-
The Rise of #Cartels: Exploring the Organizational Operations and Messaging of Public Perception on Twitter Journal of Applied Security Research Pub Date : 2024-04-15 Ghady X. Hbeilini, Jared R. Dmello
Mexican cartel activity has become increasingly violent, causing civilians to question the government’s ability to defend against this social and political threat. Within this context, the current ...
-
Role of Artificial Intelligence in the Prevention of Online Child Sexual Abuse: A Systematic Review of Literature Journal of Applied Security Research Pub Date : 2024-04-01 Suyesha Singh, Vaishnavi Nambiar
Online Child sexual abuse (OCSA) is a major menace in the digitalized world. Every year, more than a billion children between the ages of 2–17 years are sexually abused. Despite the harsh reality o...
-
Monsoon Marauders and Summer Violence: Exploring the Spatial Relationship between Climate Change and Terrorist Activity in India Journal of Applied Security Research Pub Date : 2024-02-26 Jared R. Dmello, Christine H. Neudecker
Climate change is a global phenomenon that has been associated with a growing list of concerns in society today, often leaving more questions than answers. Thus, it is no surprise that questions ar...
-
Analysis of Criminal Landscape by Utilizing Statistical Analysis and Deep Learning Techniques Journal of Applied Security Research Pub Date : 2024-02-19 Ram Krishn Mishra, Abdul Rahmaan Ansari, J. Angel Arul Jothi, Vinaytosh Mishra
This research intends to provide law enforcement organizations with a deep learning model that uses trends in past crimes to forecast future crimes. The study will enable them to dispatch security ...
-
Correlates of Severity of Mass Public Shootings in the United States, 1966–2022 Journal of Applied Security Research Pub Date : 2024-02-12 Liqun Cao, Xiaohan Mei, Jiayu Li
This paper explores the correlates of mass shooting severity in the United States. Relying on the stacked data from 1966 to 2022 in the Violence Project (version 5), we developed a model of mass sh...
-
An Investigation of Crime Detection Using Artificial Intelligence and Face Sketch Synthesis Journal of Applied Security Research Pub Date : 2024-01-24 Rajesh Natarajan, Natesh Mahadev, Shashi Kant Gupta, Badria Sulaiman Alfurhood
Crime scene suspect prediction involves classifying potential perpetrators based on location, time, and crime type. Electronic forensics in large data scenarios poses challenges for investigators. ...
-
Young Adults’ Perceptions of Store Environment: Evaluation of the Perceived Effectiveness of CPTED-Based Techniques in Preventing Shoplifting Journal of Applied Security Research Pub Date : 2024-01-18 Mine Özaşçılar
Recognizing that it is a widespread crime, retailers in Turkey have adopted Crime Prevention through Environmental Design (CPTED) techniques to prevent shoplifting. Using data from 1,150 young adul...
-
QoS-Based Secure Data Communication for Software-Defined Autonomous Vehicles Using Blockchain Journal of Applied Security Research Pub Date : 2024-01-23 Deepanshu Garg, Rasmeet Singh Bali
Data security in autonomous vehicles is of primary importance due to the possibility of cyberattacks on these interconnected and complex systems. As these vehicles are equipped with a number of sen...
-
Intelligence Collection Disciplines—A Systematic Review Journal of Applied Security Research Pub Date : 2024-01-08 Susan Henrico, Dries Putter
Intelligence collection is an integral part of the intelligence cycle. In fact, some authors declare that it is at the heart of the intelligence discipline. Intelligence collection is typically don...
-
Intelligent Chain: A Safer Decision-Making Framework with Blockchain-Based Incentives Journal of Applied Security Research Pub Date : 2023-11-30 Walid Dhifallah, Tarek Moulahi, Mounira Tarhouni, Salah Zidi
Many strategies use ML algorithms for intelligent IDS as part of the development of IoT security. These algorithms are quite susceptible to being manipulated to provide biased results. A variety of...
-
A Digital Forensics Model for the Examination of QR Code and Android App to Investigate Aadhaar Card Identity Fraud Journal of Applied Security Research Pub Date : 2023-11-22 Bapi Saha, Ajoy Kumar Khan, Vuyyuru Lakshmi Lalitha, L. V. Narasimha Prasad
There are various new-age crime rackets reported with the help of digital technology and such cases are routinely investigated by the police and digital forensics analysts. In the course of investi...
