Search results

1 – 2 of 2
Article
Publication date: 23 January 2009

Mahamadd Marrdonny and Mohammad Mobed

The purpose of this paper is to propose a new guidance algorithm for launching a satellite using an expendable rocket from an equatorial site to an equatorial low‐Earth orbit.

Abstract

Purpose

The purpose of this paper is to propose a new guidance algorithm for launching a satellite using an expendable rocket from an equatorial site to an equatorial low‐Earth orbit.

Design/methodology/approach

Guidance during endoatmospheric portion is based on a nominal trajectory computed prior to take‐off. A set of updating computations begins anew at the time instant tg of transition from endoatmosphere to exoatmosphere. The updating computations determine a guidance trajectory and an associated control law for the remainder of path by taking into account the rocket state at time tg. Thus, the overall guidance involves both initial and midcourse operations, and it has both open‐ and closed‐loop aspects.

Findings

Viability and performance in terms of speed, precision, and effectiveness of the proposed scheme is demonstrated through three‐dimensional simulations and comparisons to other methods.

Originality/value

The updating computations and the fashion in which they are incorporated into the entire guidance process constitute the novel features of the proposed algorithm.

Details

Aircraft Engineering and Aerospace Technology, vol. 81 no. 2
Type: Research Article
ISSN: 0002-2667

Keywords

Article
Publication date: 16 August 2022

Nisha TN and Mugdha Shailendra Kulkarni

The purpose of the study is to confirm the fact that in informations security, the human factor was considered as a key carrier of the majority of attacks that an information…

Abstract

Purpose

The purpose of the study is to confirm the fact that in informations security, the human factor was considered as a key carrier of the majority of attacks that an information system faces. Banking and other financial services are always top among the most attractive targets for cyber attackers. Blind phishing or spear phishing is still one of the major contributors to all malicious activities in the e-banking sector. All the counter mechanisms, therefore, revolve around the concept of how security-aware the customers are. To fool these mechanisms, attacks are becoming smarter and are searching for methods where the human involvement is diminishing to zero. Zero click attacks are one big leap that attackers are taking that removes the requirement of human involvement in initiating attacks and are moving toward an era of unassisted attacks. Even though the standard procedure and protocols are built into the banking system, they fail to detect this attack resulting in significant losses.

Design/methodology/approach

This paper follows a conceptual review of the upcoming concept in security and its implication in e-banking sector. The methodology adopted in this paper uses review papers, articles and white papers to conclude a theoretical model. A detailed analysis of unassisted attacks is considered from 2010 onwards till 2022.

Findings

This research deliberates on the methodologies of zero click attacks and gives a detailed analysis of attack vectors and their exploits. This research also identifies the likely attacks on e-banking that these vulnerabilities can trigger.

Originality/value

The key contribution is toward the early detection of zero click attacks, suggesting countermeasure, reducing the likelihood of these attacks and the financial impact.

Details

Journal of Financial Crime, vol. 30 no. 5
Type: Research Article
ISSN: 1359-0790

Keywords

1 – 2 of 2