|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 686 occurrences of 433 keywords
|
|
|
Results
Found 3063 publication records. Showing 3062 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
28 | Luciano A. Digiampietri, Norton Trevisan Roman, Luis A. A. Meira, Jorge Jambeiro Filho, Cristiano D. Ferreira, Andreia A. Kondo, Everton Rufino Constantino, Rodrigo Carvalho Rezende, Bruno Cedraz Brandao, Helder S. Ribeiro, Pietro K. Carolino, Antonella Lanna, Jacques Wainer, Siome Goldenstein |
Uses of artificial intelligence in the Brazilian customs fraud detection system. |
DG.O |
2008 |
DBLP BibTeX RDF |
e-government, outlier detection, fraud detection |
28 | Andrew S. Fast, Lisa Friedland, Marc E. Maier, Brian J. Taylor, David D. Jensen, Henry G. Goldberg, John Komoroske |
Relational data pre-processing techniques for improved securities fraud detection. |
KDD |
2007 |
DBLP DOI BibTeX RDF |
relational probability trees, normalization, fraud detection, statistical relational learning, data pre-processing |
28 | Tammy Alexander |
Domain name registrars: are they part of the domain name fraud problem? |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
cyber squatting, domain name fraud, domain name registrars, typosquatting |
28 | Robert C. Newman |
Cybercrime, identity theft, and fraud: practicing safe internet - network security threats and vulnerabilities. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
internet fraud, identity theft, cybercrime |
28 | Jennifer Neville, Özgür Simsek, David D. Jensen, John Komoroske, Kelly Palmer, Henry G. Goldberg |
Using relational knowledge discovery to prevent securities fraud. |
KDD |
2005 |
DBLP DOI BibTeX RDF |
relational probability trees, fraud detection, statistical relational learning |
28 | Francesco Bonchi, Fosca Giannotti, Gianni Mainetto, Dino Pedreschi |
A Classification-Based Methodology for Planning Audit Strategies in Fraud Detection. |
KDD |
1999 |
DBLP DOI BibTeX RDF |
integration of querying and mining, logic-based database languages, data mining, classification, decision trees, knowledge discovery in databases, fraud detection |
28 | Saharon Rosset, Uzi Murad, Einat Neumann, Yizhak Idan, Gadi Pinkas |
Discovery of Fraud Rules for Telecommunications - Challenges and Solutions. |
KDD |
1999 |
DBLP DOI BibTeX RDF |
telecommunications, rule discovery, fraud |
26 | Roberto Daniele, Andrew J. Frew, Kate Varini, Asmik Magakian |
Affiliate Marketing in Travel and Tourism. |
ENTER |
2009 |
DBLP DOI BibTeX RDF |
affiliate marketing, merchant - affiliate networks distribution channels, electronic distribution - online travel, brand management, online fraud |
26 | Simon Attfield, Ann Blandford |
Improving the Cost Structure of Sensemaking Tasks: Analysing User Concepts to Inform Information System Design. |
INTERACT (1) |
2009 |
DBLP DOI BibTeX RDF |
fraud investigations, conceptual design, Sensemaking |
26 | Yanlin Peng, Linfeng Zhang, J. Morris Chang, Yong Guan |
An Effective Method for Combating Malicious Scripts Clickbots. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
Online Advertising Networks, Network Forensics, Attack Detection, Click Fraud |
26 | Linda Dailey Paulson |
News Briefs. |
Computer |
2007 |
DBLP DOI BibTeX RDF |
silicon clock, computer technology, digital camera, click fraud |
26 | Neel Sundaresan |
Online trust and reputation systems. |
EC |
2007 |
DBLP DOI BibTeX RDF |
trust, electronic commerce, feedback, reputation, fraud detection |
26 | Kenji Yamanishi, Jun'ichi Takeuchi, Graham J. Williams, Peter Milne |
On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms. |
Data Min. Knowl. Discov. |
2004 |
DBLP DOI BibTeX RDF |
intrusion detection, anomaly detection, EM algorithm, outlier detection, fraud detection, finite mixture model |
26 | Mark F. Vilardo |
Online Impersonation in Securities Scams. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
SEC, Securities and Exchange Commission, digital identity, fraud, impersonation |
26 | Tao Wan 0004, Evangelos Kranakis, Paul C. van Oorschot |
S-RIP: A Secure Distance Vector Routing Protocol. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
Distance Fraud, Security Analysis, Routing Security, Distance Vector |
26 | Steve Donoho |
Early detection of insider trading in option markets. |
KDD |
2004 |
DBLP DOI BibTeX RDF |
