Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns
暂无分享,去创建一个
Luigi Coppolino | Salvatore D'Antonio | Ferdinando Campanile | Gaetano Papale | Luigi Sgaglione | Luigi Romano | L. Romano | L. Coppolino | S. D'Antonio | Luigi Sgaglione | F. Campanile | Gaetano Papale
[1] Luigi Coppolino,et al. Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services , 2015, J. Ambient Intell. Humaniz. Comput..
[2] Luigi Coppolino,et al. Effective Visualization of a Big Data Banking Application , 2015 .
[3] Luigi Coppolino,et al. Runtime Model Checking for SLA Compliance Monitoring and QoS Prediction , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[4] Luigi Coppolino,et al. Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study , 2014, IDC.
[5] Mutiara P. C. Pardede,et al. E-Fraud, Taxonomy on Methods of Attacks, Prevention, Detection, Investigation, Prosecution and Restitution , 2013 .
[6] Giuseppe Cicotti,et al. How to Monitor QoS in Cloud Infrastructures: The QoSMONaaS Approach , 2012, IDC.
[7] Massimiliano Rak,et al. Intrusion Tolerance in Cloud Applications: The mOSAIC Approach , 2012, 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems.
[8] Massimiliano Rak,et al. Intrusion Tolerance as a Service - A SLA-based Solution , 2012, CLOSER.
[9] Ekrem Duman,et al. Detecting credit card fraud by genetic algorithm and scatter search , 2011, Expert Syst. Appl..
[10] Luigi Coppolino,et al. QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach , 2011, Euro-Par Workshops.
[11] Andrea Bondavalli,et al. An event correlation approach for fault diagnosis in SCADA infrastructures , 2011, EWDC '11.
[12] S. Benson Edwin Raj,et al. Analysis on credit card fraud detection methods , 2011, 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET).
[13] R. Patidar,et al. Credit Card Fraud Detection Using Neural Network , 2011 .
[14] Luigi Coppolino,et al. An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies , 2010, 2010 5th International Conference on Critical Infrastructure (CRIS).
[15] Kristin M. Finklea. Identity Theft: Trends and Issues , 2010 .
[16] Steve Goswell. ISO 20022: The implications for payments processing and requirements for its successful use , 2006 .
[17] Kim Michelle Lersch,et al. Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics , 2005 .
[18] Paola Batistoni,et al. International Conference , 2001 .