|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 686 occurrences of 433 keywords
|
|
|
Results
Found 3063 publication records. Showing 3062 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
28 | Luciano A. Digiampietri, Norton Trevisan Roman, Luis A. A. Meira, Jorge Jambeiro Filho, Cristiano D. Ferreira, Andreia A. Kondo, Everton Rufino Constantino, Rodrigo Carvalho Rezende, Bruno Cedraz Brandao, Helder S. Ribeiro, Pietro K. Carolino, Antonella Lanna, Jacques Wainer, Siome Goldenstein |
Uses of artificial intelligence in the Brazilian customs fraud detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 9th Annual International Conference on Digital Government Research, Partnerships for Public Innovation, DG.O 2008, Montreal, Canada, May 18-21, 2008, pp. 181-187, 2008, Digital Government Research Center, 978-1-60558-099-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
e-government, outlier detection, fraud detection |
28 | Andrew S. Fast, Lisa Friedland, Marc E. Maier, Brian J. Taylor, David D. Jensen, Henry G. Goldberg, John Komoroske |
Relational data pre-processing techniques for improved securities fraud detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, California, USA, August 12-15, 2007, pp. 941-949, 2007, ACM, 978-1-59593-609-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
relational probability trees, normalization, fraud detection, statistical relational learning, data pre-processing |
28 | Tammy Alexander |
Domain name registrars: are they part of the domain name fraud problem? ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 113-117, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cyber squatting, domain name fraud, domain name registrars, typosquatting |
28 | Robert C. Newman |
Cybercrime, identity theft, and fraud: practicing safe internet - network security threats and vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 68-78, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
internet fraud, identity theft, cybercrime |
28 | Jennifer Neville, Özgür Simsek, David D. Jensen, John Komoroske, Kelly Palmer, Henry G. Goldberg |
Using relational knowledge discovery to prevent securities fraud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Chicago, Illinois, USA, August 21-24, 2005, pp. 449-458, 2005, ACM, 1-59593-135-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
relational probability trees, fraud detection, statistical relational learning |
28 | Francesco Bonchi, Fosca Giannotti, Gianni Mainetto, Dino Pedreschi |
A Classification-Based Methodology for Planning Audit Strategies in Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Diego, CA, USA, August 15-18, 1999, pp. 175-184, 1999, ACM, 1-58113-143-7. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
integration of querying and mining, logic-based database languages, data mining, classification, decision trees, knowledge discovery in databases, fraud detection |
28 | Saharon Rosset, Uzi Murad, Einat Neumann, Yizhak Idan, Gadi Pinkas |
Discovery of Fraud Rules for Telecommunications - Challenges and Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Diego, CA, USA, August 15-18, 1999, pp. 409-413, 1999, ACM, 1-58113-143-7. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
telecommunications, rule discovery, fraud |
26 | Roberto Daniele, Andrew J. Frew, Kate Varini, Asmik Magakian |
Affiliate Marketing in Travel and Tourism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ENTER ![In: Information and Communication Technologies in Tourism, ENTER 2009, Proceedings of the International Conference in Amsterdam, The Netherlands, 2009, pp. 343-354, 2009, Springer, 978-3-211-93970-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
affiliate marketing, merchant - affiliate networks distribution channels, electronic distribution - online travel, brand management, online fraud |
26 | Simon Attfield, Ann Blandford |
Improving the Cost Structure of Sensemaking Tasks: Analysing User Concepts to Inform Information System Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTERACT (1) ![In: Human-Computer Interaction - INTERACT 2009, 12th IFIP TC 13 International Conference, Uppsala, Sweden, August 24-28, 2009, Proceedings, Part I, pp. 532-545, 2009, Springer, 978-3-642-03654-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
fraud investigations, conceptual design, Sensemaking |
26 | Yanlin Peng, Linfeng Zhang, J. Morris Chang, Yong Guan |
An Effective Method for Combating Malicious Scripts Clickbots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 523-538, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Online Advertising Networks, Network Forensics, Attack Detection, Click Fraud |
26 | Linda Dailey Paulson |
News Briefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 40(3), pp. 20-22, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
silicon clock, computer technology, digital camera, click fraud |