insider trading, data mining, fraud detection, behavior detection |
26 | Bill McCarty |
Automated Identity Theft. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
Internet Relay Chat, credit-card fraud, identity theft, honeynets, honeynets, IRC |
26 | Cem Kaner |
Liability for defective documentation. |
SIGDOC |
2003 |
DBLP DOI BibTeX RDF |
UCC, UCITA, deceptive practices, user manual, warranty, contract, fraud |
26 | Ammar Alkassar, Christian Stüble, Ahmad-Reza Sadeghi |
Secure object identification: or: solving the Chess Grandmaster Problem. |
NSPW |
2003 |
DBLP DOI BibTeX RDF |
Chessmaster Problem, fake equipment, mafia fraud, identification |
26 | Ross J. Anderson, S. Johann Bezuidenhoudt |
On the Reliability of Electronic Payment Systems. |
IEEE Trans. Software Eng. |
1996 |
DBLP DOI BibTeX RDF |
prepayment, credit control, security, Reliability, cryptography, robustness, robustness, key management, revocation, fraud, metering |
26 | Naftaly H. Minsky |
Independent On-Line Monitoring of Evolving Systems. |
ICSE |
1996 |
DBLP BibTeX RDF |
fraud prevention, independent on-line monitoring, irregularity detection, law-governed architecture, software maintenance, sensors, system monitoring, systems software, evolving software systems |
23 | Lina Ni, Jufeng Li, Huixin Xu, Xiangbo Wang, Jinquan Zhang |
Fraud Feature Boosting Mechanism and Spiral Oversampling Balancing Technique for Credit Card Fraud Detection. |
IEEE Trans. Comput. Soc. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Jinghui Zhang, Zhengjia Xu, Dingyang Lv, Zhan Shi, Dian Shen, Jiahui Jin, Fang Dong 0001 |
DiG-In-GNN: Discriminative Feature Guided GNN-Based Fraud Detector against Inconsistencies in Multi-Relation Fraud Graph. |
AAAI |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Farhad Alam, Shariq Ahmad |
Intelligent Fraud Detection Framework for PFMS Using HGRO Feature Selection and OC-LSTM Fraud Detection Technique. |
SN Comput. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Jinzhang Hu, Ruimin Hu, Zheng Wang 0007, Dengshi Li, Junhang Wu, Lingfei Ren, Yilong Zang, Zijun Huang, Mei Wang |
Collaborative Fraud Detection: How Collaboration Impacts Fraud Detection. |
ACM Multimedia |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Michaela Karin Trierweiler, Barbara Krumay |
Managing Cybersecurity and Other Fraud Risks in Small and Medium Enterprises - A Framework to Build a Fraud Management Program in Times of Digitalization. |
Wirtschaftsinformatik |
2023 |
DBLP BibTeX RDF |
|
23 | Randi Jiang |
Exploring Employees' Computer Fraud Behaviors using the Fraud Triangle Theory. |
Pac. Asia J. Assoc. Inf. Syst. |
2022 |
DBLP BibTeX RDF |
|
23 | Jie Li 0061, Qiaoling Lan, Enya Zhu, Yong Xu, Dan Zhu |
A Study of Health Insurance Fraud in China and Recommendations for Fraud Detection and Prevention. |
J. Organ. End User Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Shadi Sadeghpour, Natalija Vlajic |
Ads and Fraud: A Comprehensive Survey of Fraud in Online Advertising. |
J. Cybersecur. Priv. |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Marco Sánchez-Aguayo, Luis Urquiza-Aguiar, José Estrada-Jiménez |
Fraud Detection Using the Fraud Triangle Theory and Data Mining Techniques: A Literature Review. |
Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Zain ul Abi Din, Hari Venugopalan, Henry Lin, Adam Wushensky, Steven Liu, Samuel T. King |
Doing good by fighting fraud: Ethical anti-fraud systems for mobile payments. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
23 | Shali Liu |
Analysis of Accounting Fraud in Enterprises Based on Game Theory - - Take the Case of Geeya Technology Company Limited Fraud as an Example. |
IPEC |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Zain ul Abi Din, Hari Venugopalan, Henry Lin, Adam Wushensky, Steven Liu, Samuel T. King |
Doing good by fighting fraud: Ethical anti-fraud systems for mobile payments. |
SP |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Richard A. Bauder, Taghi M. Khoshgoftaar |
A study on rare fraud predictions with big Medicare claims fraud data. |
Intell. Data Anal. |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Andrew J. Harrison 0001, William N. Dilla, Brian E. Mennecke |
Relationships within the Fraud Diamond: The Decision Processes That Influence Fraudulent Intentions in Online Consumer Fraud. |
