-
961
Classroom Attendance Monitoring System Using Radio Frequency Identification with Web Application
Published 2021-12-01“…Individuals also tend to take advantage of the flaws of the manual method that leads them to commit hoax and forgery. Despite the innovation of different automated systems, biometric recognition systems, RFID technology, and barcodes also have disadvantages. …”
Get full text
Article -
962
Impacts of California Proposition 47 on crime in Santa Monica, California.
Published 2021-01-01“…Our statistical analyses of reclassified crimes-larceny, fraud, possession of narcotics, forgery, receiving/possessing stolen property-and non-reclassified ones are based on publicly available reported crime data from 2006 to 2019. …”
Get full text
Article -
963
Data Anonymization Using Pseudonym System to Preserve Data Privacy
Published 2020-01-01“…In addition, attacks may take place against services; for instance spoofing attacks, forgery attacks, etc. in the course of information transaction. …”
Get full text
Article -
964
Medical Data Sharing Scheme Based on Attribute Cryptosystem and Blockchain Technology
Published 2020-01-01“…However, most existing medical data sharing schemes have security risks, such as being prone to data tampering and forgery, and do not support the ability to verify the authenticity of the data source. …”
Get full text
Article -
965
Design of a CANFD to SOME/IP Gateway Considering Security for In-Vehicle Networks
Published 2021-11-01“…The results show that the designed gateway can ensure a CAN/CANFD to SOME/IP protocol conversion with a low system resource overhead and a low latency while effectively resisting hacker attacks such as frame forgery, tampering, and sniffing.…”
Get full text
Article -
966
The Design and Analysis of a Secure Personal Healthcare System Based on Certificates
Published 2016-11-01“…However, e-Healthcare has been exposed to eavesdropping, manipulation, and the forgery of information that is personal, biological, medical, etc., and is a security threat from malicious attackers. …”
Get full text
Article -
967
Application of Fuzzy Logic in a Secure Beacon–Based Guidance System for Public Transportation
Published 2022-09-01“…To defend the scheme against possible attacks based on beacon forgery or user tracking, the proposal includes different forms of authentication for data sent from beacons and data sent from the mobile application. …”
Get full text
Article -
968
A Traceable and Authenticated IoTs Trigger Event of Private Security Record Based on Blockchain
Published 2021-03-01“…The known attacks (e.g., man-in-the-middle attack, replay attack, forgery attack) are avoided by message encryption and a signing mechanism. …”
Get full text
Article -
969
PENUNDAAN KEWAJIBAN PEMBAYARAN UTANG DALAM KEPAILITAN (ANALISIS TERHADAP PUTUSAN PENGADILAN NIAGA NOMOR: 20/PAILIT/2011/PN.NIAGA.SBY)
Published 2015-07-01“…The results of the research showed that the debtor (PT Dwimas Andalan Bali) as the Respondent of Insolvency has filed rebuttal that the Applicant of Insolvency has committed defaults by applying the doctrine of excptio non adimpleti cordractus and the Applicant of Insolvency (PT Industama Karsa Mandiri) was alleged of committing frauds and forgery. Therefore the insolvent debtor who should filed for insolvency to DDPO did not execute it, instead he executed reconciliation with the other creditors unless the Applicant of Insolvency. …”
Get full text
Article -
970
Securing communications between smart grids and real users; providing a methodology based on user authentication
Published 2021-11-01“…However, to maintain security in a communication, smart meter authentication alone is not enough and it must be ensured that the electricity company’s server is not forgery. Therefore, there is a need for two-way authentication between the smart meter on the home side and the electricity company server. …”
Get full text
Article -
971
A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things
Published 2020-02-01“…However, during the transmission process of IoT data, security issues, such as data theft and forgery, are prone to occur. In addition, most existing data storage solutions are centralized, i.e., data are stored and maintained by a centralized server. …”
Get full text
Article -
972
Watermarking for combating deepfakes
Published 2023“…Over the recent years, great concerns have been aroused around the topic of Deefake due to its amazing ability in making a forgery image look like a genuine one. Many approaches have been developed to alleviate such risks. …”
Get full text
Final Year Project (FYP) -
973
ANALISIS SEKUEN NUKLEOTIDA FRAGMEN 12S RIBOSOMAL MITOKONDRIAL DEOKSIRIBONUKLEOTIDA (MT-12S RDNA) YANG BERASAL DARI DAGING BABI DAN SAPI
Published 2014“…This leads to cases of forgery and pork adulteration which has a similar physical characteristic with beef. …”
Thesis -
974
Designing and developing mobile application for college resident / Muhammad Amirul Aizat Mohd Rosdi
Published 2020“…Unfortunately, some problems occurs while residents using the procedures which are coupon forgery and thieving activity and it is time consuming in managing the record. …”
Get full text
Thesis -
975
A new security model to prevent denial-of-service attacks and violation of availability in wireless networks
Published 2012“…The models are capable of preventing the attacks by detecting and discarding the forgery control frames belonging to the attackers. …”
Get full text
Article -
976
Security Improvement of Unicast Management Frames In Ieee 802.11 Mac Layer
Published 2007“…The lack of protection on management frames causes an intruder to launch different types of attack on the WLAN such as forgery, session hijacking, denial of service and man-in-the-middle attack, which can lead to expose the whole WLAN. …”
Get full text
Thesis -
977
State-of-the-art in techniques of text digital watermarking: challenges and limitations
Published 2016“…During the last decade, digital watermarking technology has also been utilized as an alternative to prevent media forgery and tampering or falsification to ensure both copyright and authentication. …”
Get full text
Article -
978
Forensic discrimination of blue pen inks: emergence of hybrid pen inks
Published 2021“…Pens are frequently used to make alterations to documents during forgery. Comparing to conventional inks, hybrid pen ink brings a different challenge to forensic document examiners in differentiating ink entries on a questioned document. …”
Get full text
Article -
979
Multi-attention-based approach for deepfake face and expression swap detection and localization
Published 2023“…In the field of multimedia forensics, the detection and precise localization of image forgery has become essential tasks. Current deepfake detectors perform well with high-quality faces within specific datasets, but often struggle to maintain their performance when evaluated across different datasets. …”
Get full text
Article -
980
Statistical examination of common characteristics for disguised handwriting amongst Malaysian
Published 2009“…As an individual attempts to disguise their own handwriting with the intent of later disclaiming it, there is a need to perform examination of handwritten documents to determine the authorship of a questioned document or detect evidence of forgery or disguise. This research proposed a microscopic and statistical examination of handwriting characteristics. …”
Get full text
Thesis