TITLE

Fraud Control Techniques Advance With The Crimes

AUTHOR(S)
Albright, Peggy
PUB. DATE
November 1999
SOURCE
Wireless Week;11/01/99, Vol. 5 Issue 44, p41
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Presents information on several technologies that prevent fraud in the wireless communications industry. Details on SuperSleuth from Nortel; Features of Alias, a fraud profiler developed to complement the Lightbridge FraudBuster program from Lightbridge Inc.; PhonePrint system from Corsair Communications Inc.; Comments by Bob McKosky, director of technical programs at GTE Labs.
ACCESSION #
2459968

 

Related Articles

  • Converging systems, services may aid fraudsters. Weaver, Heather Forsgren // RCR;10/18/99, Vol. 18 Issue 42, p28 

    Details the discussion on how to combat fraud in a converging environment in the wireless communications sector in the United States during the Wireless Fraud and Security '99 which was sponsored by the Cellular Telecommunications Industry Association. Advantages of bundled services for both...

  • Impact of Security Algorithms on Various Performance Metrics of Wireless LAN. Bhatia, V.; Gupta, D.; Sinha, H. P. // Proceedings of the World Congress on Engineering & Computer Scie;Jul2013, Vol. 1, p1 

    Today is the world of wireless information networks, the popularity of which is increasing day by day. As a result the society has witnessed burgeoning of wireless networks. Wireless LANs are one of the most popular forms of wireless networks. These networks provide an additional feature of...

  • Wireless Network Security: The Mobile Agent Approach. Abiona, Olatunde; Oluwaranti, Adeniran; Oluwatope, Ayodeji; Bello, Surura; Onime, Clement; Sanni, Mistura; Kehinde, Lawrence // International Journal of Communications, Network & System Scienc;Oct2013, Vol. 6 Issue 10, p443 

    The broadcast nature of wireless network makes traditional link-layer attacks readily available to anyone within the range of the network. User authentication is best safeguard against the risk of unauthorized access to the wireless networks. The present 802.1× authentication scheme has some...

  • COMPUTER BUGS FIND NEW TARGET. Tompkins, Joshua // Popular Science;Oct2004, Vol. 265 Issue 4, p37 

    Focuses on the efforts of security experts in the wireless market to develop software that will protect wireless devices from several viruses. Impact of Cabir, a cellphone virus created by 29A, on cellphone users; Comparison between desktop viruses and wireless viruses; Details of the Dust...

  • Survey of Malicious Attacks in MANET. Shrivastava, Neha; Motwani, Anand // International Journal of Computer Applications;Oct2013, Vol. 80, p26 

    A Mobile Ad hoc Network (MANET) is a collection of mobile nodes and is autonomous having communication through the insecure wireless links. The nodes in the network dynamically add and join the network. Due to this kind of nature nodes are vulnerable to various kinds of attacks. There are many...

  • New DoS attacks threaten wireless data networks. Marsan, Carolyn Duffy // Network World;6/15/2009, Vol. 26 Issue 21, p21 

    The article provides information on the new denial-of-service (DoS) attacks that threatens wireless data networks in New York City. According to Krishan Sabnani, vice president of networking research at Bell Telephone Laboratories Inc. (Bell Labs), DoS attacks are caused by inherent mobile...

  • Enhanced Security Framework for Wireless Networks. Ali, Sara; Mohan, S. Krishna // International Journal of Advanced Research in Computer Science;Sep-Oct2015, Vol. 6 Issue 7, p67 

    Wireless Network is one of the most widely used technologies. It offers a great deal of promise by providing features like cost effectiveness, flexibility, scalability etc. As this network is wireless it dynamically changes it's topology and does not have any central point of contact which...

  • Carriers eye SIM cards to combat cellular fraud. Vittore, Vince // America's Network;3/15/95, Vol. 99 Issue 6, p40 

    Reports on the use of subscriber identity module (SIM) by personal communication services (PCS) providers to minimize cellular fraud. Features of the SIMs; Commitment of GO Communications to the SIM card concept; Use of the SIMs with DCS1900; Concerns regarding the American market's air...

  • Risk assessment. Meyers, Jason // Telephony;08/11/97, Vol. 233 Issue 6, p6 

    Warns wireless users about the security and privacy risks posed by different modes of wireless transmission. Evaluation of wireless systems by the US National Institute of Science and Technology and the National Security Agency; Study establishing models of potential threats; Security...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics