Добірка наукової літератури з теми "Unauthorised banking"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Unauthorised banking".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Unauthorised banking":

1

Mohan Kumar, U., P. Siva SaiManikanta, and M. D. AntoPraveena. "Intelligent Security System for Banking Using Internet of Things." Journal of Computational and Theoretical Nanoscience 16, no. 8 (August 1, 2019): 3296–99. http://dx.doi.org/10.1166/jctn.2019.8180.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This project proposes a technique for planning a security system for banking with email alerts and sensors. In the presence scenario there are so many banking techniques arrived but none of those are secure the properties without vulnerability. So our project main motto is to protect and also provide security without vulnerability. We use IOT to provide high end security for banking system. Our aim is not only identify the authenticate user but also protecting the customers property from theft. We use tilt sensor, pressure sensor, smoke sensor and pir sensor, this sensors is used to identify the unauthorized person activity and prevent him steeling the property and capture the victim image by using web cam and transfer it to user. This technique remove all the vulnerabilities and make sure that the credentials are safe and it will capture the unauthorised person who tries to axis the security system.
2

Hanefah, Mustafa Mohd, Muhammad Iqmal Hisham Kamaruddin, Supiah Salleh, Zurina Shafii та Nurazalia Zakaria. "Internal control, risk and Sharīʿah non-compliant income in Islamic financial institutions". ISRA International Journal of Islamic Finance 12, № 3 (19 листопада 2020): 401–17. http://dx.doi.org/10.1108/ijif-02-2019-0025.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose The existence of internal control for Sharīʿah-compliance promotes reasonable assurance that the Islamic financial institution’s (IFI’s) objectives are achieved in the following categories, namely, the effectiveness and efficiency of operations, the reliability of financial reporting and the level of compliance with applicable laws and regulations, as well as accounting and auditing standards. Sharīʿah non-compliant income (SNCI) is an important issue in IFIs’ operations. Thus, the purpose of this paper is to identify issues related to governance and internal control of SNCI in selected IFIs in Malaysia. Design/methodology/approach This research uses a case study approach to gather data on the measures of governance and risk management in relation to the internal control for SNCI in IFIs. Interviews were conducted with officers of the Sharīʿah and internal audit departments on internal control practices regarding SNCI. Findings Regulator’s guidelines on SNCI are simple and brief, lacking rigour in terms of governance, risk management and audit procedures. The section on SNCI is only a brief statement within the Bank Negara Malaysia’s Guidelines on Financial Reporting for Islamic Banking Institutions and also in the Operational Risk Integrated Online Network system operated by IFIs. Most of the respondents in the interviews suggested that there should be a proper guideline in determining the classification of SNCI. Second, although IFIs have established the purification account to manage SNCI, the real practice varies from one IFI to another. Third, although there are supposedly documented procedures established in relation to management and administration of SNCI, the following events still occur in practice, namely, no authorisation from the Sharīʿah Committee (SC) on various types of income channelled to the SNCI account; unauthorised use of SNCI for other purposes; SNCI not being reported in the annual financial reports; and distribution of SNCI prior to obtaining the SC’s consent. Fourth, there is an absence of Sharīʿah risk assessment conducted on operational risk by IFIs to identify any potential Sharīʿah non-compliant event. Research limitations/implications This research contributes to the importance of Islamic corporate governance theory and Sharīʿah risk management, as well as strengthening the case for reporting SNCI to shareholders. It also contributes to the body of knowledge on the capability of the management in managing the internal control system of IFIs’ SNCI. Originality/value A new internal control assessment matrix is proposed for Sharīʿah-compliance in IFIs.
3

Mathur, Sonali, Shankar Lal Gupta, and Payal Pahwa. "Enhancing Security in Banking Environment Using Business Intelligence." International Journal of Information Retrieval Research 10, no. 4 (October 2020): 21–34. http://dx.doi.org/10.4018/ijirr.2020100102.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Data warehouses are the most valuable assets of an organization and are basically used for critical business and decision-making purposes. Data from different sources is integrated into the data warehouse. Thus, security issues arise as data is moved from one place to another. Data warehouse security addresses the methodologies that can be used to secure the data warehouse by protecting information from being accessed by unauthorized users for maintaining the reliability of the data warehouse. A data warehouse invariably contains information which needs to be considered extremely sensitive and confidential. Protecting this information is invariably very important as data in the data warehouse is accessed by users at various levels in the organization. The authors propose a method to protect information based on an encryption scheme which secures the data in the data warehouse. This article presents the most feasible security algorithm that can be used for securing the data stored in the operational database so as to prevent unauthorized access.
4

