Verhaltensanalyse zur Erkennung von Missbrauch mobiler Geldtransferdienste
暂无分享,去创建一个
[1] A. W. Scheer,et al. Veröffentlichungen des Instituts für Wirtschaftsinformatik (IWi), Universität des Saarlandes , 1992 .
[2] JhaSanjeev,et al. Data mining for credit card fraud , 2011 .
[3] Marco Montali,et al. Monitoring Business Constraints with Linear Temporal Logic: An Approach Based on Colored Automata , 2011, BPM.
[4] Tom Fawcett,et al. ROC Graphs: Notes and Practical Considerations for Researchers , 2007 .
[5] M. Tahar Kechadi,et al. A Data Mining-Based Solution for Detecting Suspicious Money Laundering Cases in an Investment Bank , 2010, 2010 Second International Conference on Advances in Databases, Knowledge, and Data Applications.
[6] Rafal Drezewski,et al. System supporting money laundering detection , 2012, Digit. Investig..
[7] Roland Rieke,et al. Predictive Security Analysis for Event-Driven Processes , 2010, MMM-ACNS.
[8] Maria Zhdanova,et al. Monitoring Security Compliance of Critical Processes , 2014, 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing.
[9] Longbing Cao,et al. Effective detection of sophisticated online banking fraud on extremely imbalanced data , 2012, World Wide Web.
[10] Maria Zhdanova,et al. Fraud Detection in Mobile Payments Utilizing Process Behavior Analysis , 2013, 2013 International Conference on Availability, Reliability and Security.
[11] Robert L. Grossman,et al. Detecting changes in large data sets of payment card data: a case study , 2007, KDD '07.
[12] Wil M. P. van der Aalst,et al. Conformance checking of processes based on monitoring real behavior , 2008, Inf. Syst..
[13] Hussein A. Abdou,et al. Credit card fraud and detection techniques : a review , 2009 .
[14] Ekkart Kindler,et al. The Petri Net Markup Language , 2003, Petri Net Technology for Communication-Based Systems.
[15] Luigi Coppolino,et al. Security and Reliability Requirements for Advanced Security Event Management , 2012, MMM-ACNS.
[16] Siddhartha Bhattacharyya,et al. Data mining for credit card fraud: A comparative study , 2011, Decis. Support Syst..
[17] W.M.P. van der Aalst,et al. Business Process Management: A Comprehensive Survey , 2013 .
[18] Baptiste Hemery,et al. Synthetic logs generator for fraud detection in mobile transfer services , 2013, 2013 International Conference on Collaboration Technologies and Systems (CTS).
[19] Roland Rieke,et al. Model-based Situational Security Analysis , 2011 .