Main Article Content
Abstract
Keywords
Article Details
References
- Taghavifard, M.T. dan M. Torabi, Factors affecting the use of mobile banking services by customers and rank them Case study: Tejarat Bank branches in Tehran. Journal of Business Management Researches, 2010.
- Amadeh, H. dan M. Jafarpour, Study of the Barriers and strategies for the development of electronic banking in the country's private banks. Executive Management Review 2009.
- Jassal, R.K. dan Sehgal, R.K., 2013. Online Banking Security Flaws: A Study. International Journal of Advanced Research in Computer Science and Software Engineering, 3(8).
- Venkataram, P., Babu, B.S., Naveen, M.K. and Gungal, G.S., 2007, April. A Method of Fraud & Intrusion Detection for E-payment Systems in Mobile e-Commerce. In 2007 IEEE International Performance, Computing, and Communications Conference (pp. 395-401). IEEE.
- Rieke, R., Zhdanova, M., Repp, J., Giot, R. dan Gaber, C., 2013, September. Fraud Detection in Mobile Payments Utilizing Process Behavior Analysis. In Availability, Reliability and Security (ARES), 2013 Eighth International Conference on (pp. 662-669). IEEE.
- Zhdanova, M., Repp, J., Rieke, R., Gaber, C. dan Hemery, B., 2014, September. No smurfs: Revealing fraud chains in mobile money transfers. InAvailability, Reliability and Security (ARES), 2014 Ninth International Conference on (pp. 11-20). IEEE.
- Pasquet, M. dan Gerbaix, S., 2016, February. Fraud on host card emulation architecture: Is it possible to fraud a payment transaction realized by a mobile phone using an" Host Card Emulation" system of security? Invited paper. In 2016 Second International Conference on Mobile and Secure Services (MobiSecServ) (pp. 1-3). IEEE.
- Nosrati, L. dan Bidgoli, A.M., 2015, October. Security assessment of mobile-banking. In Computing and Communication (IEMCON), 2015 International Conference and Workshop on (pp. 1-5). IEEE.
- Neufeld, D.J., 2010, January. Understanding Cybercrime. In System Sciences (HICSS), 2010 43rd Hawaii International Conference on (pp. 1-10). IEEE.
- Islam, M.S., 2014. Systematic Literature Review: Security Challenges of Mobile Banking and Payments System. International Journal of u-and e-Service, Science and Technology, 7(6), pp.107-116.
- Elkhodr, M., Shahrestani, S. dan Kourouche, K., 2012, November. A proposal to improve the security of mobile banking applications. In ICT and Knowledge Engineering (ICT & Knowledge Engineering), 2012 10th International Conference on (pp. 260-265). IEEE.
- He, W., 2012. A review of social media security risks and mitigation techniques. Journal of Systems and Information Technology, 14(2), pp.171-180.
- He, W., 2013. A survey of security risks of mobile social media through blog mining and an extensive literature search. Information Management & Computer Security, 21(5), pp.381-400.
- Judge, P. dan Ammar, M., 2003. Security issues and solutions in multicast content distribution: A survey. IEEE network, 17(1), pp.30-36.
- Khan, H.U., 2014. E-banking: Online transactions and security measures.Research Journal of Applied Sciences, Engineering and Technology, 7(19), pp.4056-4063.
- Jassal, R.K. dan Sehgal, R.K., Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Example.
- Baldi, P., 2012. Autoencoders, unsupervised learning, and deep architectures. ICML unsupervised and transfer learning, 27(37-50), p.1.
- Murphy, K.P., 2012. Machine learning: a probabilistic perspective. MIT press.
References
Taghavifard, M.T. dan M. Torabi, Factors affecting the use of mobile banking services by customers and rank them Case study: Tejarat Bank branches in Tehran. Journal of Business Management Researches, 2010.
Amadeh, H. dan M. Jafarpour, Study of the Barriers and strategies for the development of electronic banking in the country's private banks. Executive Management Review 2009.
Jassal, R.K. dan Sehgal, R.K., 2013. Online Banking Security Flaws: A Study. International Journal of Advanced Research in Computer Science and Software Engineering, 3(8).
Venkataram, P., Babu, B.S., Naveen, M.K. and Gungal, G.S., 2007, April. A Method of Fraud & Intrusion Detection for E-payment Systems in Mobile e-Commerce. In 2007 IEEE International Performance, Computing, and Communications Conference (pp. 395-401). IEEE.
Rieke, R., Zhdanova, M., Repp, J., Giot, R. dan Gaber, C., 2013, September. Fraud Detection in Mobile Payments Utilizing Process Behavior Analysis. In Availability, Reliability and Security (ARES), 2013 Eighth International Conference on (pp. 662-669). IEEE.
Zhdanova, M., Repp, J., Rieke, R., Gaber, C. dan Hemery, B., 2014, September. No smurfs: Revealing fraud chains in mobile money transfers. InAvailability, Reliability and Security (ARES), 2014 Ninth International Conference on (pp. 11-20). IEEE.
Pasquet, M. dan Gerbaix, S., 2016, February. Fraud on host card emulation architecture: Is it possible to fraud a payment transaction realized by a mobile phone using an" Host Card Emulation" system of security? Invited paper. In 2016 Second International Conference on Mobile and Secure Services (MobiSecServ) (pp. 1-3). IEEE.
Nosrati, L. dan Bidgoli, A.M., 2015, October. Security assessment of mobile-banking. In Computing and Communication (IEMCON), 2015 International Conference and Workshop on (pp. 1-5). IEEE.
Neufeld, D.J., 2010, January. Understanding Cybercrime. In System Sciences (HICSS), 2010 43rd Hawaii International Conference on (pp. 1-10). IEEE.
Islam, M.S., 2014. Systematic Literature Review: Security Challenges of Mobile Banking and Payments System. International Journal of u-and e-Service, Science and Technology, 7(6), pp.107-116.
Elkhodr, M., Shahrestani, S. dan Kourouche, K., 2012, November. A proposal to improve the security of mobile banking applications. In ICT and Knowledge Engineering (ICT & Knowledge Engineering), 2012 10th International Conference on (pp. 260-265). IEEE.
He, W., 2012. A review of social media security risks and mitigation techniques. Journal of Systems and Information Technology, 14(2), pp.171-180.
He, W., 2013. A survey of security risks of mobile social media through blog mining and an extensive literature search. Information Management & Computer Security, 21(5), pp.381-400.
Judge, P. dan Ammar, M., 2003. Security issues and solutions in multicast content distribution: A survey. IEEE network, 17(1), pp.30-36.
Khan, H.U., 2014. E-banking: Online transactions and security measures.Research Journal of Applied Sciences, Engineering and Technology, 7(19), pp.4056-4063.
Jassal, R.K. dan Sehgal, R.K., Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Example.
Baldi, P., 2012. Autoencoders, unsupervised learning, and deep architectures. ICML unsupervised and transfer learning, 27(37-50), p.1.
Murphy, K.P., 2012. Machine learning: a probabilistic perspective. MIT press.