Fraud Prevention Within the Brazilian Governmental Public-Key Infrastructure
暂无分享,去创建一个
[1] Kate Smith-Miles,et al. On the communal analysis suspicion scoring for identity crime in streaming credit applications , 2009, Eur. J. Oper. Res..
[2] L. Dole,et al. Recognizing The Theft of Identity Using Data Mining , 2014 .
[3] Kate Smith-Miles,et al. A Comprehensive Survey of Data Mining-based Fraud Detection Research , 2010, ArXiv.
[4] Allan R. Wilks,et al. Fraud Detection in Telecommunications: History and Lessons Learned , 2010, Technometrics.
[5] B. K. Padhi,et al. Anonymized Credit Card Transaction Using Machine Learning Techniques , 2020 .
[6] Russell Housley,et al. Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure , 2001 .
[7] J. Stuart Aitken,et al. Multiple algorithms for fraud detection , 2000, Knowl. Based Syst..
[8] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[9] Sharmistha Dutta,et al. Identity Crime Detection Using Data Mining , 2017, 2017 3rd International Conference on Computational Intelligence and Networks (CINE).
[10] João Paulo Papa,et al. Internet of Things: A survey on machine learning-based intrusion detection approaches , 2019, Comput. Networks.
[11] Kai Chen,et al. Detecting telecommunication fraud by understanding the contents of a call , 2018, Cybersecur..
[12] N. Archer,et al. Defining Identity Theft , 2007, Eighth World Congress on the Management of eBusiness (WCMeB 2007).
[13] Samuel A. Oluwadare,et al. Credit card fraud detection using machine learning techniques: A comparative analysis , 2017, 2017 International Conference on Computing Networking and Informatics (ICCNI).
[14] Anuruddha Thennakoon,et al. Real-time Credit Card Fraud Detection Using Machine Learning , 2019, 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence).
[15] David J. Hand,et al. Statistical fraud detection: A review , 2002 .
[16] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[17] Kate Smith-Miles,et al. Resilient Identity Crime Detection , 2012, IEEE Transactions on Knowledge and Data Engineering.
[18] Issa Traoré,et al. Unsupervised Identity Application Fraud Detection using Rule-based Decision Tree , 2010, SEDE.