We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Smart Mode of Tackling E-Commerce Security Cyber Crimes through Biometric Face Identification Technique Applying Holistic Approach

by T. Kalaichelvi, S. Hemalatha, P. Aishwarya, S. Aiswarya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 173 - Number 1
Year of Publication: 2017
Authors: T. Kalaichelvi, S. Hemalatha, P. Aishwarya, S. Aiswarya
10.5120/ijca2017915236

T. Kalaichelvi, S. Hemalatha, P. Aishwarya, S. Aiswarya . Smart Mode of Tackling E-Commerce Security Cyber Crimes through Biometric Face Identification Technique Applying Holistic Approach. International Journal of Computer Applications. 173, 1 ( Sep 2017), 35-39. DOI=10.5120/ijca2017915236

@article{ 10.5120/ijca2017915236,
author = { T. Kalaichelvi, S. Hemalatha, P. Aishwarya, S. Aiswarya },
title = { Smart Mode of Tackling E-Commerce Security Cyber Crimes through Biometric Face Identification Technique Applying Holistic Approach },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2017 },
volume = { 173 },
number = { 1 },
month = { Sep },
year = { 2017 },
issn = { 0975-8887 },
pages = { 35-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume173/number1/28303-2017915236/ },
doi = { 10.5120/ijca2017915236 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:20:07.774820+05:30
%A T. Kalaichelvi
%A S. Hemalatha
%A P. Aishwarya
%A S. Aiswarya
%T Smart Mode of Tackling E-Commerce Security Cyber Crimes through Biometric Face Identification Technique Applying Holistic Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 173
%N 1
%P 35-39
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The security systems used currently does not provide required levels of safety against towering threats. The prominent reason for their failure is the usage of point solutions for protecting hosts and reactive approach against intrusions. Electronic Commerce is process of doing business through networking. A person sitting can access all the facilities of the Internet to buy or sell the products from the place he is stationed. Security is the challenge faced by e-commerce today & there is still a lot of advancements to be made in security features. The one aspect where e-commerce wins over traditional commerce is that the buyer can browse online shops, compare and order merchandise on their PC. The researches imply the significance of the e-commerce in developing countries for business concerns.

References
  1. MagicNET: The Human Immune System and Network Security System ,Muhammad Awais Shibli, Jeffy Mwakalinga,, and Sead Muftic, Department of Computer and System Science DSV, The Royal Institute of Technology (KTH), Stockholm Sweden, SU/KTH, DSV, Borgarfjordsgatan 15, SE-164 40 Kista, Sweden, NUST School of Electrical Engineering and Computer Sciences, Islamabad, Pakistan
  2. N.T. Baloyi. Misuse intrusion architecture: prevent, detect, monitor and recover employee fraud, The Proceedings of the Information Security South Africa 2005 New knowledge today conference. Sandtorn, South Africa.
  3. Twycross, J.P. Integrated innate and adaptive artificial immune systems applied to process anomaly detectionUniversity of Nottingham. 2007.
  4. S. Ahmed, S. Muftic, Intrusion Prevention System based on Secure Mobile Agents , Thesis Report, Department of Computer and Systems Sciences (DSV-KTH), March 2006.
  5. P. Kannadiga, M. Zulkernine, DIDMA: A Distributed Intrusion Detection System Using Mobile Agents , Proceedings of the Sixth International Conference on SE. Vol , Issue , 23-25 May 2005
  6. Vulnerability Forecasting – conceptual Model” by H.S. Venter and J.H.P. Eloff, Computer & Security (2004) ELSEVIER
  7. Shibli, M. A., & Muftic, S. (Feburary 2009). MagicNET: Security Architecture for Creation, classification and validation of Trusted Mobile Agents
  8. Jung Won Kim, Integrating artificial Immune Algorithms for Intrusion Detection, Ph. D thesis, The Department of Computer Science, University of London, 2002
  9. Jung Won K.; Bentley, P, The Human Immune System and Network Intrusion Detection, Department of Computer Science, University of London, Gower Street, London, WCIE 6BT, U.K
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion detection system managerial security controls operational security controls technical security controls Face Recognition Holistic Matching Methods Feature-based (structural) Methods Hybrid Methods