Zobrazeno 1 - 10
of 45
pro vyhledávání: '"Maumita Bhattacharya"'
Autor:
Kathleen Downer, Maumita Bhattacharya
Publikováno v:
Informatics, Vol 9, Iss 1, p 16 (2022)
The prevalence and maturity of Bring Your Own Device (BYOD) security along with subsequent frameworks and security mechanisms in Australian organisations is a growing phenomenon somewhat similar to other developed nations. During the COVID-19 pandemi
Externí odkaz:
https://doaj.org/article/53a741ef6ebf447aaa50b77f0f37e282
Publikováno v:
International journal of health sciences. :7039-7048
Odontogenic tumors, derived from epithelial, ectomesenchymal, and/or mesenchymal elements of the tooth-forming apparatus, constitute a heterogeneous group of lesions, including hamartomas, benign and malignant neoplasms with metastatic capabilities.
Autor:
Rakhshith Shetty, Surajit Bose, Jayanta Chattopadhyay, Subhalakhmi Sen, Maumita Bhattacharya, Abhishek Banerjee
Publikováno v:
International journal of health sciences. :10283-10289
Background: Dental proof may provide significant assistance in identifying a victim’s body and determine specific facts thus influencing the investigative procedure. Ameloglyphics or tooth prints symbolizes exceptional differences enlightening dist
As many industries shift towards centralised controlled information systems for monitoring and control, more importance is being placed upon technologies such as Supervisory Control and Data Acquisitions industrial systems (SCADA). This focus on inte
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::63d3aec76fc244e74ca33e32e98c2b4c
http://arxiv.org/abs/2005.04047
http://arxiv.org/abs/2005.04047
Publikováno v:
International Journal of Medical Research and Review. 6:197-200
Nasopalatine duct cyst is a non-odontogenicdevelopmental cyst typically located in the maxillary midline between the tooth roots of central incisors, these cysts are infrequent and can often be misdiagnosed as periapical lesion or cyst. In this artic
Autor:
Maumita Bhattacharya, Jarrod West
Publikováno v:
Computers & Security. 57:47-66
Financial fraud is an issue with far reaching consequences in the finance industry, government, corporate sectors, and for ordinary consumers. Increasing dependence on new technologies such as cloud and mobile computing in recent years has compounded
Publikováno v:
Journal of Network and Computer Applications. 59:416-426
Stochastic search techniques such as evolutionary algorithms (EA) are known to be better explorer of search space as compared to conventional techniques including deterministic methods. However, in the era of big data like most other search methods a
Autor:
Maumita Bhattacharya, Jarrod West
Publikováno v:
ICCS
Financial fraud detection is an important problem with a number of design aspects to consider. Issues such as problem representation, choice of detection technique, feature selection, and performance analysis will all affect the perceived ability of
Autor:
Maumita Bhattacharya, Heidi Wilcox
Publikováno v:
IOP Conference Series: Materials Science and Engineering. 790:012040
Social engineering through social media channels targeting organizational employees is emerging as one of the most challenging information security threats. Social engineering defies traditional security efforts due to the method of attack relying on
Autor:
Jarrod West, Maumita Bhattacharya
Publikováno v:
2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA).
Financial fraud has shown itself to be a fundamental issue throughout history, and due to its substantial impact on society consideration into the best method of solving it is highly important. There are a several key experimental issues that are rel