Sciweavers

24 search results - page 2 / 5
» issa 2004
Sort
View
ISSA
2004
13 years 6 months ago
South African Online Banking: Who Carries The Risk?
Today, Internet fraud occurs more and more frequently, and its devastating effects for organisations, such as banks, as well as their clients constitutes a continuous nightmare fo...
Anna Granova
ISSA
2004
13 years 6 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
ISSA
2004
13 years 6 months ago
An Investigation Into Access Control For Mobile Devices
Mobile devices, such as mobile phones, are becoming multi-purpose devices. These devices are capable of storing data as well as running custom applications. As more people adopt t...
Stephen Perelson
ISSA
2004
13 years 6 months ago
High Data Rate 8-Bit Crypto Processor
This paper describes a high data rate 8-bit Crypto Processor based on Advanced Encryption Standard (Rijndael algorithm). Though the algorithm requires 32-bit wide data path but ou...
Sheikh Muhammad Farhan
ISSA
2004
13 years 6 months ago
Categorizing Vulnerabilities Using Data Clustering Techniques
Vulnerability scanning is one of the proactive information security technologies in the Internet and network security domain. However, the current vulnerability scanner (VS) produ...
Yun (Lillian) Li