A. van der Linde, J. Leit\ ao, and N. Preguica. Proceedings of the 2Nd Workshop on the Principles and Practice of Consistency for Distributed Data, page 12:1--12:4. New York, NY, USA, ACM, (2016)
K. Pandey, R. Yadu, A. Dwivedi, and P. Shukla. International Journal on Recent and Innovation Trends in Computing and Communication, 3 (2):
456--460(February 2015)
P. Ziegler, K. Dittrich, and E. Hunt. Proceedings of the 2008 IEEE 24th International Conference on Data Engineering Workshop, page 250--253. Washington, DC, USA, IEEE Computer Society, (2008)
R. Bommakanti, K. Klotz, E. Dratz, and A. Jesaitis. J Leukoc Biol, 54 (6):
572-7(December 1993)Bommakanti, R K Klotz, K N Dratz, E A Jesaitis, A J R01 AI22735/AI/NIAID
NIH HHS/United States Research Support, Non-U.S. Gov't Research Support,
U.S. Gov't, P.H.S. United states Journal of leukocyte biology J Leukoc
Biol. 1993 Dec;54(6):572-7..
R. Amorim, J. Castro, J. da Silva, and C. Ribeiro. New Contributions in Information Systems and Technologies, page 101--111. Springer International Publishing, (2015)
J. Eggermont, A. Eiben, and J. van
Hemert. Advances in Intelligent Data Analysis, Third
International Symposium, IDA-99, volume 1642 of LNCS, page 281--290. Amsterdam, The Netherlands, Springer-Verlag, (9--11 August 1999)
J. Eggermont, A. Eiben, and J. van Hemert. Proceedings of the Eleventh Belgium/Netherlands
Conference on Artificial Intelligence (BNAIC'99), page 253--254. Kasteel Vaeshartelt, Maastricht, Holland, (3-4 November 1999)
S. Jablonski, B. Volz, and M. Rehman. CIMS '07: Proceedings of the ACM first workshop on CyberInfrastructure:
information management in eScience, page 23--30. New York, NY, USA, ACM, (2007)
G. Pei, P. Samama, M. Lohse, M. Wang, J. Codina, and R. Lefkowitz. Proc Natl Acad Sci U S A, 91 (7):
2699-702(March 1994)Pei, G Samama, P Lohse, M Wang, M Codina, J Lefkowitz, R J HL16037/HL/NHLBI
NIH HHS/United States Research Support, U.S. Gov't, P.H.S. United
states Proceedings of the National Academy of Sciences of the United
States of America Proc Natl Acad Sci U S A. 1994 Mar 29;91(7):2699-702..
D. Iyobor, B. Ola, and E. Sarkodie. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue VII):
69-75(August 2020)1. Adepoju, S. A.&AlhassanS. (2010). Challenges of ATM use and fraud occurrences in Nigeria: A case study of selected banks in Minna metropolis. Journal of Online Banking and Business, 15 (2), 1-10. 2. Adeoye, O. (2012). Evaluate the performance of two-factor authentication solutions in the banking sector. International Journal of Computer Science, 9 (4), 457-462. 3. Alblawi, U. Moon I., Kim, J., Suh, S.C. & Lee, W. (2014). A hybrid classifier with classification a binning for network application identification. Journal of Integrated Design and Operations Science, 18 (3), 3-22, 4. Banerjee, U.,Vashishtha, A.&Saxena M. (2010). Wireshark function evaluation as an intrusion detection tool. International Journal of Computer Applications, 6 (7), 1-5. https://Doi:10.5120/1092-1427. 5. Brunner, A., Decressin, J., Hardy, D., &Kudela, B. (2004). The German Banking System of Three Pillars: The European Transnational Perspective. Washington, DC: International Monetary Fund. 6. Chavalone, S. (2012). Banking fraud and ATM security. Retrieved from (Accessed 10th August, 2020) http://resources.infosecinstitute.com/bank-fraud-atm-security/. 7. Cisco Networking Academy. (2017). Basics of steering and switching. Hoboken, New Jersey: Cisco Press, 2017. 8. Debnath, R. Agrawal, B.&Vishnav, C. (2014). DES, AES, and Triple DES: Symmetric Key Cryptography Algorithms. International Journal of Scientific, Engineering and Technical Research, 3 (3), 652-654 9. Firewall. (Nd) Oxford Life Dictionary of the English Language. Retrieved from (Accessed 10th August, 2020) https://en.oxforddictionaries.com/definition/firewall. 10. Hussain, M. S. Russell, A.H.&RobidasL.C. (2015). Review of ATM services in Dhaka City for an analysis of factors affecting customer satisfaction. Journal of Business and Management IOSR, 17 (11) 1, 68-75. 11. Khan, F. (2015). How does an ATM machine work? Retrieved fromwww.quora.com/How-does-an-ATM-machine-work-1 12. Modern Ghana. (2013). Federal prosecutors say hackers stole $ 45 million in ATM card fraud. Retrieved from www.modernghana.com/news/463043/1/hackers-steal-45-million-in-atm-card-scam-Federal.html 13. Regular old phone service. (No date). On Wikipedia. Retrieved from (Accessed 10th August, 2020). https://en.wikipedia.org/wiki/Plain_old_telephone_service 14. Prodromo, A. (2019). TLS Security 6: Examples of TLS Attacks and Attacks. (Accessed 10th August, 2020) Taken from https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-final-Part/143-153 15. Pymnts.com. (2017). Automated teller machines in the US have recently grown. Retrieved from https://www.pymnts.com/cash/2017/atmia-says-us-atms-finally-see-growth/(Accessed 10th August, 2020) 16. Robam, A., Verma, and A. And Singh A. (2013). A method for detecting beams using beam sniffing. International Journal of Computer Science and Engineering, 4 (3), 21-33. https://Doi:10.5121/ijcses.2013.4302. 17. Sidel, R. (2015). Debit card data theft from ATMs escalated. Retrieved from www.wsj.com/articles/theft-of-debit-card-data-from-atms-soars-1432078912(Accessed 10th August, 2020). 18. Payment Card Forensic Analysis: From Concept to Desktop and Mobile Analysis Tools. Digital Survey, 11 (3), 143-153. TechTarget Network. (Nada). What is Ethernet? Retrieved from. (Accessed 10th August, 2020). https://searchnetworking.techtarget.com/definition/Ethernet 19. TechTarget Network. (n.d). What is a local area network (LAN)? Retrieved from (Accessed 10th August, 2020)www.searchnetworking.techtarget.com/definition/local-area-network-LAN 20. Twum, F., Nti, IK, & Asante, M. (2016). Use multi-factor authentication to improve ATM security. International Journal of Science and Engineering Applications, 5 (3), 126-134. https://Doi:10.7753/ijsea0503.1003. 21. Wireshark. (No date). In Techopedia. Retrieved from www.techopedia.com/definition/25325/wireshark (Accessed 10th August, 2020) 22. Young, C. (2019). Introduce ZOMBIES POODLE and GOLDENDOODLE. Retrieved from https: (Accessed 10th August, 2020) //www.tripwire.com/zh-CN/state-of-security/vulnerability-management/zombie- 23. Zou Lin, Liao Ming, Yuan Cheng, Zhang Hai (2017). Use the expected packet size to detect low-speed DDoS attacks. Security and Communications Network, 2017 (1), 1-14. https://Doi:10.1155/2017/3691629.
M. Carey, D. DeWitt, and S. Vandenberg. Proceedings of the 13th Annual ACM Conference on
the Management of Data, page 413--423. Chicago, Illinois, (June 1988)
D. Chitty. GECCO '07: Proceedings of the 9th annual conference on
Genetic and evolutionary computation, 2, page 1566--1573. London, ACM Press, (7-11 July 2007)
M. Atzmueller, S. Beer, and F. Puppe. Proc. 22nd International Florida Artificial Intelligence Research Society Conference (FLAIRS), page 402--407. AAAI Press, (2009)
M. Atzmueller, S. Beer, and F. Puppe. Proc. 22nd International Florida Artificial Intelligence Research Society Conference (FLAIRS), accepted, page 372-377. AAAI Press, (2009)
M. Atzmueller, S. Beer, and F. Puppe. Proc. 22nd International Florida Artificial Intelligence Research Society Conference (FLAIRS), page 402--407. AAAI Press, (2009)
M. Atzmueller, S. Beer, and F. Puppe. Proc. 22nd International Florida Artificial Intelligence Research Society Conference (FLAIRS), accepted, page 372-377. AAAI Press, (2009)
D. Rosca, S. Greenspan, M. Feblowitz, and C. Wild. Requirements Engineering, 1997., Proceedings of the Third IEEE International Symposium on, (January 1997)