26 | Neel Sundaresan |
Online trust and reputation systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings 8th ACM Conference on Electronic Commerce (EC-2007), San Diego, California, USA, June 11-15, 2007, pp. 366-367, 2007, ACM, 978-1-59593-653-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
trust, electronic commerce, feedback, reputation, fraud detection |
26 | Kenji Yamanishi, Jun'ichi Takeuchi, Graham J. Williams, Peter Milne |
On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Min. Knowl. Discov. ![In: Data Min. Knowl. Discov. 8(3), pp. 275-300, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
intrusion detection, anomaly detection, EM algorithm, outlier detection, fraud detection, finite mixture model |
26 | Mark F. Vilardo |
Online Impersonation in Securities Scams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(3), pp. 82-85, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
SEC, Securities and Exchange Commission, digital identity, fraud, impersonation |
26 | Tao Wan 0004, Evangelos Kranakis, Paul C. van Oorschot |
S-RIP: A Secure Distance Vector Routing Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 103-119, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Distance Fraud, Security Analysis, Routing Security, Distance Vector |
26 | Steve Donoho |
Early detection of insider trading in option markets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, Washington, USA, August 22-25, 2004, pp. 420-429, 2004, ACM, 1-58113-888-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
insider trading, data mining, fraud detection, behavior detection |
26 | Bill McCarty |
Automated Identity Theft. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(5), pp. 89-92, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Internet Relay Chat, credit-card fraud, identity theft, honeynets, honeynets, IRC |
26 | Cem Kaner |
Liability for defective documentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGDOC ![In: Proceedings of the 21st annual international conference on Documentation, SIGDOC 2003, San Francisco, CA, USA, October 12-15, 2003, pp. 192-197, 2003, ACM, 1-58113-696-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
UCC, UCITA, deceptive practices, user manual, warranty, contract, fraud |
26 | Ammar Alkassar, Christian Stüble, Ahmad-Reza Sadeghi |
Secure object identification: or: solving the Chess Grandmaster Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the New Security Paradigms Workshop 2003, August 18-21, 2002, Ascona, Switzerland, pp. 77-85, 2003, ACM, 1-58113-880-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Chessmaster Problem, fake equipment, mafia fraud, identification |
26 | Ross J. Anderson, S. Johann Bezuidenhoudt |
On the Reliability of Electronic Payment Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 22(5), pp. 294-301, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
prepayment, credit control, security, Reliability, cryptography, robustness, robustness, key management, revocation, fraud, metering |
26 | Naftaly H. Minsky |
Independent On-Line Monitoring of Evolving Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 18th International Conference on Software Engineering, Berlin, Germany, March 25-29, 1996, Proceedings., pp. 134-143, 1996, IEEE Computer Society, 0-8186-7246-3. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
fraud prevention, independent on-line monitoring, irregularity detection, law-governed architecture, software maintenance, sensors, system monitoring, systems software, evolving software systems |
23 | Lina Ni, Jufeng Li, Huixin Xu, Xiangbo Wang, Jinquan Zhang |
Fraud Feature Boosting Mechanism and Spiral Oversampling Balancing Technique for Credit Card Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Soc. Syst. ![In: IEEE Trans. Comput. Soc. Syst. 11(2), pp. 1615-1630, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Jinghui Zhang, Zhengjia Xu, Dingyang Lv, Zhan Shi, Dian Shen, Jiahui Jin, Fang Dong 0001 |
DiG-In-GNN: Discriminative Feature Guided GNN-Based Fraud Detector against Inconsistencies in Multi-Relation Fraud Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: Thirty-Eighth AAAI Conference on Artificial Intelligence, AAAI 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, IAAI 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2014, February 20-27, 2024, Vancouver, Canada, pp. 9323-9331, 2024, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Farhad Alam, Shariq Ahmad |
Intelligent Fraud Detection Framework for PFMS Using HGRO Feature Selection and OC-LSTM Fraud Detection Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 4(4), pp. 400, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Jinzhang Hu, Ruimin Hu, Zheng Wang 0007, Dengshi Li, Junhang Wu, Lingfei Ren, Yilong Zang, Zijun Huang, Mei Wang |
