A Study of e-Commerce Transaction Risk Assessment Model in Mobile Internet
暂无分享,去创建一个
[1] Glenn Shafer,et al. A Mathematical Theory of Evidence turns 40 , 2016, Int. J. Approx. Reason..
[2] H. Joseph Wen,et al. Consumer-based m-commerce: exploring consumer perception of mobile applications , 2005, Comput. Stand. Interfaces.
[3] Jun-Ho Oh,et al. Design and Analysis of Rotary MR Damper Using Permanent Magnet: 2nd IFAC Conference on Mechatronic Systems, Berkeley, CA, USA, 9-11 December , 2002 .
[4] Li Mo,et al. Short-term hydro-thermal-wind complementary scheduling considering uncertainty of wind power using an enhanced multi-objective bee colony optimization algorithm , 2016 .
[5] A. J. Guimarães Rodrigues,et al. Occurrence of pharmaceuticals in a water supply system and related human health risk assessment. , 2015, Water research.
[6] Jyrki Wallenius,et al. Borrower Decision Aid for people-to-people lending , 2010, Decis. Support Syst..
[7] Tony W. York,et al. Electronic Security System Integration , 2015 .
[8] Nizar Souiden,et al. The interplay of counter-conformity motivation, social influence, and trust in customers' intention to adopt Internet banking services: The case of an emerging country , 2016 .
[9] Rachid Belaroussi,et al. Multi-Hypotheses Tracking using the Dempster-Shafer Theory, application to ambiguous road context , 2016, Inf. Fusion.
[10] Comparative Analysis of Theoretical Aspects in Credit Risk Models , 2015 .
[11] Makoto Nakayama,et al. Exploratory Study on the Stability of Consumer Rationality in Judging Online Reviews , 2017, J. Electron. Commer. Organ..
[12] Lin Guan,et al. Design and Implementation of an E-Commerce Platform-SIMEC , 2004, J. Electron. Commer. Organ..
[13] Waldir Moreira,et al. Extending cloud-based applications with mobile opportunistic networks: Security issues and privacy challenges , 2016 .
[14] Pankaj Gupta,et al. Intuitionistic fuzzy multi-attribute group decision-making with an application to plant location selection based on a new extended VIKOR method , 2016, Inf. Sci..
[15] Hsiu-Fen Lin,et al. Determining the relative importance of mobile banking quality factors , 2013, Comput. Stand. Interfaces.
[16] Henri Pierreval,et al. Solving a Hoist Scheduling Problem as a Sequencing Problem , 1997 .
[17] Aduwati Sali,et al. Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS) , 2017, Comput. Commun..