Zobrazeno 1 - 10
of 50
pro vyhledávání: '"Gary Warner"'
Publikováno v:
Journal of Digital Forensics, Security and Law, Vol 5, Iss 1, Pp 21-48 (2010)
Spam related cyber crimes have become a serious threat to society. Current spam research mainly aims to detect spam more effectively. We believe the prosecution of spammers is a more effective way of stopping spam emails than filtering, therefore mor
Externí odkaz:
https://doaj.org/article/1975c907830347bfa71f6f903e5d27d7
Autor:
Bruce A. Griffin, Sara Faithfull, Gary Warner, Karen Poole, Ralph J. F. Manders, Lauren Turner, Kevin Noble, Agnieszka Lemanska, John M Saxton, Zachariah Nazar, John Marshall
Publikováno v:
Supportive Care in Cancer
Purpose To report patient activation, which is the knowledge, skills, and confidence in self-managing health conditions, and patient-reported outcomes of men after prostate cancer treatment from a community pharmacy lifestyle intervention. Methods Th
Autor:
Gary Warner, Jacob L. Warner
Publikováno v:
Bovine Reproduction
Publikováno v:
Journal of Internet Technology and Secured Transactions. 8:676-686
Nowadays, online banking is an attractive way of carrying out financial operations such as ecommerce, e-banking, and e-payments without much effort or the need of any physical presence. This increasing popularity in online banking services and paymen
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::176406e3ccf0ea98a50b4d62c027f992
https://avesis.kayseri.edu.tr/publication/details/b4ff5bb5-a379-4504-827f-3a424dbe26e5/oai
https://avesis.kayseri.edu.tr/publication/details/b4ff5bb5-a379-4504-827f-3a424dbe26e5/oai
Publikováno v:
eCrime
Phishing attacks are becoming increasingly prevalent: 2016 saw more phishing attacks than any previous year on record according to the Anti-Phishing Working Group. At the same time, the growing level of sophistication of cybercriminals must be unders
Publikováno v:
International Journal of Multimedia Data Engineering and Management. 6:32-50
Using object-of-interest matching to detect presence of e-Crime activities in low-duplicate social media images is an interesting yet challenging problem that involves many complications due to the dataset's inherent diversity. SURF-based (Speeded Up
Publikováno v:
CLOUD
Malicious software, universally known as malware, is typically used to cause disruption as it tries to steal sensitive information such as passwords, credit card numbers and other pertinent information. Malware infections have increased tremendously
Publikováno v:
Services Transactions on Cloud Computing. 2:1-14
Publikováno v:
ISM
Retrieval of images with object-of-interest from a vast pool of social media images has been a research interest in cyber crime research community for detecting criminal behaviors in social media. Due to inherent diversity and the low duplicate prope