Zobrazeno 1 - 10
of 48
pro vyhledávání: '"Bhattacharya, Maumita"'
Data protection is the process of securing sensitive information from being corrupted, compromised, or lost. A hyperconnected network, on the other hand, is a computer networking trend in which communication occurs over a network. However, what about
Externí odkaz:
http://arxiv.org/abs/2307.13164
Publikováno v:
Informatics, MDPI, 2022, 9(1), 16
The prevalence and maturity of Bring Your Own Device (BYOD) security along with subsequent frameworks and security mechanisms in Australian organisations is a growing phenomenon somewhat similar to other developed nations. During the COVID 19 pandemi
Externí odkaz:
http://arxiv.org/abs/2202.11498
Autor:
Wilcox, Heidi, Bhattacharya, Maumita
Publikováno v:
2020 IOP Conf. Ser.: Mater. Sci. Eng. 790 012040
Social engineering through social media channels targeting organizational employees is emerging as one of the most challenging information security threats. Social engineering defies traditional security efforts due to the method of attack relying on
Externí odkaz:
http://arxiv.org/abs/2005.04049
Publikováno v:
2020 IOP Conf. Ser.: Mater. Sci. Eng. 790 012041
As many industries shift towards centralised controlled information systems for monitoring and control, more importance is being placed upon technologies such as Supervisory Control and Data Acquisitions industrial systems (SCADA). This focus on inte
Externí odkaz:
http://arxiv.org/abs/2005.04047
Autor:
Downer, K., Bhattacharya, Maumita
Bring Your Own Device (BYOD) is a rapidly growing trend in businesses concerned with information technology. BYOD presents a unique list of security concerns for businesses implementing BYOD policies. Recent publications indicate a definite awareness
Externí odkaz:
http://arxiv.org/abs/1601.01230
Autor:
West, J., Bhattacharya, Maumita
Financial fraud detection is an important problem with a number of design aspects to consider. Issues such as algorithm selection and performance analysis will affect the perceived ability of proposed solutions, so for auditors and re-searchers to be
Externí odkaz:
http://arxiv.org/abs/1601.01228
Autor:
Bose, Surajit, Shetty, Rakshith, Bhattacharya, Maumita, Sen, Subhalakshmi, Chattopadhyay, Jayanta, Saha, Gaurav
Publikováno v:
Journal of Advanced Zoology; 2024, Vol. 45 Issue 6, p201-208, 8p
Autor:
Wilcox, H., Bhattacharya, Maumita
The increasing threat of social engineers targeting social media channels to advance their attack effectiveness on company data has seen many organizations introducing initiatives to better understand these vulnerabilities. This paper examines concer
Externí odkaz:
http://arxiv.org/abs/1511.06915
Financial fraud is an issue with far reaching consequences in the finance industry, government, corporate sectors, and for ordinary consumers. Increasing dependence on new technologies such as cloud and mobile computing in recent years has compounded
Externí odkaz:
http://arxiv.org/abs/1510.07165
Autor:
Bhattacharya, Maumita
The search ability of an Evolutionary Algorithm (EA) depends on the variation among the individuals in the population [3, 4, 8]. Maintaining an optimal level of diversity in the EA population is imperative to ensure that progress of the EA search is
Externí odkaz:
http://arxiv.org/abs/1510.07163