Developing a Conceptual Framework for Identity Fraud Profiling
暂无分享,去创建一个
[1] Franco Taroni,et al. Statistics and the Evaluation of Evidence for Forensic Scientists , 2004 .
[2] Mariano-Florentino Cuéllar. The Tenuous Relationship Between the Fight Against Money Laundering and the Disruption of Criminal Finance , 2002 .
[3] Homa Atabakhsh,et al. Criminal Identity Deception and Deception Detection in Law Enforcement , 2004 .
[4] Bill Ong Hing. Misusing Immigration Policies in the Name of Homeland Security , 2006 .
[5] Kenneth J. Stevens,et al. Investigating the role of Profiling in the Detection and Prevention of Identity Fraud , 2004 .
[6] Gary T. Marx,et al. Routinizing the Discovery of Secrets , 1984 .
[7] David V. Canter,et al. Mapping Murder: The Secrets of Geographical Profiling , 2003 .
[8] Edward M. Miller. Race, socioeconomic variables, and intelligence : a review and extension of The Bell Curve , 1995 .
[9] Prashant J. Shenoy,et al. Resource overbooking and application profiling in shared hosting platforms , 2002, OSDI '02.
[10] Gediminas Adomavicius,et al. User profiling in personalization applications through rule discovery and validation , 1999, KDD '99.
[11] Detmar W. Straub,et al. Discovering and Disciplining Computer Abuse in Organizations: A Field Study , 1990, MIS Q..
[12] R. Clarke. A Hidden Challenge to the Regulation of Data Surveillance , 2003 .
[13] Julie A. Dickerson,et al. Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).
[14] Candice Batton,et al. Theoretical and Methodological Issues in Racial Profiling Research , 2004 .
[15] Timothy Roscoe,et al. Resource overbooking and application profiling in shared hosting platforms , 2002, OSDI '02.
[16] Patrick E. Cook,et al. Criminal Profiling , 1999 .
[17] Bruce D. Sales,et al. Criminal Profiling: Developing an Effective Science and Practice , 2006 .
[18] Xiangliang Zhang,et al. Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data , 2006, Comput. Secur..
[19] JAMES DAVID BALLARD,et al. Technological Facilitation of Terrorism , 2002 .
[20] Klaus-Peter Wiedmann,et al. Customer profiling in e-commerce: Methodological aspects and challenges , 2002 .
[21] Tom Fawcett,et al. Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.
[22] Stuart Loh,et al. Continuous Assurance of E-Business Transactions For Fraud Detection , 2002 .
[23] A. Strauss,et al. Grounded theory methodology: An overview. , 1994 .
[24] Gary R. Gordon,et al. The Ongoing Critical Threats Created by Identity Fraud: An Action Plan , 2006 .
[25] Rodger Jamieson,et al. An Identity Fraud Model Categorising Perpetrators, Channels, Methods of Attack, Victims and Organisational Impacts , 2007, PACIS.
[26] Joseph A. Davis. Criminal Personality Profiling and Crime Scene Assessment , 1999 .
[27] Nathan Gregory,et al. Offender profiling: A review of the literature. , 2005 .
[28] Steven A. Egger. Psychological Profiling , 1999 .
[29] Charles L. Becton. The Drug Courier Profile: All Seems Infected That Th' Infected Spy, as All Looks Yellow to the Jaundic'd Eye , 1987 .