Collaborative Fraud Detection: How Collaboration Impacts Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 31st ACM International Conference on Multimedia, MM 2023, Ottawa, ON, Canada, 29 October 2023- 3 November 2023, pp. 8891-8899, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Michaela Karin Trierweiler, Barbara Krumay |
Managing Cybersecurity and Other Fraud Risks in Small and Medium Enterprises - A Framework to Build a Fraud Management Program in Times of Digitalization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirtschaftsinformatik ![In: Digital Responsibility: Social, Ethical, Ecological Implications of IS, 18. Internationale Tagung Wirtschaftsinformatik (WI 2023), September 18-21, 2023, Paderborn, Germany., pp. 28, 2023, AISeL. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
23 | Randi Jiang |
Exploring Employees' Computer Fraud Behaviors using the Fraud Triangle Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pac. Asia J. Assoc. Inf. Syst. ![In: Pac. Asia J. Assoc. Inf. Syst. 14(4), pp. 4, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
23 | Jie Li 0061, Qiaoling Lan, Enya Zhu, Yong Xu, Dan Zhu |
A Study of Health Insurance Fraud in China and Recommendations for Fraud Detection and Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Organ. End User Comput. ![In: J. Organ. End User Comput. 34(4), pp. 1-19, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Shadi Sadeghpour, Natalija Vlajic |
Ads and Fraud: A Comprehensive Survey of Fraud in Online Advertising. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cybersecur. Priv. ![In: J. Cybersecur. Priv. 1(4), pp. 804-832, December 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Marco Sánchez-Aguayo, Luis Urquiza-Aguiar, José Estrada-Jiménez |
Fraud Detection Using the Fraud Triangle Theory and Data Mining Techniques: A Literature Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. ![In: Comput. 10(10), pp. 121, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Zain ul Abi Din, Hari Venugopalan, Henry Lin, Adam Wushensky, Steven Liu, Samuel T. King |
Doing good by fighting fraud: Ethical anti-fraud systems for mobile payments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2106.14861, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
23 | Shali Liu |
Analysis of Accounting Fraud in Enterprises Based on Game Theory - - Take the Case of Geeya Technology Company Limited Fraud as an Example. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPEC ![In: IPEC 2021: 2nd Asia-Pacific Conference on Image Processing, Electronics and Computers, Dalian, China, April, 2021, pp. 373-376, 2021, ACM, 978-1-4503-8981-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Zain ul Abi Din, Hari Venugopalan, Henry Lin, Adam Wushensky, Steven Liu, Samuel T. King |
Doing good by fighting fraud: Ethical anti-fraud systems for mobile payments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24-27 May 2021, pp. 1623-1640, 2021, IEEE, 978-1-7281-8935-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Richard A. Bauder, Taghi M. Khoshgoftaar |
A study on rare fraud predictions with big Medicare claims fraud data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intell. Data Anal. ![In: Intell. Data Anal. 24(1), pp. 141-161, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Andrew J. Harrison 0001, William N. Dilla, Brian E. Mennecke |
Relationships within the Fraud Diamond: The Decision Processes That Influence Fraudulent Intentions in Online Consumer Fraud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Syst. ![In: J. Inf. Syst. 34(1), pp. 61-80, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Kiran Sharma |
Patterns of retractions from 1981-2020 : Does a fraud lead to another fraud? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2011.13091, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
23 | Cyril Onwubiko |
Fraud matrix: A morphological and analysis-based classification and taxonomy of fraud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 96, pp. 101900, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Abbas Bagherian Kasgari, Mohammad Taghi Taghavifard, Saeideh Golchin Kharazi |
Price manipulation fraud detection by Intelligent Visual Fraud surveillance system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoDIT ![In: 6th International Conference on Control, Decision and Information Technologies, CoDIT 2019, Paris, France, April 23-26, 2019, pp. 1646-1651, 2019, IEEE, 978-1-7281-0521-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Ahmed Seid Yesuf |
Fraud prevention and security: a model-driven and pattern-based risk analysis framework of e-service fraud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2019 |
RDF |
|
23 | Galina Baader |
Aufdeckung von Fraud im Einkaufsprozess durch die Kombination des Red Flag Ansatzes mit Process Mining (Identification of Fraud in the Purchase-to-Pay Process by combining the Red Flag Approach with Process Mining) (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2019 |