-
Cybersecurity Students’ Interest in Government Careers: Impact of Demographic Characteristics and Job Dynamics Journal of Applied Security Research Pub Date : 2023-11-20 Brian K. Payne, Ida Oesteraas, David C. May
A critical shortage of cybersecurity talent exists in the United States. The lack of personnel has resulted in increased competition for the cybersecurity professionals. As the field of cybersecuri...
-
Attack Model for Generic Intelligent Systems Journal of Applied Security Research Pub Date : 2023-11-20 Sirapat Boonkrong
Intelligent systems, machine learning models, and artificial intelligence methods are increasing in complexity, and the integration of such technologies has also increased. However, the rise in the...
-
CSIMH: Design of an Efficient Security-Aware Customized Sidechaining Model via Iterative Meta-Heuristics Journal of Applied Security Research Pub Date : 2023-10-10 Nisha Balani, Pallavi Chavan
Blockchains are a secure alternative for long-length data storage & security deployments. Though blockchains are unbounded, their quality of service (QoS) performance reduces after adding a certain...
-
The Analysis of the Relationship between residents’ Perceived Probability of Property Victimization in Dwellings and the Level of Home Security Systems Journal of Applied Security Research Pub Date : 2023-08-24 Ingilab Shahbazov, Zaur Afandiyev, Ayshem Balayeva
Using the dataset of the first nationwide victimization survey in Azerbaijan, the current paper analyzed whether home security systems have a relationship with the perceived probability of property...
-
Politics of “Localised Legitimacy”, Vigilantism, Non-State Policing and Counter-Banditry in Northwest Nigeria: Evidence from the Epicenter Journal of Applied Security Research Pub Date : 2023-07-30 Folahanmi Aina
Northwest Nigeria has been devastated by armed banditry, with Zamfara state being the epicenter of the crisis. The use of vigilantes in non-state policing against armed banditry has accorded legiti...
-
Machine Learning Enabled Dynamic Spectrum Access for 6G Wireless Networks Journal of Applied Security Research Pub Date : 2023-06-21 Sridhar Iyer
In this article, a 6G scenario is considered which allows sharing of spectrum between links which have spectrum license (6G license access), and which are unlicensed (Wi-Fi). A machine learning alg...
-
Publisher’s Note Journal of Applied Security Research Pub Date : 2023-06-08
Published in Journal of Applied Security Research (Vol. 18, No. 3, 2023)
-
Transforming Pacifists into Warmongers? Separatist Movement, State Repression, and the Politics of Framing Terrorism in Nigeria: Evidence from IPOB and Yoruba Nation’s Freedom Frontiers Journal of Applied Security Research Pub Date : 2023-03-16 John Sunday Ojo
Abstract While the post-9/11 event has animated how state actors frame terrorism, contemporary studies have failed to address the politics inherent in proscribing, repressing, and labeling separatist movements as terrorists. This paper explores the politics of framing terrorism using the contemporary self-determination struggles advanced by the Indigenous People of Biafra (IPOB) and the Yoruba Nation’s
-
A Natural Experiment of the Prince Hypothesis on Classroom Vandalism Journal of Applied Security Research Pub Date : 2023-01-25 William A. Chernoff
The Prince Hypothesis, popularized in the television show The Simpsons, claims that greater visibility reduces vandalism. While environmental criminology makes similar predictions, to date it is un...
-
SAM: A Mechanism to Facilitate Smear-Aware Forensic Analysis of Volatile System Memory Journal of Applied Security Research Pub Date : 2022-12-30 Trushna Parida, Kanika Nath, Suvrojit Das
Page smear is a phenomenon that occurs when a system’s volatile memory dump is obtained in a non-atomic manner; it’s more common in systems with a lot of RAM and different workloads. It has a consi...
-
Preventing Revictimization in Sexual Assault Investigations: Personal Security and Trauma-Informed Case Management* Journal of Applied Security Research Pub Date : 2022-12-30 Katalin Parti
How we treat victims determines the amount of information we gain from a victim interview. It is also crucial for the security of victims, and for preventing revictimization in a criminal procedure...
-
Enhancing Multimedia Security Using Shortest Weight First Algorithm and Symmetric Cryptography Journal of Applied Security Research Pub Date : 2022-12-19 Karishni Mehta, Glen Dhingra, Ramchandra Mangrulkar
A critical component of information security is data encryption, and numerous researchers have invented various approaches to encrypt data. This paper presents a novel image encryption approach usi...