J. Inf. Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Kiran Sharma |
Patterns of retractions from 1981-2020 : Does a fraud lead to another fraud? |
CoRR |
2020 |
DBLP BibTeX RDF |
|
23 | Cyril Onwubiko |
Fraud matrix: A morphological and analysis-based classification and taxonomy of fraud. |
Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Abbas Bagherian Kasgari, Mohammad Taghi Taghavifard, Saeideh Golchin Kharazi |
Price manipulation fraud detection by Intelligent Visual Fraud surveillance system. |
CoDIT |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Ahmed Seid Yesuf |
Fraud prevention and security: a model-driven and pattern-based risk analysis framework of e-service fraud. |
|
2019 |
RDF |
|
23 | Galina Baader |
Aufdeckung von Fraud im Einkaufsprozess durch die Kombination des Red Flag Ansatzes mit Process Mining (Identification of Fraud in the Purchase-to-Pay Process by combining the Red Flag Approach with Process Mining) (PDF / PS) |
|
2019 |
RDF |
|
23 | Juan Luis López Herrera, Homero Vladimir Ríos-Figueroa, Ericka-Janet Rechy-Ramírez |
Deep fraud. A fraud intention recognition framework in public transport context using a deep-learning approach. |
CONIELECOMP |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Paul Sarda, Mohammad Jabed Morshed Chowdhury, Alan Colman, Muhammad Ashad Kabir, Jun Han 0004 |
Blockchain for Fraud Prevention: A Work-History Fraud Prevention System. |
TrustCom/BigDataSE |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Véronique Van Vlasselaer, Tina Eliassi-Rad, Leman Akoglu, Monique Snoeck, Bart Baesens |
GOTCHA! Network-Based Fraud Detection for Social Security Fraud. |
Manag. Sci. |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Shaio Yan Huang, Chi-Chen Lin, An-An Chiu, David C. Yen |
Fraud detection using fraud triangle risk factors. |
Inf. Syst. Frontiers |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Ahmed Seid Yesuf, Jetzabel Serna-Olvera, Kai Rannenberg |
Using Fraud Patterns for Fraud Risk Assessment of E-services. |
SEC |
2017 |
DBLP DOI BibTeX RDF |
|
23 | John K. C. Kingston |
Representing, reasoning and predicting fraud using fraud plans. |
RCIS |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Gert Jan van Hardeveld, Craig Webber, Kieron O'Hara |
Discovering credit card fraud methods in online tutorials. |
OnSt@WebSci |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Hoda Jannati |
Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems. |
Int. J. Crit. Infrastructure Prot. |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Rajiv Arora, Daya Gupta, Payal Pahwa |
Fraud Detection Life Cycle Model: A Systematic Fuzzy Approach to Fraud Management. |
Int. J. Comput. Intell. Appl. |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Selmer Bringsjord, Alexander Bringsjord |
Can Accomplices to Fraud Will Themselves to Innocence, and Thereby Dodge Counter-Fraud Machines? |
AAAI Fall Symposia |
2015 |
DBLP BibTeX RDF |
|
23 | Edgar Alonso Lopez-Rojas, Stefan Axelsson |
Using the RetSim Fraud Simulation Tool to Set Thresholds for Triage of Retail Fraud. |
NordSec |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Clive Blackwell |
Using Fraud Trees to Analyze Internet Credit Card Fraud. |
IFIP Int. Conf. Digital Forensics |
2014 |
DBLP DOI BibTeX RDF |
|
23 | William N. Dilla |
Can Avatars Fight Fraud? How Virtual Business Environments Facilitate Learning More About Fraud Investigation and Prevention. |
J. Inf. Syst. |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Matthias Lang, Achim Wambach |
The fog of fraud - Mitigating fraud by strategic ambiguity. |
Games Econ. Behav. |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Abdullah A. I. Alnajem, Ning Zhang 0001 |
A Copula-Based Fraud Detection (CFD) Method for Detecting Evasive Fraud Patterns in a Corporate Mobile Banking Context. |
ICITCS |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Brendan Kitts, Jing Ying Zhang, Gang Wu, Raj Mahato |
Click fraud botnet detection by calculating mix adjusted traffic value: A method for de-cloaking click fraud attacks that is resistant to spoofing. |
ISI |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Thomas C. Ormerod, Linden J. Ball, Nicola J. Morley |
Informing the development of a fraud prevention toolset through a situated analysis of fraud investigation expertise. |