RDF |
|
23 | Juan Luis López Herrera, Homero Vladimir Ríos-Figueroa, Ericka-Janet Rechy-Ramírez |
Deep fraud. A fraud intention recognition framework in public transport context using a deep-learning approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONIELECOMP ![In: International Conference on Electronics, Communications and Computers, CONIELECOMP 2018, Cholula, Mexico, February 21-23, 2018, pp. 118-125, 2018, IEEE, 978-1-5386-2363-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Paul Sarda, Mohammad Jabed Morshed Chowdhury, Alan Colman, Muhammad Ashad Kabir, Jun Han 0004 |
Blockchain for Fraud Prevention: A Work-History Fraud Prevention System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/BigDataSE ![In: 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications / 12th IEEE International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018, pp. 1858-1863, 2018, IEEE, 978-1-5386-4388-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Véronique Van Vlasselaer, Tina Eliassi-Rad, Leman Akoglu, Monique Snoeck, Bart Baesens |
GOTCHA! Network-Based Fraud Detection for Social Security Fraud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Manag. Sci. ![In: Manag. Sci. 63(9), pp. 3090-3110, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Shaio Yan Huang, Chi-Chen Lin, An-An Chiu, David C. Yen |
Fraud detection using fraud triangle risk factors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 19(6), pp. 1343-1356, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Ahmed Seid Yesuf, Jetzabel Serna-Olvera, Kai Rannenberg |
Using Fraud Patterns for Fraud Risk Assessment of E-services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: ICT Systems Security and Privacy Protection - 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings, pp. 553-567, 2017, Springer, 978-3-319-58468-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | John K. C. Kingston |
Representing, reasoning and predicting fraud using fraud plans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RCIS ![In: 11th International Conference on Research Challenges in Information Science, RCIS 2017, Brighton, United Kingdom, May 10-12, 2017, pp. 128-133, 2017, IEEE, 978-1-5090-5476-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Gert Jan van Hardeveld, Craig Webber, Kieron O'Hara |
Discovering credit card fraud methods in online tutorials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OnSt@WebSci ![In: Proceedings of the 1st International Workshop on Online Safety, Trust and Fraud Prevention, OnSt@WebSci 2016, Hannover, Germany, May 22-25, 2016, pp. 1:1-1:5, 2016, ACM, 978-1-4503-4364-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Hoda Jannati |
Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Crit. Infrastructure Prot. ![In: Int. J. Crit. Infrastructure Prot. 11, pp. 51-61, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Rajiv Arora, Daya Gupta, Payal Pahwa |
Fraud Detection Life Cycle Model: A Systematic Fuzzy Approach to Fraud Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Intell. Appl. ![In: Int. J. Comput. Intell. Appl. 14(2), pp. 1550010:1-1550010:18, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Selmer Bringsjord, Alexander Bringsjord |
Can Accomplices to Fraud Will Themselves to Innocence, and Thereby Dodge Counter-Fraud Machines? ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI Fall Symposia ![In: 2015 AAAI Fall Symposia, Arlington, Virginia, USA, November 12-14, 2015, pp. 8-10, 2015, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
23 | Edgar Alonso Lopez-Rojas, Stefan Axelsson |
Using the RetSim Fraud Simulation Tool to Set Thresholds for Triage of Retail Fraud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Secure IT Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings, pp. 156-171, 2015, Springer, 978-3-319-26501-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Clive Blackwell |
Using Fraud Trees to Analyze Internet Credit Card Fraud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics X - 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers, pp. 17-29, 2014, Springer, 978-3-662-44951-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | William N. Dilla |
Can Avatars Fight Fraud? How Virtual Business Environments Facilitate Learning More About Fraud Investigation and Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Syst. ![In: J. Inf. Syst. 27(2), pp. 127-130, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Matthias Lang, Achim Wambach |
The fog of fraud - Mitigating fraud by strategic ambiguity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Games Econ. Behav. ![In: Games Econ. Behav. 81, pp. 255-275, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Abdullah A. I. Alnajem, Ning Zhang 0001 |
