Volume 7 Number 4 November 2016


Survey on Effective GPS Spoofing Countermeasures

Zeeshan Haider, Shehzad Khalid

https://doi.org/

Abstract There is an overwhelming dependence on Global Positioning System (GPS) in every sector, ranging from civil to military. The over dependence on GPS and its potential vulnerabilities has raised many concerns among government, scientists and all those who employ GPS for their business and other critical applications. It is due to the fact that GPS receivers can be easily be... Read More


Uncovering Useful Patterns in Shopping Cart Data

Ali Haider Hussein Ghazala, Naeem M. Asif, Baig Mirza Farhaan, Jamil Noreen

https://doi.org/

Abstract Understanding the shopping and purchasing behaviours of customers is an essential task for business and retail organizations. While customers look for useful information from retailers as they shop, businesses seek to collect increasing amounts of data in order to deliver added value to their customers. This requires an intensive analysis of sales data. Extracting shopping patterns across the many levels... Read More


Network Security Threats & Prevention Methodolgies - A Review

Fayyaz Masood, Syed Shah Muhammad, Sarfaraz Ahmed, Salman Qadri

https://doi.org/

Abstract There are many kinds of threats of malware like virus, worms, Trojan horse and many more. Along with external attacks internal attacks are also big security threat for any company or enterprise. Today’s world is very dangerous for network browsing and surfing without safety measures. To overcome these threats, there are some security measures like encryption, antivirus programs etc. Although... Read More