using Radon transform. The knuckle print image is treated as a texture image, and Radon transform computes line integrals along parallel paths in certain directions to represent the texture information in the image. The proposed method aims to provide contactless and unrestricted access control using finger knuckle biometrics, which are user-centric and have stable and unique features.
The document summarizes the findings of a global study on consumer confidence and trust in mobile technologies. It found that while mobile device usage is widespread, many users lack confidence in the security of their devices and the networks and services they access. The rapid growth of mobile threats has not been matched with adequate security precautions by users. Building greater trust will require coordinated efforts across the entire mobile industry to address security and reliability issues.
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...IRJET Journal
This document reports on a survey and educational seminar about social media usage and cybercrime awareness among youth in government colleges in India. The survey found that most students use social media frequently but have little knowledge about cyber threats. It also found that students spend most evenings on social media and it negatively impacts their studies. However, most wanted to learn about cybercrime. To address this, researchers conducted an educational seminar on cybercrime trends, detection and legal issues. The seminar aimed to provide necessary information on cyber safety to students since many have smartphones and internet access but lack awareness of associated risks.
Detection and prevention method of rooting attack on the android phonesIAEME Publication
This document summarizes a thesis about detecting and preventing rooting attacks on Android phones. It discusses how personal information and authentication certificates are saved on Android devices and vulnerable to exploitation during financial transactions if the phone is rooted. The document outlines two common rooting methods, RageAgainstTheCage and GingerBreak, that gain root access by exploiting vulnerabilities in the Android OS. It proposes analyzing how information is stored and establishing countermeasures to protect against rooting attacks and prevent leakage of financial data from Android phones.
Many applications on smart Phones can use various sensors embedded in the mobiles to provide users’ private information. This can result in a variety of privacy issues that may lessening level of mobile apps usage. To understand this issue better the researcher identified the root causes of privacy concerns. The study proposed a model identifies the root causes of privacy concerns and perceived benefits based on our interpretation for information boundary theory. The proposed model also addresses the usage behavior and behavioral intention toward using mobile apps by using the Theory of Planned Behavior. The result shows that “Cultural values” alone explains 70% of “Perceived privacy concerns” followed by “Self-defense” which explains around 23% of “Perceived privacy concerns”, and then “Context of the situation” with 5%. Whereas, the findings show that “Perceived effectiveness of privacy policy” and “Perceived effectiveness of industry self-regulation” both are factors which have the ability to reduce individuals “Perceived privacy concerns” by 9% and 8% respectively.
This document is a project report on cybercrime in the banking sector submitted by Praveen Singh Pokharia to the University of Lucknow. It contains an introduction that defines cybercrime and notes that cybercrime in banking involves crimes like ATM fraud, money laundering, and credit card fraud. It also provides an index of topics to be covered in the report such as the reasons for cybercrime, cybercriminals, cybercrime in the banking sector, case studies, and recent cases. The report aims to analyze cybercrime affecting the banking sector in India.
Information Leakage Prevention Using Public Key Encryption System and Fingerp...CSCJournals
This document proposes and evaluates a system using RSA public key encryption, fingerprint authentication, and the Apriori algorithm to prevent information leakage. The system generates encryption keys for users based on registration details including fingerprints. Users encrypt messages with the public key before sending. The administrator verifies identities using fingerprints matched with the Apriori algorithm before decrypting messages with the private key. The system was tested on a university network and achieved high security preventing unauthorized access to data.
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
This document discusses an automated model for detecting fake profiles and botnets in online social networks. It begins with background on the prevalence of fake accounts, which can compromise user privacy and security. Next, it reviews related work on using data hiding techniques like steganography and watermarking to embed information in profile pictures in order to identify suspicious accounts. The proposed model aims to automatically detect fake profiles and botnets to replace current manual methods that are costly and labor-intensive.
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
As data represent a key asset for today's organizations. The problem is that how to protect this data from
attackers, theft and misuse is at the forefront of any organization’s mind. Even though today several data
security techniques are available to protect database and computing infrastructure, many such as network
security and firewalls tools are unable to prevent attacks from insider. Insider is a person working in
organization who can try to access the sensitive data. This paper proposes a two-way authentication method
which fuses knowledge-based secret and personal trait information.
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...CSCJournals
The growing usage of smart speakers raises many privacy and trust concerns compared to other technologies such as smart phones and computers. In this study, a proxy measure of trust is used to gauge users’ opinions on three different technologies based on an empirical study, and to understand which technology most people are most likely to trust. The collected data were analyzed using the Kruskal-Wallis H test to determine the statistical differences between the users’ trust level of the three technologies: smart speaker, computer and smart phone. The findings of the study revealed that despite the wide acceptance, ease of use and reputation of smart speakers, people find it difficult to trust smart speakers with their sensitive information via the Direct Voice Input (DVI) and would prefer to use a keyboard or touchscreen offered by computers and smart phones. Findings from this study can inform future work on users’ trust in technology based on perceived ease of use, reputation, perceived credibility and risk of using technologies via DVI.
This document discusses various financial planning concepts for retirement including choosing a retirement date and standard of living, conducting a financial needs analysis, diversifying investments, paying off high interest debt, replacing appliances before retiring, using capital for growth not purchases, obtaining financial planning services, addressing income and growth needs separately, and being aware of inflation and taxes. It provides tips for comprehensive retirement planning.
El documento presenta la agenda escolar semanal del Instituto Santa María Goretti para la semana del 12 al 16 de mayo de 2014. La agenda incluye el horario diario de clases, eventos como conferencias y talleres, así como días especiales como el Día del Maestro. También proporciona información sobre proyectos escolares y enlaces a la agenda escolar en línea.
Este documento describe la historia y desarrollo de la lengua de signos y el alfabeto dactilológico. Explica que Charles-Michael de l'Epée fue pionero en la enseñanza a sordos en el siglo 18 en Francia. Su trabajo ayudó a establecer la primera escuela gratuita para sordos y difundir la lengua de signos francesa a otras partes de Europa. Más tarde, la lengua de signos estadounidense se desarrolló a partir de una mezcla de signos franceses e ind
This document is Shannon Osendorf's resume. It lists her contact information, objective of helping kids learn, education including graduating from Cathedral High School in 2014, professional experience as a front end manager at Coborn's and student worker at St. Cloud State University, and volunteer activities including at St. John the Baptist Parish since 2007 and St. Cloud Children's Home from 2012 to 2014.
TEAM 7 RAY RICHARDS FINAL PRESENTATION PAPER Daryn Skjefte
This document provides a marketing plan presentation for Ray Richards Golf Course in Grand Forks, ND. It discusses the current situation of the golf course and opportunities for growth. It identifies the target audiences as male college students and older retired men. It also analyzes competitors and provides a SWOT analysis. Brand positioning and creative strategies are proposed to better promote the golf course.
The document discusses launching a packaged Pav Bhaji product in India. It summarizes the changing consumer landscape in India with rising incomes, nuclear families, and preference for convenience foods. It then outlines the marketing plan for the packaged Pav Bhaji product, including details of the 4Ps of marketing - Product (WOW! packaged Pav Bhaji), Price (Rs. 50), Place (launching at Dushera Mela in Delhi), and Promotion (buy one get one free butter offer during Diwali launch). The document also discusses the product's target customers of working women, schools/colleges and offices, and distribution channels including agents, distributors, retailers, and franchises.
El documento resume la historia de la facturación electrónica en España desde 1989 hasta la actualidad. Comenzó con la creación de un entorno EDI en 1989 y obtuvo validez legal en 1996. En 2003, el entorno EDI comenzó a exigir facturas electrónicas. En 2007 se publicaron leyes para impulsar la gestión telemática entre el gobierno y las empresas. En 2013 se publicó una ley que hizo obligatoria la factura electrónica para proveedores del sector público y privado en 2015. Actualmente, 59 millones de facturas electrón
Este documento proporciona un menú orientativo para niños a partir de los dos años, aunque se deja a criterio de los padres si se lo pueden dar antes. Incluye una tabla con opciones de comidas e hipervínculos a las recetas sugeridas.
Saskia Bussink - Investing in property - Do it yourself or learn from meSaskia Bussink
Since 2013 I have been a professional property investor. Got educated in UK through trainings and mentorship. My main investing area’s are Scotland England.
I have been a property mentor since 2018. , in combination with being a business coach. It makes me happy to see other people grow in themselves, with their business and in generating passive income streams.
Why I am doing this is because I love my freedom ❤️
In this slideshow I'll show you my path, the numbers, about the WHY and strategy.
Learn it yourself or invest in one of my projects.
Need to know more and see how I could help you? Go to
Saskiabussink.com/vastgoed-in-engeland
(in Dutch).
Regards Saskia Bussink
El documento describe el sistema RepTrak Pulse para medir la reputación corporativa. Se basa en cuatro pilares (estima, admiración, confianza e impresión) y siete dimensiones como liderazgo, finanzas, oferta, innovación, trabajo, integridad y ciudadanía. Evalúa la reputación a través de estas dimensiones y preguntas sobre la intención de recomendar la empresa. Existe una fuerte correlación entre los factores clave de reputación (oferta, innovación, trabajo, integridad y ciudadanía) y los factores de apo
Czech Republic's Environment for Investment and Business InnovationJan Fried
The document summarizes the Czech Republic's environment for investment and business innovation. It discusses CzechInvest, the country's investment promotion agency, and provides an overview of the Czech Republic's attractive investment climate, priority sectors for foreign investment such as automotive and aerospace, and capabilities in research and development.
Jesus trouxe novos ensinamentos baseados no amor e na caridade para reformar as ideias sobre Deus, ensinando a amar a Deus e ao próximo e trazendo a noção de um Deus justo e bom, não punitivo. Ele não pretendia destruir as leis de Moisés mas sim atualizá-las para a evolução moral humana.
The document outlines a business plan for starting a medical device supply company in South Africa. It provides an overview of the market opportunity in South Africa, including growth rates in the medical device industry and the types of products sold. It then outlines 7 steps to starting the business, including selecting a niche market, obtaining necessary licenses and permits, setting up inventory, and marketing strategies. Key points about the South African market such as the size of the public and private hospital sector and available financing options are also summarized.
La asociación latinoamericana de integración (aladi)Mario Flores
La Asociación Latinoamericana de Integración (ALADI) es un organismo regional creado en 1980 para promover la integración económica entre sus 13 países miembros de América Latina. La ALADI busca crear un área de preferencias económicas y eventualmente un mercado común a través de acuerdos comerciales regionales y bilaterales entre sus miembros.
Caso de éxito: Gallina Blanca automatiza sus pedidos y cargos de clientesEsker Ibérica
La multinacional de alimentación gestiona con tecnología de Esker la atención de 30.000 pedidos al año, así como 7.000 facturas de cargo, más de la mitad de las cuales se tramitan en menos de un minuto, liberando así tiempo de sus responsables de Servicio al Cliente.
Security and privacy recommendation of mobile app for Arabic speakingIJECEIAES
There is an enormous number of mobile apps, leading users to be concerned about the security and privacy of their data. But few users are aware of what is meant by app permissions, which sometimes do not illustrate what kind of data is gathered. Therefore, users are still concerned about security risks and privacy, with little knowledge and experience of what security and privacy awareness. Users depend on ratings, which may be fake, or keep track of their sense to install an app, and an enormous number of users do not like to read reviews. To solve this issue, we propose a recommender system that reads users' reviews, and which exposes flaws, violations and third-party policies or the quality of a user's experience. In order to design and implement our recommender, we conduct a survey which supports two significant points: to detect the level of security and privacy awareness between users, and to gather new words into a dictionary of a recommender system, which assists to classify each review on the correct level, which can indeed reveal the scale of security and privacy in an app.
How to reduce security risks to ensure user confidence in m-paymentsBMI Healthcare
Do you understand what the major security challenges are, such as vulnerabilities of devices, complex supply chain and fraudsters? Our whitepaper discusses key security approaches helping you to overcome them, thus improving customer confidence.
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...Syeful Islam
In the era ofinternet, most ofthe people all over the world completed their transaction
on internet. Though the user of electronic transaction or E-money transaction system
increase rapidly but the majority person are concern about the security of this system.
The growth in online transactions has resulted in a greater demand for fast and accurate
user identification and authentication. Conventional method of identification based on
possession of ID cards or exclusive knowledge like a social security number or a
password are not all together reliable. Identification and authentication by individuals'
biometric characteristics is becoming an accepted procedure that is slowly replacing the
most popular identification procedure – passwords. Among all the biometrics, fingerprint
based identification is one of the most mature and proven technique. Along with the
combination of conventional system, biometric security, Global positioning system(GPS)
and mobile messaging we have design an algorithm which increase security ofelectronic
transaction and more reliable to user. A three layer security model to enhancing security
ofelectronic transaction is proposed in this paper.