A Copula-Based Fraud Detection (CFD) Method for Detecting Evasive Fraud Patterns in a Corporate Mobile Banking Context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITCS ![In: 2013 International Conference on IT Convergence and Security, ICITCS 2013, Macau, China, December 16-18, 2013, pp. 1-4, 2013, IEEE Computer Society, 978-1-4799-2845-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Brendan Kitts, Jing Ying Zhang, Gang Wu, Raj Mahato |
Click fraud botnet detection by calculating mix adjusted traffic value: A method for de-cloaking click fraud attacks that is resistant to spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2013 IEEE International Conference on Intelligence and Security Informatics, Seattle, WA, USA, June 4-7, 2013, pp. 151-153, 2013, IEEE, 978-1-4673-6214-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Thomas C. Ormerod, Linden J. Ball, Nicola J. Morley |
Informing the development of a fraud prevention toolset through a situated analysis of fraud investigation expertise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Behav. Inf. Technol. ![In: Behav. Inf. Technol. 31(4), pp. 371-381, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Stefan Hoyer, Halyna Zakhariya, Thorben Sandner, Michael H. Breitner |
Fraud Prediction and the Human Factor: An Approach to Include Human Behavior in an Automated Fraud Audit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui, HI, USA, pp. 2382-2391, 2012, IEEE Computer Society, 978-0-7695-4525-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Vikas Jain, Vishal Midha, Animesh Animesh |
Whose Click Fraud Data Do You Trust? Effect Of Click Fraud On Advertiser's Trust And Sponsored Search Advertising Decisions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECIS ![In: 18th European Conference on Information Systems, ECIS 2010, Pretoria, South Africa, June 7-9, 2010, pp. 73, 2010, 978-0-620-47172-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
23 | Naeimeh Laleh, Mohammad Abdollahi Azgomi |
An Overview of a Hybrid Fraud Scoring and Spike Detection Technique for Fraud Detection in Streaming Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISTM ![In: Information Systems, Technology and Management - Third International Conference, ICISTM 2009, Ghaziabad, India, March 12-13, 2009. Proceedings, pp. 356-357, 2009, Springer, 978-3-642-00404-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Jan Grijpink |
Biometrics and identity fraud protection: Two barriers to realizing the benefits of biometrics - A chain perspective on biometrics, and identity fraud - Part II. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 21(3), pp. 249-256, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Hua Zhang, Xiangming Wen, Peizhou He, Wei Zheng 0001 |
Dealing with Telephone Fraud Using CAPTCHA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 8th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2009, June 1-3, 2009, Shanghai, China, pp. 1096-1099, 2009, IEEE Computer Society, 978-0-7695-3641-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Abhinav Srivastava, Amlan Kundu 0002, Shamik Sural, Arun K. Majumdar |
Credit Card Fraud Detection Using Hidden Markov Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 5(1), pp. 37-48, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Electronic Commerce, Security and Protection |
21 | Manoel Fernando Alonso Gadi, Xidi Wang, Alair Pereira do Lago |
Comparison with Parametric Optimization in Credit Card Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMLA ![In: Seventh International Conference on Machine Learning and Applications, ICMLA 2008, San Diego, California, USA, 11-13 December 2008, pp. 279-285, 2008, IEEE Computer Society, 978-0-7695-3495-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Anirban Banerjee, Dhiman Barman, Michalis Faloutsos, Laxmi N. Bhuyan |
Cyber-Fraud is One Typo Away. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 1939-1947, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Deholo Nali, Paul C. van Oorschot |
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 130-145, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Gang Zhao 0001, Robert Meersman |
Towards a Topical Ontology of Fraud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASWC ![In: The Semantic Web - ASWC 2006, First Asian Semantic Web Conference, Beijing, China, September 3-7, 2006, Proceedings, pp. 566-572, 2006, Springer, 3-540-38329-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Constantinos S. Hilas, John N. Sahalos |
Testing the Fraud Detection Ability of Different User Profiles by Means of FF-NN Classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICANN (2) ![In: Artificial Neural Networks - ICANN 2006, 16th International Conference, Athens, Greece, September 10-14, 2006. Proceedings, Part II, pp. 872-883, 2006, Springer, 3-540-38871-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Tho Manh Nguyen, Josef Schiefer, A Min Tjoa |