Jaya Sakti, Mochamad Aji, Noer Azham Achsani, and Ferry Syarifuddin. "Online Banking Implementation: Risk Mapping Using ERM Approach." Buletin Ekonomi Moneter dan Perbankan 20, no. 3 (January 31, 2018): 279–306. http://dx.doi.org/10.21098/bemp.v20i3.824.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The implementation of online banking in Indonesia is in line with the increasingof mobile device users who have become a part of people’s lifestyle, hence onlinebanking offers easiness to access on banking services. This study is to examine riskmapping on the implementation online banking using ERM approach, including riskmitigation strategies for identified risks. This research was conducted at XYZ Bankwho has implemented online banking. The results of this study find 55 potentialrisks. Some of it identified risks related to bank system security such as vulnerabilityto viruses, malware, hacking, also access information by an unauthorized person.Risk mitigation strategies applied by XYZ Bank is mostly done by managing the riskbecause the implementation online banking is still on the development process, andthe Bank remains optimistic with the future prospect of online banking by staying withgovernment regulations.
5

Смирнов, Е., and E. Smirnov. "In the Interests of Combating Financial Fraud." Auditor 4, no. 9 (October 10, 2018): 3–10. http://dx.doi.org/10.12737/article_5b616224585aa3.74179318.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Th e Federal Law of June 27, 2018, No. 167-FZ, aimed at countering the theft of funds from bank accounts, seems to allow credit institutions to signifi cantly reduce losses from unauthorized operations of fi nancial frauds committed using remote banking systems.
6

Li, Siqi. "On interpretation of loss from unauthorized transactions in China’s e-banking business." Frontiers of Law in China 4, no. 1 (January 22, 2009): 114–26. http://dx.doi.org/10.1007/s11463-009-0007-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Shamanina, E. I., and Yu S. Zakharenko. "BIOMETRIC TECHNOLOGIES AS A PERSPECTIVE DIRECTION OF IMPROVING REMOTE BANK SERVICE." Vestnik Universiteta, no. 5 (July 16, 2020): 193–99. http://dx.doi.org/10.26425/1816-4277-2020-5-193-199.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The issues related to the developing and improving remote identification mechanism in the Russian banking sector have been considered. The main aspects of the process of collecting, processing, checking and storing biometric data, the functioning status of Single Biometric System (SBS) have been highlighted. The vulnerability and risks of using biometric technologies by banks have been noted. The key trends in the development of the international market of biometric technologies and their application in the banking sector have been presented, as well as current events on the implementation of biometric technologies in Russia. The prospects for the use of biometric technologies in the banking sector and directions for improving the technological infrastructure in order to protect data from unauthorized access have been outlined.
8

Frolova, Evgenia E. "LEGAL REGULATION OF INTERNET BANKING IN INDIA." RUDN Journal of Law 23, no. 3 (December 15, 2019): 351–74. http://dx.doi.org/10.22363/2313-2337-2019-23-3-351-374.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The features of the legal regulation of Internet banking in India are investigated. Internet banking is gradually replacing the use of cash, checks, and, most importantly, customers who personally come to bank offices: according to statistics, the total amount of transactions in the digital payments segment of India in 2019 will be $ 64.775 billion. USA. Electronic banking is a generic term for the provision of banking services and products via electronic channels, such as telephone, Internet, mobile phone, etc. The main regulatory act regulating Internet banking in India is the Information Technologies Act 2000, which provides for legal recognition of electronic transactions and other means of electronic commerce. In addition to the new law, the norms of traditional banking legislation also apply to Internet banking. The main financial regulator of India the Reserve Bank - also provides direct management of Internet banking: it developed guidelines for Internet banking in India in 2001; as well as the Mobile Banking Guide, which was transformed into the Mobile Banking Master Circular51 in 2016. The rights of consumers of Internet banking services are protected on the basis of the Consumer Protection Act 198652, which defines the rights of consumers in India and also applies to banking services. India’s law is based on case law, and in this regard, a number of new case law on disputes between banks and their customers in the field of Internet banking has been studied. However, in the legislation, the article notes, there are a number of gaps related primarily to ensuring the safety of online banking. Information security in electronic banking represents two main areas of risk: preventing unauthorized transactions and maintaining the integrity of customer transactions. When writing the article, general scientific methods of cognition were used: dialectical, hypothetical-deductive method, generalization, induction and deduction, analysis and synthesis, empirical description; private scientific methods were also used: legal, dogmatic, statistical, comparative legal analysis, and others.
9

