Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
This paper suggests cultural models for virtual banking based on ethnographic research. The spatial and temporal features of cybersp ace change the traditional banking service and...
In the paper we present a new approach based on application of neural networks to detect SQL attacks. SQL attacks are those attacks that take advantage of using SQL statements to ...
This paper describes and analyses the early developmental stages of a community learning network based in an urban community and social service agency. With government funding, th...
Robert Luke, Andrew Clement, Randall Terada, Domin...
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...