A Review of Information Security from Consumer’s Perspective Especially in On...Dr. Amarjeet Singh
In the current internet technology, most of the transactions to banking system are effective through online transaction. Predominantly all these e-transactions are done through e-commerce web sites with the help of credit/debit cards, net banking and lot of other payable apps. So, every online transaction is prone to vulnerable attacks by the fraudulent websites and intruders in the network. As there are many security measures incorporated against security vulnerabilities, network thieves are smart enough to retrieve the passwords and break other security mechanisms. At present situation of digital world, we need to design a secured online transaction system for banking using multilevel encryption of blowfish and AES algorithms incorporated with dual OTP technique. The performance of the proposed methodology is analyzed with respect to number of bytes encrypted per unit time and we conclude that the multilevel encryption provides better security system with faster encryption standards than the ones that are currently in use.
The need for effective information security awareness practices.CAS
Introduction
Internet usage in Oman
IT Security incidents in Oman
Proposed work
Key findings
Effective usage
Organization network awareness
Threat awareness
Password management
Content awareness
Security practices awareness
ITSACAS Approach
Conclusion
SQL Vulnerability Prevention in Cybercrime using Dynamic Evaluation of Shell and Remote File Injection Attacks R. Ravi,
Department of Computer Science & Engineering,
Francis Xavier Engineering College, Tamil Nadu, India
Dr. Beulah Shekhar,
Department of Criminology,
Manonmanium Sundaranar University, Tamil Nadu, India
Multi level parsing based approach against phishing attacks with the help of ...IJNSA Journal
The increasing use of internet all over the world, be it in households or in corporate firms, has led to an
unprecedented rise in cyber-crimes. Amongst these the major chunk consists of Internet attacks which are
the most popular and common attacks are carried over the internet. Generally phishing attacks, SSL
attacks and some other hacking attacks are kept into this category. Security against these attacks is the
major issue of internet security in today’s scenario where internet has very deep penetration. Internet has
no doubt made our lives very convenient. It has provided many facilities to us at penny’s cost. For instance
it has made communication lightning fast and that too at a very cheap cost. But internet can pose added
threats for those users who are not well versed in the ways of internet and unaware of the security risks
attached with it. Phishing Attacks, Nigerian Scam, Spam attacks, SSL attacks and other hacking attacks are
some of the most common and recent attacks to compromise the privacy of the internet users. Many a times
if the user isn’t careful, then these attacks are able to steal the confidential information of user (or
unauthorized access). Generally these attacks are carried out with the help of social networking sites,
popular mail server sites, online chatting sites etc. Nowadays, Facebook.com, gmail.com, orkut.com and
many other social networking sites are facing these security attack problems.
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET Journal
This document summarizes a research paper on honeywords, a new approach for enhancing password security. Honeywords involve storing fake passwords (honeywords) along with the real password for each user account. If an attacker tries to login with a honeyword, it triggers an alarm. The document outlines the proposed system, which generates a unique honey index for each account during registration. It stores the hash of the real password along with the correct honey index. If an attacker enters an incorrect password after 3 attempts, the account is blocked. The system creates honeywords after successful login. It also discusses related work and concludes that honeywords make password cracking detectable and more difficult.
This document proposes a system for strengthening security for online banking transactions. It involves multi-level authentication including face recognition, graphical OTP authentication using a 4x4 grid of random numbers, and security questions. Users first register security images, a security pattern by selecting indexes on a 4x4 grid, answers to security questions, and their face is recorded. For login, the security images and username/password are verified. Transactions require face recognition if a webcam is available, otherwise graphical OTP authentication is used where the user selects numbers from the indexes of their security pattern on a randomly generated 4x4 grid. Additionally, two random security questions are asked before completing a transaction. The system aims to provide secure electronic transactions through this multi-factor
Research Article On Web Application SecuritySaadSaif6
This Is The Totally Hand Written Research Article On
Web Application Security
(Improving Critical Web-based Applications Quality Through In depth Security Analysis)
This Research Article Was Made By Me After The Hard Working Of One Month. Its Best And Suitable For Your Research Paper And Also Used In Class For Present It And For Submission.
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...IRJET Journal
This document presents a comparative study of machine learning approaches for credit card fraud detection. It explores isolation forest, local outlier factor (LOF), and one-class support vector machine (SVM) algorithms for fraud detection and compares their performance. The document first collects a dataset of credit card transactions containing both legitimate and fraudulent examples. It then implements and evaluates the machine learning models, assessing their ability to accurately identify fraud while minimizing false positives. Statistical tests and visualization techniques like ROC curves are used to analyze the models' performance. The best-performing aspects of each model are identified to inform optimal fraud detection.
