Lesson Study Alliance is dedicated to enriching the professional lives of teachers and the academic lives of students by supporting the effective use of Lesson Study, especially in mathematics.
A. Aličić. 100 godina muzeja na Humcu: (1884-1984) : zbornik radova, стр. 187--201. Ljubuški, Samoupravna interesna zajednica kulture Općine Ljubuški, (1985)
S. Mlakar, и M. Haller. Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, стр. 1--10. New York, NY, USA, Association for Computing Machinery, (2020)event-place: Honolulu, HI, USA.
D. Iyobor, B. Ola, и E. Sarkodie. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue VII):
69-75(августа 2020)1. Adepoju, S. A.&AlhassanS. (2010). Challenges of ATM use and fraud occurrences in Nigeria: A case study of selected banks in Minna metropolis. Journal of Online Banking and Business, 15 (2), 1-10. 2. Adeoye, O. (2012). Evaluate the performance of two-factor authentication solutions in the banking sector. International Journal of Computer Science, 9 (4), 457-462. 3. Alblawi, U. Moon I., Kim, J., Suh, S.C. & Lee, W. (2014). A hybrid classifier with classification a binning for network application identification. Journal of Integrated Design and Operations Science, 18 (3), 3-22, 4. Banerjee, U.,Vashishtha, A.&Saxena M. (2010). Wireshark function evaluation as an intrusion detection tool. International Journal of Computer Applications, 6 (7), 1-5. https://Doi:10.5120/1092-1427. 5. Brunner, A., Decressin, J., Hardy, D., &Kudela, B. (2004). The German Banking System of Three Pillars: The European Transnational Perspective. Washington, DC: International Monetary Fund. 6. Chavalone, S. (2012). Banking fraud and ATM security. Retrieved from (Accessed 10th August, 2020) http://resources.infosecinstitute.com/bank-fraud-atm-security/. 7. Cisco Networking Academy. (2017). Basics of steering and switching. Hoboken, New Jersey: Cisco Press, 2017. 8. Debnath, R. Agrawal, B.&Vishnav, C. (2014). DES, AES, and Triple DES: Symmetric Key Cryptography Algorithms. International Journal of Scientific, Engineering and Technical Research, 3 (3), 652-654 9. Firewall. (Nd) Oxford Life Dictionary of the English Language. Retrieved from (Accessed 10th August, 2020) https://en.oxforddictionaries.com/definition/firewall. 10. Hussain, M. S. Russell, A.H.&RobidasL.C. (2015). Review of ATM services in Dhaka City for an analysis of factors affecting customer satisfaction. Journal of Business and Management IOSR, 17 (11) 1, 68-75. 11. Khan, F. (2015). How does an ATM machine work? Retrieved fromwww.quora.com/How-does-an-ATM-machine-work-1 12. Modern Ghana. (2013). Federal prosecutors say hackers stole $ 45 million in ATM card fraud. Retrieved from www.modernghana.com/news/463043/1/hackers-steal-45-million-in-atm-card-scam-Federal.html 13. Regular old phone service. (No date). On Wikipedia. Retrieved from (Accessed 10th August, 2020). https://en.wikipedia.org/wiki/Plain_old_telephone_service 14. Prodromo, A. (2019). TLS Security 6: Examples of TLS Attacks and Attacks. (Accessed 10th August, 2020) Taken from https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-final-Part/143-153 15. Pymnts.com. (2017). Automated teller machines in the US have recently grown. Retrieved from https://www.pymnts.com/cash/2017/atmia-says-us-atms-finally-see-growth/(Accessed 10th August, 2020) 16. Robam, A., Verma, and A. And Singh A. (2013). A method for detecting beams using beam sniffing. International Journal of Computer Science and Engineering, 4 (3), 21-33. https://Doi:10.5121/ijcses.2013.4302. 17. Sidel, R. (2015). Debit card data theft from ATMs escalated. Retrieved from www.wsj.com/articles/theft-of-debit-card-data-from-atms-soars-1432078912(Accessed 10th August, 2020). 18. Payment Card Forensic Analysis: From Concept to Desktop and Mobile Analysis Tools. Digital Survey, 11 (3), 143-153. TechTarget Network. (Nada). What is Ethernet? Retrieved from. (Accessed 10th August, 2020). https://searchnetworking.techtarget.com/definition/Ethernet 19. TechTarget Network. (n.d). What is a local area network (LAN)? Retrieved from (Accessed 10th August, 2020)www.searchnetworking.techtarget.com/definition/local-area-network-LAN 20. Twum, F., Nti, IK, & Asante, M. (2016). Use multi-factor authentication to improve ATM security. International Journal of Science and Engineering Applications, 5 (3), 126-134. https://Doi:10.7753/ijsea0503.1003. 21. Wireshark. (No date). In Techopedia. Retrieved from www.techopedia.com/definition/25325/wireshark (Accessed 10th August, 2020) 22. Young, C. (2019). Introduce ZOMBIES POODLE and GOLDENDOODLE. Retrieved from https: (Accessed 10th August, 2020) //www.tripwire.com/zh-CN/state-of-security/vulnerability-management/zombie- 23. Zou Lin, Liao Ming, Yuan Cheng, Zhang Hai (2017). Use the expected packet size to detect low-speed DDoS attacks. Security and Communications Network, 2017 (1), 1-14. https://Doi:10.1155/2017/3691629.
Jees, Jincy, и Anakha. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue VI):
53-57(июня 2020)1. M. A. Rafique, W. Pedrycz, and M. Jeon, “Vehicle license plate detection using region-based convolutional neural networks,” Soft Computing,2018, Vol. 22, No. 19, pp. 6429-6440. 2. Y. N. Chen, C. C. Han, G. F. Ho, and K. C. Fan, “Facial/License Plate Detection Using a Two-level Cascade Classifier and a Single Convolutional Feature Map,” International Journal of Advanced Robotic Systems, 2015, Vol. 12, No. 12, pp. 183-198. 3. C. Gerber, and M. Chung, “Number Plate Detection with a Multi- Convolutional Neural Network Approach with Optical Character Recognition for Mobile Devices,” Journal of Information Processing Systems, 2016, Vol. 12, No. 1, pp. 100-108. 4. Y. Yuan, W. Zou, Y. Zhao, X. Wang, X. Hu, and N. Komodakis, “A Robust and Efficient Approach to License Plate Detection,” IEEE Transactions on Image Processing, 2017, Vol. 26, No. 3, pp. 1102-1114. 5. W. Zhou, H. Li, Y. Lu, and Q. Tian, “Principal Visual Word Discovery for Automatic License Plate Detection,” IEEE Transactions on Image Processing, 2012, Vol. 21, No. 9, pp. 4269-4279. 6. B. Li, B. Tian, Y. Li, and D. Wen, “Component-Based License Plate Detection Using Conditional Random Field Model,” IEEE Transactions on Intelligent Transportation Systems, 2013, vol. 14, no. 4, pp. 1690-1699. 7. R. F. Prates, G. C. Chavez, W. R. Schwartz, and D. Menotti, “Brazilian License Plate Detection Using Histogram of Oriented Gradients and Sliding Windows,” International Journal of Computer Science & Information Technology, 2013, Vol 5, No 6, pp. 39-52. 8. R. Wang, N. Sang, R. Huang, and Y. Wang, "License plate detection using gradient information and cascade detectors,” Optik, 2014, Vol. 125, No. 1, pp. 186-190. 9. A. M. Ghaili, S. Mashohor, A. R. Ramli, and A. Ismail, “Vertical-Edge-Based Car-License-Plate Detection Method,” IEEE Transactions on Vehicular Technology, 2013, vol. 62, no. 1, pp. 26-38. 10. J. Tian, G. Wang, J. Liu, and Y. Xia, “License plate detection in an open environment by density-based boundary clustering,” Journal of Electronic Imaging, 2017, Vol. 26. No. 3, PP. 330171-3301711. 11. Anagnostopoulos, C., Anagnostopoulos, I., Loumos, V., Kayafas, E.: License plate-recognition from still images and video sequences: A survey. IEEE Trans. Intell. Transp. Syst. 9(3), 377–391 (2008) 12. Jia, W., Zhang, H., He, X.: Region-based License Plate Detection. J. Network and comput. Applications 30(4), 1324–1333 (2007) 13. Wang, S., Lee, H.-J.: A cascade framework for a real-time statistical plate recognition system. IEEE Trans. Inf. Forensics Security 2(2), 267–282 (2007) 14. Anagnostopoulos, C., Anagnostopoulos, I., Loumos, V., Kayafas, E.: A License Plate-Recognition Algorithm for Intelligent Transportation System Applications. IEEE Trans. Intell. Transp. Syst. 7(3), 377–392 (2006) 15. Zheng, D., Zhao, Y., Wang, J.: An Efficient Method of License Plate Location. Pattern Recognit. Lett. 26(15), 2431–2438 (2005) 16. Chang, S., Chen, L.-S., Chung, Y.-C., Chen, S.-W.: Automatic License Plate Recognition. IEEE Trans. Intell. Transp. Syst. 5(1), 42–53 (2004) 17. Deb, K., Chae, H.-U., Jo, K.-H.: Parallelogram and Histogram based Vehicle License Plate Detection. In: IEEE ICSMA, pp. 349–353. IEEE Press, New York (2008).