Craig Pollard's research while affiliated with Siemens and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publication (1)
The importance of IT network security in combating telephony fraud is discussed. The PBX is among the most susceptible areas to telecommunications fraud. When a PBX is linked to an organization's IT network, a poorly protected maintenance port can offer hackers an open and undefended back door into such critical assets as customer databases and bus...
Citations
... 2-Subscribers' fraud: it is a category where the fraudsters gain control over the subscribers' account to make free phone calls [9]. 3-Conducted over the Telephone: this category covers all general types of known fraud schemes [10]. ...