Behav. Inf. Technol. |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Stefan Hoyer, Halyna Zakhariya, Thorben Sandner, Michael H. Breitner |
Fraud Prediction and the Human Factor: An Approach to Include Human Behavior in an Automated Fraud Audit. |
HICSS |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Vikas Jain, Vishal Midha, Animesh Animesh |
Whose Click Fraud Data Do You Trust? Effect Of Click Fraud On Advertiser's Trust And Sponsored Search Advertising Decisions. |
ECIS |
2010 |
DBLP BibTeX RDF |
|
23 | Naeimeh Laleh, Mohammad Abdollahi Azgomi |
An Overview of a Hybrid Fraud Scoring and Spike Detection Technique for Fraud Detection in Streaming Data. |
ICISTM |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Jan Grijpink |
Biometrics and identity fraud protection: Two barriers to realizing the benefits of biometrics - A chain perspective on biometrics, and identity fraud - Part II. |
Comput. Law Secur. Rev. |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Hua Zhang, Xiangming Wen, Peizhou He, Wei Zheng 0001 |
Dealing with Telephone Fraud Using CAPTCHA. |
ACIS-ICIS |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Abhinav Srivastava, Amlan Kundu 0002, Shamik Sural, Arun K. Majumdar |
Credit Card Fraud Detection Using Hidden Markov Model. |
IEEE Trans. Dependable Secur. Comput. |
2008 |
DBLP DOI BibTeX RDF |
Electronic Commerce, Security and Protection |
21 | Manoel Fernando Alonso Gadi, Xidi Wang, Alair Pereira do Lago |
Comparison with Parametric Optimization in Credit Card Fraud Detection. |
ICMLA |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Anirban Banerjee, Dhiman Barman, Michalis Faloutsos, Laxmi N. Bhuyan |
Cyber-Fraud is One Typo Away. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Deholo Nali, Paul C. van Oorschot |
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Gang Zhao 0001, Robert Meersman |
Towards a Topical Ontology of Fraud. |
ASWC |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Constantinos S. Hilas, John N. Sahalos |
Testing the Fraud Detection Ability of Different User Profiles by Means of FF-NN Classifiers. |
ICANN (2) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Tho Manh Nguyen, Josef Schiefer, A Min Tjoa |
Sense & response service architecture (SARESA): an approach towards a real-time business intelligence solution and its use for a fraud detection application. |
DOLAP |
2005 |
DBLP DOI BibTeX RDF |
event sense & response, real-time business intelligence, real-time data warehousing and OLAP, data analysis |
21 | Lae-Jeong Park |
Learning of Neural Networks for Fraud Detection Based on a Partial Area Under Curve. |
ISNN (2) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Rong-Chang Chen, Tung-Shou Chen, Yuer Chien, Yuru Yang |
Novel Questionnaire-Responded Transaction Approach with SVM for Credit Card Fraud Detection. |
ISNN (2) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Jesús M. Pérez, Javier Muguerza, Olatz Arbelaitz, Ibai Gurrutxaga, José Ignacio Martín |
Consolidated Tree Classifier Learning in a Car Insurance Fraud Detection Domain with Class Imbalance. |
ICAPR (1) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Ian MacInnes, Damani Musgrave, Jason Laska |
Electronic Commerce Fraud: Towards an Understanding of the Phenomenon. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
21 | J. R. Filho, Edgar M. Gontijo, Antonio C. Delaiba, Evandro Mazina, José Edison Cabral, João O. P. Pinto |
Fraud identification in electricity company customers using decision tree. |
SMC (4) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | K. Suzanne Barber, Karen Fullam, Joonoo Kim |
Challenges for Trust, Fraud and Deception Research in Multi-agent Systems. |
Trust, Reputation, and Security |
2002 |
DBLP DOI BibTeX RDF |
|
21 | Francesco Bonchi, Fosca Giannotti, Gianni Mainetto, Dino Pedreschi |
Using Data Mining Techniques in Fiscal Fraud Detection. |
DaWaK |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Ruth Murbach, Éva Nonn |
Similarity in Harder Cases: Sentencing for Fraud. |
ICAIL |
1993 |
DBLP DOI BibTeX RDF |
|
19 | Yunsang Oh, Takashi Obi, Joong Sun Lee, Hiroyuki Suzuki, Nagaaki Ohyama |
Empirical analysis of internet identity misuse: case study of south Korean real name system. |
Digital Identity Management |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Mao Lin Huang, Jie Liang 0004, Quang Vinh Nguyen |
