An overview of ATM systems security
| Main Authors: | Alharaki, Omarah Omar, Hweidi, Mohammed, Zeki, Akram M. |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/20199/ http://irep.iium.edu.my/20199/1/10.pdf |
Similar Items
Security risk of ATM systems, case of study
by: Alharaki, Omarah Omar, et al.
Published: (2011)
by: Alharaki, Omarah Omar, et al.
Published: (2011)
Threats and solutions for ATM security systems
by: Alharaki, Omarah Omar, et al.
Published: (2011)
by: Alharaki, Omarah Omar, et al.
Published: (2011)
Investigating the student’s awareness on computer security and ethics
by: Aliyu, Mansur, et al.
Published: (2011)
by: Aliyu, Mansur, et al.
Published: (2011)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Image recognition technique of road tax sticker in Malaysia
by: Alharaki, Omarah Omar, et al.
Published: (2012)
by: Alharaki, Omarah Omar, et al.
Published: (2012)
ATM lane simulator / Ching Kim Joo
by: Ching, Kim Joo
Published: (2001)
by: Ching, Kim Joo
Published: (2001)
Hopfield model for shortest path computation and routing in ATM network / by Lee Chee Weng
by: Lee, Chee Weng
Published: (2001)
by: Lee, Chee Weng
Published: (2001)
The Integration of GPS Navigator Device with Vehicles Tracking System for Rental Cars Firms
by: Alharaki, Omarah Omar, et al.
Published: (2010)
by: Alharaki, Omarah Omar, et al.
Published: (2010)
A comparison of watermarking image quality based on dual intermediate significant bit with genetic algorithm
by: Yasin, Azman, et al.
Published: (2013)
by: Yasin, Azman, et al.
Published: (2013)
A new robust image watermarking method using Dual Intermediate Significant Bits
by: Mohammed, Ghassan N., et al.
Published: (2014)
by: Mohammed, Ghassan N., et al.
Published: (2014)
Multibiometric systems and template security survey
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
A novel digital watermarking technique based on ISB (Intermediate Significant Bit)
by: Zeki, Akram M., et al.
Published: (2009)
by: Zeki, Akram M., et al.
Published: (2009)
Mapping ORM to Datalog: An Overview
by: Halpin, Terry, et al.
Published: (2010)
by: Halpin, Terry, et al.
Published: (2010)
An Overview of Crowd Evacuation Simulation
by: Noor Akma, Abu Bakar, et al.
Published: (2017)
by: Noor Akma, Abu Bakar, et al.
Published: (2017)
Dynamic modelling of a two-stage ATM Tandem Banyan Switch / Tham Hon Loke
by: Tham , Hon Loke
Published: (2002)
by: Tham , Hon Loke
Published: (2002)
An intermediate significant bit (ISB) watermarking technique using neural networks
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
Development of objective-oriented components for ATM networks simulation with emphasis on switch architecture /
Tan Boon Pin
by: Tan, Boon Pin
Published: (2001)
by: Tan, Boon Pin
Published: (2001)
Model driven security frameworks for addressing security problems of Service Oriented Architecture
by: Saleem, M. Q., et al.
Published: (2010)
by: Saleem, M. Q., et al.
Published: (2010)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Iot cloud simulation managing resources: an overview
by: Hamza, Nidal Abdelgadir Ahmed, et al.
Published: (2018)
by: Hamza, Nidal Abdelgadir Ahmed, et al.
Published: (2018)
Stakeholder identification overview and challenges in requirements engineering prospective
by: Elneel, Duha Awad, et al.
Published: (2022)
by: Elneel, Duha Awad, et al.
Published: (2022)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Smart home security
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
Secure student attendance system based on geo-location and QR code technologies
by: Noor Fathin Shahirah, Ahmat
Published: (2018)
by: Noor Fathin Shahirah, Ahmat
Published: (2018)
Android based smart security systems using internet of things (IoT) and firebase
by: Harvent Rau, Mogana Ravu
Published: (2019)
by: Harvent Rau, Mogana Ravu
Published: (2019)
A new secure storing system for biometric templates based encryption and concealment
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
An investigation of health information system security policies compliance behaviour / Norshima Humaidi
by: Norshima, Humaidi
Published: (2016)
by: Norshima, Humaidi
Published: (2016)
Securing e-learning environment: A study of security awareness and behavior of user
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
An approach to improve the robustness of substitution techniques of audio steganography
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Stegano-image as a digital signature to improve security authentication system in mobile computing
by: Mantoro, Teddy, et al.
Published: (2016)
by: Mantoro, Teddy, et al.
Published: (2016)
Security access control system based on Radio Frequency Identification (RFID) and Arduino technologies
by: Ammar Faez, Mohamad Azudin
Published: (2018)
by: Ammar Faez, Mohamad Azudin
Published: (2018)
Security of multimedia in the web
by: Zeki, Akram M.
Published: (2011)
by: Zeki, Akram M.
Published: (2011)
Model of security level classification for data in hybrid cloud computing
by: Shakir, Mohanaad, et al.
Published: (2016)
by: Shakir, Mohanaad, et al.
Published: (2016)
Inculcating secure coding for beginners
by: A. Aziz, Normaziah, et al.
Published: (2017)
by: A. Aziz, Normaziah, et al.
Published: (2017)
Enhancement of multicast network security
by: Ali, Sellami, et al.
Published: (2013)
by: Ali, Sellami, et al.
Published: (2013)
Overview of Random Forest : Effective Ensemble Method in Modern Data Mining
by: Abdullah, Embong, et al.
Published: (2007)
by: Abdullah, Embong, et al.
Published: (2007)
An overview of learning content in MyLexics (an assistive multimedia courseware for dyslexics)
by: Mohd. Yusoh, Zeratul Izzah, et al.
Published: (2008)
by: Mohd. Yusoh, Zeratul Izzah, et al.
Published: (2008)
Similar Items
-
Security risk of ATM systems, case of study
by: Alharaki, Omarah Omar, et al.
Published: (2011) -
Threats and solutions for ATM security systems
by: Alharaki, Omarah Omar, et al.
Published: (2011) -
Investigating the student’s awareness on computer security and ethics
by: Aliyu, Mansur, et al.
Published: (2011) -
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009) -
Image recognition technique of road tax sticker in Malaysia
by: Alharaki, Omarah Omar, et al.
Published: (2012)