Swagata Sarkar, R. Babitha Lincy, P. Sasireka, Sonam Mittal
{"title":"监控和检测可疑的网上交易","authors":"Swagata Sarkar, R. Babitha Lincy, P. Sasireka, Sonam Mittal","doi":"10.1504/ijesdf.2023.133967","DOIUrl":null,"url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":"92 1","pages":"0"},"PeriodicalIF":0.4000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Monitor and detect suspicious online transactions\",\"authors\":\"Swagata Sarkar, R. Babitha Lincy, P. Sasireka, Sonam Mittal\",\"doi\":\"10.1504/ijesdf.2023.133967\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\",\"PeriodicalId\":54070,\"journal\":{\"name\":\"International Journal of Electronic Security and Digital Forensics\",\"volume\":\"92 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.4000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Electronic Security and Digital Forensics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/ijesdf.2023.133967\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Electronic Security and Digital Forensics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijesdf.2023.133967","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
期刊介绍:
IJESDF aims to establish dialogue in an ideal and unique setting for researchers and practitioners to have a knowledge resource, report and publish scholarly articles and engage in debate on various security related issues, new developments and latest proven methodologies in the field of electronic security and digital forensics. This includes the measures governments must take to protect the security of information on the Internet, the implications of cyber-crime in large corporations and individuals, vulnerability research, zero day attacks, digital forensic investigation, ethical hacking, anti-forensics, identity fraud, phishing, pharming, and relevant case studies and “best practice" on tackling cyber crime.