-
Ontology-Based Metrics Computation for System Security Assurance Evaluation Journal of Applied Security Research Pub Date : 2022-12-19 Shao-Fang Wen, Basel Katt
Security assurance evaluation (SAE) is a technique that helps organizations to appraise the trust and confidence that a system can be operated correctly and securely. This paper contributes to the ...
-
Modified Symmetric Image Encryption Approach Based on Mixed Column and Substitution Box Journal of Applied Security Research Pub Date : 2022-11-30 Vaishnavi Sawant, Ahmed Solkar, Ramchandra Mangrulkar
Internet a network of interconnected systems which is used to transmit different kinds of sensitive data is made secure by encrypting this data during transmission and protecting it against any kin...
-
DieRoll: A Unique Key Generation and Encryption Technique Journal of Applied Security Research Pub Date : 2022-10-13 Dhruv Mehta, Manish Jha, Hartik Suhagiya, Ramchandra Mangrulkar
Advanced Encryption Standard (AES) or Data Encryption Standard (DES) are standard block cipher techniques mostly used for text or numbers but not preferred for multimedia data. Many researchers pre...
-
Communication in Global Jihad Journal of Applied Security Research Pub Date : 2022-09-28 Dr. Frank Musmar
Published in Journal of Applied Security Research (Vol. 19, No. 1, 2024)
-
Fraud in Online Classified Ads: Strategies, Risks, and Detection Methods: A Survey Journal of Applied Security Research Pub Date : 2022-09-22 Jamil R. Alzghoul, Emad E. Abdallah, Abdel-hafiz S. Al-khawaldeh
Because of today’s tremendous economic growth, social, and technological advances, the world has seen the formation of economic blocs. The intensity of the rivalry between domestic and foreign prod...
-
QR Codes to Prevent Copyright Infringement: Case Study of Trusmi Batik in Cirebon, Indonesia Journal of Applied Security Research Pub Date : 2022-09-12 Enni Soerjati Priowirjanto, Eman Suparman, Muhamad Amirulloh, Ema Rahmawati
A QR code is a form of visualization that is encrypted by user data. Observations were made to examine the QR code added to Trusmi batik motifs, which are traded online through electronic transacti...
-
IoT Security in Industry: A Threat Model of Existing and Future Network Infrastructure Journal of Applied Security Research Pub Date : 2022-09-01 Jackie McNett, Josh McNett, Xiaoli Su
While recent developments in The Internet of Things (IoT) present an infinite number of new possibilities for smart factories, the rapid expansion of this technology in industry presents an unprece...
-
Privacy Enhanced Healthcare Data Management Using Associative Data Mining Approaches Journal of Applied Security Research Pub Date : 2022-08-29 N. Duraimutharasan
Abstract Hospital medical records with health examination findings can be integrated to assist in uncovering the link between aberrant test results and illness. It is possible to establish a disease-preventive knowledge center using these integrated data by performing associated rule mining on the results. In order to integrate data, sensitive patient information must be shared. Patients’ privacy may
-
Predicting Money Laundering Using Machine Learning and Artificial Neural Networks Algorithms in Banks Journal of Applied Security Research Pub Date : 2022-08-26 Mark E. Lokanan
This paper aims to build a machine learning and a neural network model to detect the probability of money laundering in banks. The paper's data came from a simulation of actual transactions flagged...