Legeais, Dominique. "Integrated purchasing and banking data protection in the context of Directive (EU) 2015/2366: new payment service providers." Law, State and Telecommunications Review 11, no. 1 (May 20, 2019): 173–98. http://dx.doi.org/10.26512/lstr.v11i1.24856.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose – The article analyses the limits of protection of bank users´ data in France, framing them as personal data. Its legal analysis is made amidst a context of radical changes in the European and French personal data protection law as well in the banking regulation, which is being transformed by the new payment services regulation. Methodology/approach/design – The article brings an interlacement of some new legal sources from the European and French law to appraise the limits of banking data protection. It tests the application of some legal norms in order to evaluate the potential protection in two areas: the security of the banking data on a new environment of payment services (fintechs and other new firms); the possibility of protection against the unauthorized data commercial usage. Findings – The article concludes that the European and French banking and payment services law have not the desired level of protection against bad commercial practices in a context, which is marked by both the retailers and payment services integration as well the presence of the big techs. The data protection law must complement the banking and payment services regulation in order to provide the desired level of protection. Practical implications – The article demonstrates the possibility of testing new kinds of legal regulation – data protection – to archive social and economic security in a different sector, like baking and commerce. Originality/value – The article departs from a new concept of banking data, built from the meshing of the concepts of banking information and sensible personal data. From this conceptual frame, it can evaluate the level of protection granted by the European and French law in order to sketch a possible protective regime.
10

Ryzhkova, Marina, Ekaterina Soboleva, Anastasia Sazonova, and Mikhail Chikov. "Consumers’ Perception of Artificial Intelligence in Banking Sector." SHS Web of Conferences 80 (2020): 01019. http://dx.doi.org/10.1051/shsconf/20208001019.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In the article, we analyze the impact of artificial intelligence (AI) on banking development. Banks implement AI to provide digital assistance and financial advice to clients, measure their financial standing etc. The paper also includes cases of the AI solutions marketing and some ideas of brand-new banking AI-based services. Despite the rapid spreading of AI across the different spheres, its efficiency is based, primarily, on consumers` attitude and loyalty to this technology. Our research shows that Russian business and consumers perceive AI in a positive light. Sberbank specialists have a positive attitude to the AI implementation in their work, consider these solutions as assistance in performing routine operations and are not afraid of dismissals. They use AI solutions both at work and in everyday life. The emerging fears are associated with possible technical failure, unauthorized transmission of personal data, lack of privacy, and unexpected consequences of AI implementation. However, in general, experts understand that the future of the financial sector is connected with this technology. According to Sberbank employees, consumers tend to demonstrate a certain level of mistrust to AI, which could result from misunderstanding of how this technology works, and what impact it has on their ways of life. Meanwhile, the level of AI resistance from both sides decreases with time. Therefore, state and financial mediators could create necessary conditions for banking development based on modern technologies.

Дисертації з теми "Unauthorised banking":

1

Ndlovu, Witness Nomfundo. "The regulation of electronic funds transfers : problematic aspects relating to banks liability." Diss., University of Pretoria, 2020. http://hdl.handle.net/2263/77358.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The evolution of various payment instruments shows a marked inclination away from the reliance on physical currency. This has, in turn, led to the construction of new manifestations of wealth. Due to revolution and developments of technology, payment can be made by various means such as physical delivery of conventional money (coins and bank notes) from the payer to the payee, but may also be made through tangible paying methods other than negotiable instruments such as debit or credit card or by way of electronic funds transfer. The development of payment systems makes it a reality for consumers to choose their preferred method of payment suitable for their banking needs and circumstances. Electronic funds transfer is a generic term that embraces any transfer of funds in which electronic techniques replace one or more of the steps in the process that were previously done by paper-based techniques. This includes automated teller machines, the transfer of funds at the point of sale, direct deposit or withdrawal of funds and funds initiated by telephone. The use of electronic funds transfer systems is described as the ultimate act of payment for not only is the value which is transferred reduced to a symbolic form, but the symbolic form itself is removed from the immediate possession of the parties to the transfer, payment also essentially becomes the transfer of information. Electronic funds transfer are easy and convenient to use. However, new technology has not only provided an ever-increasing range of electronic payment products, it has also had far-reaching effects on the way in which banks operate. Owing to the lack of legislation in South Africa to regulate the use of electronic funds transfer, banks rely on the law of contract and mandate to exempt themselves from liability. Therefore, the research problem that this dissertation aims to address revolves around the legal implications of electronic funds transfer, This includes the questions surrounding reversal and recovery of electronic funds transfer when payment is considered to be final and complete. Ultimately, I will attempt to address apportionment of liability between banks and consumers.
Mini Dissertation (LLM (Banking Law))--University of Pretoria 2020.
GCRA Bursary
Mercantile Law
LLM (Banking Law)
Unrestricted
2