A Visualization Approach for Frauds Detection in Financial Market. |
IV |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Gaston L'Huillier, Richard Weber 0002, Nicolás Figueroa |
Online phishing classification using adversarial data mining and signaling games. |
KDD Workshop on CyberSecurity and Intelligence Informatics |
2009 |
DBLP DOI BibTeX RDF |
adversarial classification, games of incomplete information, spam and phishing detection, data mining, game theory, email filtering |
19 | Luís Torgo, Welma Pereira, Carlos Soares |
Detecting Errors in Foreign Trade Transactions: Dealing with Insufficient Data. |
EPIA |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Dave Singelée, Bart Preneel |
Key Establishment Using Secure Distance Bounding Protocols. |
MobiQuitous |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Dave Singelée, Bart Preneel |
Distance Bounding in Noisy Environments. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
wireless sensor networks, distance bounding, secure localization, entity authentication |
19 | Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srinivasan 0002 |
A new Dynamic Key Generation Scheme for Fraudulent Internet Payment Prevention. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Yeog Kim, Jewan Bang, Gu Taek Lee, Sangjin Lee 0002, Jongin Lim 0001 |
A Field Guide to Hidden Accounting Information Detection. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Masao Kobayashi, Takayuki Ito 0001 |
A Transactional Relationship Visualization System in Internet Auctions. |
IAT |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Yungchang Ku, Ying-Chieh Chen, Kuo-Ching Wu, Chaochang Chiu |
An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
online gaming crime, virtual property, MMORPG, cybercrime |
19 | Janice Warner, Vijayalakshmi Atluri |
Inter-instance authorization constraints for secure workflow management. |
SACMAT |
2006 |
DBLP DOI BibTeX RDF |
security, work flow, authorization constraints |
19 | Sotiris B. Kotsiantis, Euaggelos Koumanakos, Dimitris Tzelepis, Vasilis Tampakas |
Predicting Fraudulent Financial Statements with Machine Learning Techniques. |
SETN |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Yanbin Gao, Gang Zhao 0001 |
Knowledge-Based Information Extraction: A Case Study of Recognizing Emails of Nigerian Frauds. |
NLDB |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou, Moti Yung |
Electronic National Lotteries. |
Financial Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Christer Magnusson, Louise Yngström |
Method for Insuring IT Risks. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
IT insurance method, IT insurance policies, estimated maximum IT loss, commercial and industrial security, risk management, security policies |
19 | Alea M. Fairchild, Bruno de Vuyst |
Hot Spot Implosion: The Decline and Fall of Flanders Language Valley. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Tao Wan 0004, Evangelos Kranakis, Paul C. van Oorschot |
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV). |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
Security Analysis, Wireless Security, Routing Security, DSDV |
19 | Koutarou Suzuki, Makoto Yokoo |
Secure Generalized Vickrey Auction Using Homomorphic Encryption. |
Financial Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Generalized Vickrey Auction, game-theory, mechanism design, combinatorial auction, homomorphic encryption |
19 | Bernd Lamparter, Dirk Westhoff |
A Low-Cost Packet Originator Verification for Metering at Access-Routers. |
Networked Group Communication |
2003 |
DBLP DOI BibTeX RDF |
Packet originator verification, wireless last hop, charging support, unpredictable bits |
19 | Yanjiang Yang, Feng Bao 0001, Robert H. Deng |
Security Analysis and Improvement of the Global Key Recovery System. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
19 | S. Jantarang, Panan Potipantong, Apisak Worapishet |
A low cost real-time intelligent taximeter sensor. |
APCCAS (1) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Richard H. Stern |
Another Update on Standardization Skullduggery. |
IEEE Micro |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Richard H. Stern |
More standardization skullduggery. |
IEEE Micro |
2001 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 3062 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|