-
Stego Detection: Image Steganalysis Using a Novel Hidden Stego Visual Geometry Group–Based CNN Classification Journal of Applied Security Research Pub Date : 2022-08-24 Hemalatha Jeyaprakash, Bala Subramanian Chokkalingam, Vivek V, Sekar Mohan
Abstract Steganography is the concept of embedding or hiding secret information into a cover image by maintaining the visual quality. Various algorithms are designed to classify stego images but the race still continues between Steganographer and Steganalyser. Advances in deep learning provided a solution to detect stego images. In this article, we coin a new paradigm to detect stego image as a three-step
-
Adversarial Propaganda: How Enemies Target the U.S. to Fuel Division Journal of Applied Security Research Pub Date : 2022-08-22 Molly M. Dundon, Shannon C. Houck
Abstract This article explores how foreign enemies of the United States target American citizens with propaganda intended to fuel societal division. It reviews propaganda conceptually, discusses individual, group, and cultural factors that make the United States is uniquely vulnerable to false propaganda, and details the processes and mechanisms by which adversarial propaganda attempts to create false
-
Geospatial Intelligence and Artificial Intelligence for Detecting Potential Coca Paste Production Infrastructure in the Border Region of Venezuela and Colombia Journal of Applied Security Research Pub Date : 2022-08-18 Jairo Jesús Pinto Hidalgo, Jorge Antonio Silva Centeno
Abstract Cocaine production has reached record levels in recent years. Latin America and the Caribbean are the primary sources of all cocaine consumed globally, thus there are indications that cocaine production processes could spread to countries of transit and consumption, becoming a threat to the security of states. In this article, we address the challenge of detecting potential primary infrastructures
-
Dimensional Reduction With Fast ICA for IoT Botnet Detection Journal of Applied Security Research Pub Date : 2022-08-12 Susanto, Deris Stiawan, Dian Palupi Rini, M. Agus Syamsul Arifin, Mohd Yazid Idris, Nizar Alsharif, Rahmat Budiarto
Abstract The Internet of Things (IoT) has unique characteristics with a minimalist design and has network access with great scalability, which makes it difficult to control access. Setting up an intrusion detection system (IDS) on an IoT system while taking into account its unique characteristics is a big challenge. In this paper, we propose a dimensional reduction approach utilizing the fast independent
-
Searchable Encryption Taxonomy: Survey Journal of Applied Security Research Pub Date : 2022-08-11 M. H. Noorallahzadeh, R. Alimoradi, A. Gholami
Abstract Cloud service providers allow businesses to drastically reduce their costs. However, it is good to know that most outsourced data is sensitive data. Therefore, to protect this data set from potential attacks on cloud servers, it is strongly recommended that you encrypt it before outsourcing. But cloud servers cannot search encrypted data by default. Many researchers have published work proposing
-
Brazil Method of Anti-Malware Evaluation and Cyber Defense Impacts Journal of Applied Security Research Pub Date : 2022-08-02 Rodrigo Ruiz, Rogério Winter, Ferrucio de Franco Rosa, Pancham Shukla, Hassan Kazemian
Abstract Cyber risk profoundly affects all. In the context of cyber threats, malware is trending in various productive sectors. Nowadays, anti-malware is essential to combat cyber threats; however, their efficiency is often questioned, because malware is different for different regions in the world. Choosing an efficient anti-malware software solution is crucial to protect information from different
-
In Search for the Best Police Oversight Mechanism for Zimbabwe: The Imperative for an Independent Police Complaints Board Journal of Applied Security Research Pub Date : 2022-08-01 Ishmael Mugari, Adewale A. Olutola
Abstract On numerous occasions, the Zimbabwean police have had to contend with allegations of police abuse of power, with various sectors of the society calling for sound mechanisms for holding the police to account. This study gathered data from purposefully sampled representatives of police oversight institutions to find out their perspectives on the best police oversight mechanism for Zimbabwe.
-
A Real-Time Hardware Intrusion Detection System and a Classifying Features Algorithm Journal of Applied Security Research Pub Date : 2022-07-28 Tarek Salah Sobh
Abstract Nowadays, everybody needs to secure his/her activities. Existing levels of cyber-criminals need technology for detecting malicious activity. This work proposes a real-time Hardware IDS implemented on FPGA and an algorithm for classifying features from network traffic through the network interface card (NIC). It minimizes search time for extracting statistical features from connection records
-
An Improved KNN Classifier for 3D Face Recognition Based on SURF Descriptors Journal of Applied Security Research Pub Date : 2022-07-27 Ahmed Yassine Boumedine, Samia Bentaieb, Abdelaziz Ouamri
Abstract In this article, we propose a three-dimensional (3D) face recognition approach for depth data captured by Kinect based on a combination of speeded up robust features (SURF) and k-nearest neighbor (KNN) algorithms. First, the shape index maps of the preprocessed 3D faces of the training gallery are computed, then the SURF feature vectors are extracted and used to form the dictionary. In the