Kleynhans, Stefan Anton. "The role of trade usage and the allocation of risk for unauthorized transactions in internet banking : a re-evaluation of the traditional bank-customer relationship." 2000. http://hdl.handle.net/10500/17100.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Internet has had and will continue to have a major impact in the way in which banking business is conducted. This dissertation primarily considers the allocation of risks associated with Internet banking and in doing so considers the role of trade usage in Internet banking. The question of what the Internet is and more specifically what constitutes Internet banking is addressed. In order to have an understanding of the allocation of risks in Internet banking a good understanding of the traditional bank-customer relationship is necessary. The contractual basis for this relationship is discussed. The duties of the bank and the customer are discussed. In this regard the duty of a bank to act in terms of its customers mandate, the banks duty of confidentiality and the customers duty to exercise reasonable care are considered. The concept of a customer is briefly discussed. As trade usage plays a significant role in the contract between the bank and its customer, attention is given to the requirement for the recognition of a trade usage generally and more particularly in South Africa. The effect of Internet banking on the traditional bank-customer relationship is considered. The fact that a bank is still required to act in terms of its customer's mandate but is unable to identify is examined. As most Internet banking contracts impose an obligation on the customer to take security precautions and also limit the liability of banks, consideration is finally given to the possibility that the practices of banks in regard to Internet banking may have acquired the status of trade usage in this particular sphere of banking.
LL.M. (Banking Law)

Книги з теми "Unauthorised banking":

1

The Great American Bank Robbery The Unauthorized Report On What Really Caused The Great Recession. Thomas Nelson Publishers, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Unauthorised banking":

1

Corzo, C., F. Corzo S., N. Zhang, and A. Carpenter. "Using Automated Banking Certificates to Detect Unauthorised Financial Transactions." In Financial Cryptography and Data Security, 36–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11889663_3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

van Zyl, DH. "Unauthorised Payment and Unjust Enrichment in Banking Law." In Restitution and Banking Law, 1–26. Informa Law from Routledge, 2020. http://dx.doi.org/10.4324/9781003122609-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

DeFilippi, Dan, and Katina Michael. "Credit Card Fraud." In Online Banking Security Measures and Data Protection, 263–82. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0864-9.ch015.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This chapter provides a single person case study of Mr. Dan DeFilippi who was arrested for credit card fraud by the US Secret Service in December 2004. The chapter delves into the psychology of a cybercriminal and the inner workings of credit card fraud. A background context of credit card fraud is presented to frame the primary interview. A section on the identification of issues and controversies with respect to carding is then given. Finally, recommendations are made by the convicted cybercriminal turned key informant on how to decrease the rising incidence of cybercrime. A major finding is that credit card fraud is all too easy to enact and merchants need to conduct better staff training to catch fraudsters early. With increases in global online purchasing, international carding networks are proliferating, making it difficult for law enforcement agencies to be “policing” unauthorized transactions. Big data may well have a role to play in analyzing behaviors that expose cybercrime.
4

Sharma, Kunal, and A. J. Singh. "Biometric Security in the E-World." In Applied Cryptography for Cyber Security and Defense, 289–337. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-783-1.ch013.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The rising number of networked computers and the evolution of the WWW have witnessed the emergence of an E-World where the users are often referred to as e-people. In the new e-world, the evolution of WWW and Internet applications has become a focal point to the question of sustainable competitive advantage (Brennan & Johnson,2001).The increase in information access terminals along with the growing use of information sensitive applications such as e-commerce, e-learning, e-banking and e-healthcare have generated a real requirement of reliable, easy to use, and generally acceptable control methods for confidential and vital information. On the other hand, the necessity for privacy must be balanced with security requirements for the advantage of the general public. Current global events have shown the significance to provide the police, airport area, and other exposed area, new reliable component security tools such as biometrics. Access to systems that need security from unauthorized access is generally restricted by requesting the user to confirm her identity and to authenticate. Payment systems are undergoing radical changes stirred largely by technical advancement such as distributed network technology, real-time processing and online consumers’ inclination to use e-banking interfaces making the study of biometrics even more important in this new E-World.
5

