Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Qadri, Jameel A."'
Autor:
Qadri, Jameel A., Banday, M. Tariq
Publikováno v:
Qadri, J.A., Banday, M.T. (2009). "Web Accessibility - A timely recognized challenge," The Business Review, ISSN: 0972-8384, 14(1&2), pp. 99-102
Web Accessibility for disabled people has posed a challenge to the civilized societies that claim to uphold the principles of equal opportunity and nondiscrimination. Certain concrete measures have been taken to narrow down the digital divide between
Externí odkaz:
http://arxiv.org/abs/1112.5728
Autor:
Banday, M. Tariq, Qadri, Jameel A.
Publikováno v:
Banday, M.T., Qadri, J.A. (2007). "Phishing - A Growing Threat to E-Commerce," The Business Review, ISSN: 0972-8384, 12(2), pp. 76-83
In today's business environment, it is difficult to imagine a workplace without access to the web, yet a variety of email born viruses, spyware, adware, Trojan horses, phishing attacks, directory harvest attacks, DoS attacks, and other threats combin
Externí odkaz:
http://arxiv.org/abs/1112.5732
Publikováno v:
Banday, M.T., Qadri, J.A., Jan, T.R. and Shah, N.A. (2009). "Detecting Threat E-mails using Bayesian Approach," International Journal of Secure Digital Information Age, ISSN: 0975-1823, 1(2), pp. 103-113
Fraud and terrorism have a close connect in terms of the processes that enables and promote them. In the era of Internet, its various services that include Web, e-mail, social networks, blogs, instant messaging, chats, etc. are used in terrorism not
Externí odkaz:
http://arxiv.org/abs/1112.5608
Autor:
Banday, M. Tariq, Qadri, Jameel A.
Publikováno v:
Banday, M.T., Qadri, J.A. (2006). "SPAM - Technological and Legal Aspects," Kashmir University Law Review (KULR), ISSN: 0975-6639, XIII (XIII), pp. 231-264
In this paper an attempt is made to review technological, economical and legal aspects of the spam in detail. The technical details will include different techniques of spam control e.g., filtering techniques, Genetic Algorithm, Memory Based Classifi
Externí odkaz:
http://arxiv.org/abs/1112.5621
Publikováno v:
In Digital Investigation 2011 7(3):145-153