-
Criminological and Victimological Support of World and National Security during Quarantine Measures Related to the Spread of Acute Respiratory Disease COVID-19 Caused by Coronavirus Sars-Cov-2 Journal of Applied Security Research Pub Date : 2022-07-26 Roman Veresha, Alexander Dzhuzha, Dmitry Tychyna, Anastasiya Dzhuzha
Abstract The study examines current challenges faced by Ukrainian legal system in matters of criminological and victimological security of society during quarantine measures related to COVID-19. Using methods of system analysis and scientific design, current legal framework of Ukraine in regulation of public relations was analyzed. The study draws attention to the fact that, Ukraine has improved its
-
BCPIS: Blockchain-based Counterfeit Product Identification System Journal of Applied Security Research Pub Date : 2022-07-13 Mrunal Mhatre, Harshvivek Kashid, Tanisha Jain, Pallavi Chavan
Abstract A key aspect of sustainable business development involves protecting a company’s products from counterfeiting. Since this can impact brand’s image and often, product counterfeits are of a minor quality which can be dangerous and even pose health hazards. Counterfeiters gain profits by manufacturing products using lesser quality materials and production methods. Many counterfeit products in
-
Enhancing Burp Suite with Machine Learning Extension for Vulnerability Assessment of Web Applications Journal of Applied Security Research Pub Date : 2022-07-10 Rrezearta Thaqi, Kamer Vishi, Blerim Rexha
Abstract Today’s web represents the most extensive engineered system ever created by humankind. Web security is critical to web application providers and end-users. Burp Suite is established as a state-of-the-art and fully featured set of tools for web vulnerability scanners. This paper presents a novel approach using state of the art Machine Learning algorithms applied to the Burp Suite extension
-
One-Chance Transit Crime and Commuters’ Victimization Experiences in Ibadan City, Nigeria Journal of Applied Security Research Pub Date : 2022-07-07 Olusegun I. Olaniyan, Usman A. Ojedokun, Adeyinka A. Aderinto
Abstract One-chance transit crime is a prevalent yet under-researched form of transit crime in Nigeria. Thus, this study investigated the crime and the victimization experiences of commuters in Ibadan city. Routine activity theory was employed as theoretical framework. Data were generated from victims of the crime, police personnel and motor-park officials through in-depth interviews and focus group
-
Where One Door Shuts, Another Opens: Honesty Is the Best Virtue Journal of Applied Security Research Pub Date : 2022-06-21 Hyeyoung Lim
Published in Journal of Applied Security Research (Vol. 17, No. 3, 2022)
-
Public-Private Partnerships: Exploring Perceptions and Efficacy of Community Security Patrols Journal of Applied Security Research Pub Date : 2022-06-16 Stephen T. Holmes, Ross Wolf, Thomas Baker
Abstract This paper explores how one large police agency entered into a public-private partnership with a private security firm to supplement police power and presence in two diverse, high-crime neighborhoods. Using a quasi-experimental design, the researchers found road patrol in marked security vehicles produced significant decreases in Part I and II crimes in the pre-and post-implementation periods
-
Security Enhancement of Third Parties Is Needed in Global Supply Chain Management Journal of Applied Security Research Pub Date : 2022-06-15 Yoshiyasu Takefuji
Abstract Incident reports show the high risk of losing trust in global supply chain management. Under the covid-19 pandemic, cloud-based global supply chains have been vulnerable to malicious attacks. The goal of this paper is to show the high risk caused by third-party access in the current global supply chains and how to mitigate it. Based on the incident reports, global supply chain leaders are
-
Modified Deterministic Approach for Size Invariant Visual Secret Sharing with Improved Quality of Recovered Secret Journal of Applied Security Research Pub Date : 2022-06-02 Ratnesh N. Chaturvedi, Sudeep D. Thepade, Swati N. Ahirrao
Abstract In the digital world, securing data is very significant. Digital data can focus either on content secrecy or the quality of recovered secret content. Visual Secret Sharing (VSS) becomes vital when content secrecy is essential over quality. VSS encrypts the secret into “n” share. The individual share cannot reveal any information; the secret gets revealed only when a predefined number of shares
-
Application and Criminalization of the Artificial Intelligence in Business: Recommendation to Counter the Regulatory Challenges Journal of Applied Security Research Pub Date : 2022-05-27 Arif Mahmud
Abstract Artificial Intelligence (AI) is playing a significant role in our social and daily life for technological development. The efficient integration of AI into business organizations or firms is improving performance and efficiency on a significant scale. Nowadays, artificial intelligence (AI) is assisting criminal activities or committing crimes through autonomous activity related to business
-
Understanding the Users’ Intention to Use the Three-Factor Authentication for Preserving the Privacy of Patient Data Journal of Applied Security Research Pub Date : 2022-05-03 Niranjan Gandhi, Kanchan Patil