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...IJNSA Journal
The increasing use of internet all over the world, be it in households or in corporate firms, has led to an unprecedented rise in cyber-crimes. Amongst these the major chunk consists of Internet attacks which are the most popular and common attacks are carried over the internet. Generally phishing attacks, SSL attacks and some other hacking attacks are kept into this category. Security against these attacks is the major issue of internet security in today’s scenario where internet has very deep penetration. Internet has no doubt made our lives very convenient. It has provided many facilities to us at penny’s cost. For instance it has made communication lightning fast and that too at a very cheap cost. But internet can pose added threats for those users who are not well versed in the ways of internet and unaware of the security risks attached with it. Phishing Attacks, Nigerian Scam, Spam attacks, SSL attacks and other hacking attacks are some of the most common and recent attacks to compromise the privacy of the internet users. Many a times if the user isn’t careful, then these attacks are able to steal the confidential information of user (or unauthorized access). Generally these attacks are carried out with the help of social networking sites, popular mail server sites, online chatting sites etc. Nowadays, Facebook.com, gmail.com, orkut.com and many other social networking sites are facing these security attack problems.
This paper discusses a Knowledge Base Compound approach which is based on query operations and parsing techniques to counter these internet attacks using the web browser itself. In this approach we propose to analyze the web URLs before visiting the actual site, so as to provide security against web attacks mentioned above. This approach employs various parsing operations and query processing which use many techniques to detect the phishing attacks as well as other web attacks. The aforementioned approach is completely based on operation through the browser and hence only affects the speed of browsing. This approach also includes Crawling operation to detect the URL details to further enhance the precision of detection of a compromised site. Using the proposed methodology, a new browser can easily detects the phishing attacks, SSL attacks, and other hacking attacks. With the use of this browser approach, we can easily achieve 96.94% security against phishing as well as other web based attacks.
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET Journal
This document summarizes a research paper that proposes using honey encryption to mitigate cross-site scripting attacks on banking applications. Honey encryption is a technique that provides fake encrypted data to attackers who attempt to access accounts with incorrect passwords. The paper aims to implement a banking system with real-time features, prevent fraudulent access to legitimate accounts, and encrypt account details to provide wrong information to unauthorized parties. Challenges include honey encryption not working for small datasets, slow encryption/decryption for large datasets, and potential privacy issues if real data is leaked before users are notified. The paper reviews related work on detecting cross-site scripting, data-driven fuzzing, banking fraud analysis systems, and applying honey encryption to file storage and natural
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET Journal
This document presents an eye tracking system for password authentication using machine learning. It aims to overcome shoulder surfing attacks by allowing users to enter passwords using their eye movements instead of a keyboard. The system detects the user's eye pupil location using a Haar cascade algorithm and measures the distance between the eye center and pupil to determine if the user is looking left, right, or center. Numbers are displayed on screen and the user selects them by focusing on them with their eyes. The entered password is compared to a trained dataset and access is allowed only if it matches. This gaze-based authentication method leaves no trace of the password and makes it difficult for observers to steal authentication information through shoulder surfing.
Malicious-URL Detection using Logistic Regression TechniqueDr. Amarjeet Singh
Over the last few years, the Web has seen a
massive growth in the number and kinds of web services.
Web facilities such as online banking, gaming, and social
networking have promptly evolved as has the faith upon them
by people to perform daily tasks. As a result, a large amount
of information is uploaded on a daily to the Web. As these
web services drive new opportunities for people to interact,
they also create new opportunities for criminals. URLs are
launch pads for any web attacks such that any malicious
intention user can steal the identity of the legal person by
sending the malicious URL. Malicious URLs are a keystone
of Internet illegitimate activities. The dangers of these sites
have created a mandates for defences that protect end-users
from visiting them. The proposed approach is that classifies
URLs automatically by using Machine-Learning algorithm
called logistic regression that is used to binary classification.
The classifiers achieves 97% accuracy by learning phishing
URLs
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...vivatechijri
In today's era where almost everything is digitized, even then at the end of the day we have to come across the paperwork when it comes to document submission and verification for any process. As a result, with increased advancement in the technology, easy availability and access of data and documents is the main concern. This project is intended to develop an application based system where student data and documents will be stored on a server and create a smart profile on the basis of student data. Student can also use that data and document anywhere anytime. The main aim is to provide a common application for all parts of education. Where each necessary details and document of a student will be available on one single portal also can be accessible by other higher authorities. Additionally, evaluating the profile and clustering of students can be done for better recommendation.
