Detection and Response of Identity Theft within a Company Utilizing Location Information
暂无分享,去创建一个
[1] Joseph Kim,et al. A study on the security policy improvement using the big data , 2013, Inscrypt 2013.
[2] Elizabeth V. Mulig,et al. PHISHING, PHARMING AND IDENTITY THEFT , 2007 .
[3] Lynn Langton,et al. Victims of Identity Theft, 2012 , 2013 .
[4] Matthias Kabatnik,et al. Towards Privacy Support in a Global Location Service , 2001 .
[5] Anazida Zainal,et al. Fraud detection system: A survey , 2016, J. Netw. Comput. Appl..
[6] Dorothy E. Denning,et al. Location-based authentication: Grounding cyberspace for better security , 1996 .
[7] Paul C. van Oorschot,et al. Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling , 2005, Financial Cryptography.