Pejic Bach, Mirjana, and Martina Draganic. "Some Aspects of Implementing Always-On IT-Solutions and Standards in Banking Sector." In Always-On Enterprise Information Systems for Business Continuance, 149–74. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-723-2.ch009.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The growing competition in the banking sector, resulting in growing demands of the customers, requires from the banks a 24 hour availability of services. The technological development is accompanied by the increase in technologically sophisticated forms of fraud. The answer to these challenges is a more efficient use of information technology. The use of new technologies, besides the defense from unauthorized access into the bank’s information system, abuse of information technology, and damage that can be caused, represents the basis for the new service offer which has an important role in market positioning of the banks. An empirical research was conducted in order to determine the level of influence of the information technology to the payment transactions. The results suggest that the level of influence is important due to the enlargement of product range and communication channels with clients, expense reduction for the costumers and the bank, as well as the increase of the business security.
6

Shanmugapriya D. and Padmavathi Ganapathi. "A Framework for Improving the Accuracy of Keystroke Dynamics-Based Biometric Authentication Using Soft Computing Techniques." In Biometric Authentication in Online Learning Environments, 208–35. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7724-9.ch009.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The global access of information and resources from anywhere has increased the chance of intrusion and hacking of confidential data. Username with password is the commonly used authentication mechanism which is used for almost all online applications from net banking to online examinations. However, advanced safeguard mechanisms are sought against unauthorized access as the passwords can be hacked easily. To strengthen the password, it can be combined with biometric technology. Keystroke biometrics, a strong behavioral biometric, can be considered as a secure method compared to other methods even if the imposter knows the username and password as it is based on user habitual typing rhythm patterns. For any online application the accuracy level plays a vital role. But the accuracy of keystroke authentication when compared with other biometric authentication mechanisms is low. To improve the accuracy and minimize the training and testing time, this chapter proposes a wrapper-based classification using PSO-ELM-ANP algorithm which gives 99.92% accuracy.
7

Tong, Carrison K. S., and Eric T. T. Wong. "Information Security Management in Picture Archiving and Communication Systems for the Healthcare Industry." In Encyclopedia of Multimedia Technology and Networking, Second Edition, 682–90. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch092.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Like other information systems in banking and commercial companies, information security is also an important issue in the health care industry. It is a common problem to have security incidences in an information system. Such security incidences include physical attacks, viruses, intrusions, and hacking. For instance, in the USA, more than 10 million security incidences occurred in the year 2003. The total loss was over $2 billion. In the health care industry, damages caused by security incidences could not be measured only by monetary cost. The trouble with inaccurate information in health care systems is that it is possible that someone might believe it and do something that might damage the patient. In a security event in which an unauthorized modification to the drug regime system at Arrowe Park Hospital proved to be a deliberate modification, the perpetrator received a jail sentence under the Computer Misuse Act of 1990. In another security event (The Institute of Physics and Engineering in Medicine, 2003), six patients received severe overdoses of radiation while being treated for cancer on a computerized medical linear accelerator between June 1985 and January 1987. Owing to the misuse of untested software in the control, the patients received radiation doses of about 25,000 rads while the normal therapeutic dose is 200 rads. Some of the patients reported immediate symptoms of burning and electric shock. Two died shortly afterward and others suffered scarring and permanent disability. BS7799 is an information security management standard developed by the British Standards Institution (BSI) for an information security management system (ISMS). The first part of BS7799, which is the code of practice for information security, was later adopted by the International Organization for Standardization (ISO) as ISO17799. The ISO 27002 standard is the rename of the existing ISO 17799 standard. It basically outlines hundreds of potential controls and control mechanisms, which may be implemented. The second part of BS7799 states the specification for ISMS which was replaced by The ISO 27001 standard published in October 2005. The Picture Archiving and Communication System (PACS; Huang, 2004) is a clinical information system tailored for the management of radiological and other medical images for patient care in hospitals and clinics. It was the first time in the world to implement both standards to a clinical information system for the improvement of data security.

Тези доповідей конференцій з теми "Unauthorised banking":

1

Wang, Junqi, and Duwei Deng. "Unauthorized Transactions and Unintended Transactions in Open Banking:." In 6th Annual International Conference on Social Science and Contemporary Humanity Development (SSCHD 2020). Paris, France: Atlantis Press, 2021. http://dx.doi.org/10.2991/assehr.k.210121.072.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Hewamadduma, Shammi Ishara. "Detection and prevention of possible unauthorized login attempts through stolen credentials from a phishing attack in an online banking system." In 2017 5th International Conference on Research and Innovation in Information Systems (ICRIIS). IEEE, 2017. http://dx.doi.org/10.1109/icriis.2017.8002440.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

До бібліографії