The Smart Portal system will be useful in document extraction during the admission process as well as it will be used for requirement of details and document of a candidate during interview. Students can upload their data and documents on the server after registration. Then their data will be analysed by the system by evaluating and clustering. This data is retrieved using QR code scanning system or Email verification/ OTP.
An assesment of Cybersecurity challenge in ArushaIsmail Settenda
This document is a research paper submitted for a Masters in Business Administration in Information Technology. It assesses the awareness of cyber security challenges among small and medium enterprises in Arusha, Tanzania. The study found that while most SMEs access the internet and rely on it, many lack formal cyber security policies, employee training, and technologies. Vulnerability scans found some protection, but intrusion attempts showed aggressive assaults on accessible systems, implying many may be compromised due to a lack of incident recording. The paper provides context on improved internet connectivity in Arusha and definitions of key terms.
A survey on security and privacy issues in IoV IJECEIAES
As an up-and-coming branch of the Internet of things, internet of vehicles (IoV) is imagined to fill in as a fundamental information detecting and processing platform for astute transportation frameworks. Today, vehicles are progressively being associated with the Internet of Things which empower them to give pervasive access to data to drivers and travelers while moving. Be that as it may, as the quantity of associated vehicles continues expanding, new prerequisites, (for example, consistent, secure, vigorous, versatile data trade among vehicles, people, and side of the road frameworks) of vehicular systems are developing. Right now, the unique idea of vehicular specially appointed systems is being changed into another idea called the internet of vehicles (IoV). We talk about the issues faced in implementing a secure IoV architecture. We examine the various challenges in implementing security and privacy in IoV by reviewing past papers along with pointing out research gaps and possible future work and putting forth our on inferences relating to each paper.
Women's Maltreatment Redressal System based on Machine Learning TechniquesIRJET Journal
This document discusses the development of a machine learning-based women's complaint registration system. The system aims to address issues like lack of connection between cases in different regions. It utilizes a deep feedforward neural network for accurate classification of complaints. The system portal allows victims to register complaints, access resources, and communicate in real-time with officials. It also allows officials to view case details and history. The system is intended to improve the efficiency of the complaint process through centralized information and ML-based case classification.
Similar to e-AGE 2014 Proceedings_1st article (20)
2. Program Committee
Ahmed Dabbagh, Emirates Identity Authority, UAE
Boubakar Barry, West and Central African Research and Education Network
(WACREN), Senegal
David West, Delivery of Advanced Network Technology to Europe (DANTE), UK
Federica Tanlongo, Consortium GARR, Italy
Federico Ruggieri, The Italian National Institute of Nuclear Physics (INFN), Italy
Habib Youssef, The Computing Center Al Khwarizmi (CCK), Tunisia
Helga Spitaler, Delivery of Advanced Network Technology to Europe (DANTE), UK
Johnathon Chapman, US Internet2 Special Interest Group Middle East (Internet2
SIG), Qatar
Mwaffaq Otoom, Yarmouk University (YU), Jordan
Ola Samara, Arab States Research and Education Network (ASREN), Jordan
Salem Al-Agtash, German Jordanian University (GJU), Jordan
Sara Al-Eisawi, Arab Organization for Quality Assurance in Education (AROQA),
Jordan
Yousef Torman, Arab States Research and Education Network (ASREN), Germany
Scientific Committee
Ahmed Dabbagh, Emirates Identity Authority, UAE
Federico Ruggieri, The Italian National Institute of Nuclear Physics (INFN), Italy
Roberto Barbera, University of Catania, Italy
Salem Al-Agtash, German Jordanian University (GJU), Jordan
The 4th
International Platform on Integrating Arab
e-Infrastructure in a Global Environment
e-AGE 2014
4. An efficient Approach of e-Iris Enrolling and Authentication for FS e-Apps……………………………………………1
Aromatic Hydrodecyclization of using Catalysts based on Molybdenum and Tungsten supported
on the Remblend of Kaolin………………………………………………………………………………………………………………....12
CHAIN-REDS Application Use Cases on Data Management………………………………………………………………….19
Comprehensive Distance-Flexible Learning through the Latest in Collaboration and Virtualization…….26
Lifelong Learning: A Roadmap for the Developing Countries……………………………………………………………….40
Shared Computing Infrastructures: a Regional Operational Approach…………………………………………………48
Surveying Clouds in the Global Environment……………………………………………………………………………………….55
The Pamphagidae (Orthoptera) from East Algeria and Description of a New Species………………………….63
Towards Libyan Research and Education Network (LibREN)………………………………………………………………..73
Contents