Abstract Digital health is the foundation for the future growth of healthcare. The healthcare industry is leveraging digital transformation to empower the association between physicians and patients and ameliorate health results. Researchers and experts in health informatics are eager to see how new technologies can be used in the healthcare domain to enable real-time health monitoring, such as remote
-
Improving Classification Performance for Malware Detection Using Genetic Programming Feature Selection Techniques Journal of Applied Security Research Pub Date : 2022-05-01 Heba Harahsheh, Mohammad Alshraideh, Saleh Al-Sharaeh, Rizik Al-Sayyed
Abstract Malware is the term used to describe any malicious software or code that is harmful to systems. From day to day, new malicious programs appear. To classify malware according to its characteristics, machine learning is now being used; this is because most new malware contains patterns that are similar to old ones. This paper proposes two feature selection methods based on Genetic Programming
-
New Signature Scheme Based on Elliptic Curve and Factoring Problems Using Chaotic Map Journal of Applied Security Research Pub Date : 2022-03-02 Nedal Tahat, Safaa Shatnawi
Abstract In this paper, we present the new signature scheme based on elliptic curve (EC) and factoring (FAC) problems using chaotic maps (CMs). The newly developed scheme requires only minimal and low-complexity computations, which makes it very efficient. We compare our scheme with the other schemes with respect to signature generation cost, signature size, and verification cost and show that our
-
Statement of Retraction: A Survey on Malware Detection and Classification Journal of Applied Security Research Pub Date : 2022-02-22
Published in Journal of Applied Security Research (Vol. 18, No. 3, 2023)
-
Comprehensive Comparison of Security Measurement Models Journal of Applied Security Research Pub Date : 2022-02-10 Mahmoud Khaleghi, Mohammad Reza Aref, Mehdi Rasti
Abstract Security measurement models (SMMs) and their corresponding derived metrics form the main pillars of a systematic security measurement. Providing a desirable SMM is very challenging and has been investigated over the past two decades, so that numerous SMMs have been proposed and several surveys on SMMs have been performed. However, to the best of our knowledge, neither a systematic taxonomy
-
Queen of Cuba Journal of Applied Security Research Pub Date : 2022-02-09 Alfredo Ribeiro Pereira
Abstract Ana Montes, a senior intelligence analyst, spied on the Defense Intelligence Agency for Cubans. Highly specialized in Latin American military intelligence, she was known as “Queen of Cuba.” Her traumatic childhood made her susceptible to recruitment and her motivation was ideological. Using classic espionage techniques, mainly memorization, she managed to spy for 16 years until she was discovered
-
Internet-of-Things Security and Vulnerabilities: Case Study Journal of Applied Security Research Pub Date : 2022-02-03 Ghaida Alqarawi, Bashayer Alkhalifah, Najla Alharbi, Salim El Khediri
Abstract The incorporation of IoT in the world has had tremendous popularity in the field of Technology. This great innovation has enabled seamless transformation in business and operation transformation. However, significant usage of this innovation also poses a security threat which has become a more critical point of concern to many businesses across the globe. Many companies that depend on IoT
-
Reverse Social Engineering to Counter Social Engineering in Mobile Money Theft: A Tanzanian Context Journal of Applied Security Research Pub Date : 2022-01-31 Hassan Kilavo, Leonard J. Mselle, Ramadhani I. Rais, Salehe I. Mrutu
Abstract Social engineering entails deception where one manipulates individuals into divulging confidential or any personal information that may be used for fraudulent purposes. In mobile money theft, the attackers plan a “lure” to tempt a victim directly, via mobile phones; mostly to gain money by proposing a phony undertaking. The victim is often asked to pay some money to facilitate a lucrative
-
Performance Analysis of Channel Estimation for Massive MIMO Communication Using DL-Based Fully Connected Neural Network (DL-FCNN) Architecture Journal of Applied Security Research Pub Date : 2022-01-10 Swapna Tangelapalli, Pokkunuri PardhaSaradhi, Rahul Jashvantbhai Pandya, Sridhar Iyer
Abstract The latest research for applying deep learning in wireless communications gives several opportunities to reduce complex signal processing. The channel estimation is important to study the nature of the varying channel and to calculate channel state information (CSI) value which is utilized at the receiver to nullify the interference which occurs during multipath transmission. In the current
-
Investigation of Card Skimming Cases: An Indian Perspective Journal of Applied Security Research Pub Date : 2022-01-10 Anoop A. Shetty, K. Venkatesh Murthy
Abstract Card frauds are one of the most common types of banking frauds out of which card skimming contributes the major share. Investigation and prosecution of card skimming cases are mainly dependent on digital evidence requiring trained and skilled law enforcement officers. Further, a single incident of card skimming leads to collection of information from hundreds of cards and hence the identification