Sense & response service architecture (SARESA): an approach towards a real-time business intelligence solution and its use for a fraud detection application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DOLAP ![In: DOLAP 2005, ACM 8th International Workshop on Data Warehousing and OLAP, Bremen, Germany, November 4-5, 2005, Proceedings, pp. 77-86, 2005, ACM, 1-59593-162-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
event sense & response, real-time business intelligence, real-time data warehousing and OLAP, data analysis |
21 | Lae-Jeong Park |
Learning of Neural Networks for Fraud Detection Based on a Partial Area Under Curve. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30 - June 1, 2005, Proceedings, Part II, pp. 922-927, 2005, Springer, 3-540-25913-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Rong-Chang Chen, Tung-Shou Chen, Yuer Chien, Yuru Yang |
Novel Questionnaire-Responded Transaction Approach with SVM for Credit Card Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30 - June 1, 2005, Proceedings, Part II, pp. 916-921, 2005, Springer, 3-540-25913-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Jesús M. Pérez, Javier Muguerza, Olatz Arbelaitz, Ibai Gurrutxaga, José Ignacio Martín |
Consolidated Tree Classifier Learning in a Car Insurance Fraud Detection Domain with Class Imbalance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAPR (1) ![In: Pattern Recognition and Data Mining, Third International Conference on Advances in Pattern Recognition, ICAPR 2005, Bath, UK, August 22-25, 2005, Proceedings, Part I, pp. 381-389, 2005, Springer, 3-540-28757-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Ian MacInnes, Damani Musgrave, Jason Laska |
Electronic Commerce Fraud: Towards an Understanding of the Phenomenon. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | J. R. Filho, Edgar M. Gontijo, Antonio C. Delaiba, Evandro Mazina, José Edison Cabral, João O. P. Pinto |
Fraud identification in electricity company customers using decision tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (4) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 3730-3734, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | K. Suzanne Barber, Karen Fullam, Joonoo Kim |
Challenges for Trust, Fraud and Deception Research in Multi-agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trust, Reputation, and Security ![In: Trust, Reputation, and Security: Theories and Practice, AAMAS 2002 International Workshop, Bologna, Italy, July 15, 2002, Selected and Invited Papers, pp. 8-14, 2002, Springer, 3-540-00988-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
21 | Francesco Bonchi, Fosca Giannotti, Gianni Mainetto, Dino Pedreschi |
Using Data Mining Techniques in Fiscal Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DaWaK ![In: Data Warehousing and Knowledge Discovery, First International Conference, DaWaK '99, Florence, Italy, August 30 - September 1, 1999, Proceedings, pp. 369-376, 1999, Springer, 3-540-66458-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Ruth Murbach, Éva Nonn |
Similarity in Harder Cases: Sentencing for Fraud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIL ![In: Proceedings of the Fourth International Conference on Artificial intelligence and Law, ICAIL '93, Amsterdam, The Netherlands, June 15-18, 1993, pp. 236-244, 1993, ACM, 0-89791-606-9. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
19 | Yunsang Oh, Takashi Obi, Joong Sun Lee, Hiroyuki Suzuki, Nagaaki Ohyama |
Empirical analysis of internet identity misuse: case study of south Korean real name system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 6th Workshop on Digital Identity Management, Chicago, Illinois, USA, October 8, 2010, pp. 27-34, 2010, ACM, 978-1-4503-0090-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Mao Lin Huang, Jie Liang 0004, Quang Vinh Nguyen |
A Visualization Approach for Frauds Detection in Financial Market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IV ![In: 13th International Conference on Information Visualisation, IV 2009, 15-17 July 2009, Barcelona, Spain, pp. 197-202, 2009, IEEE Computer Society, 978-0-7695-3733-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Gaston L'Huillier, Richard Weber 0002, Nicolás Figueroa |
Online phishing classification using adversarial data mining and signaling games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD Workshop on CyberSecurity and Intelligence Informatics ![In: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, Paris, France, June 28, 2009, pp. 33-42, 2009, ACM, 978-1-60558-669-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
adversarial classification, games of incomplete information, spam and phishing detection, data mining, game theory, email filtering |
19 | Luís Torgo, Welma Pereira, Carlos Soares |
Detecting Errors in Foreign Trade Transactions: Dealing with Insufficient Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EPIA ![In: Progress in Artificial Intelligence, 14th Portuguese Conference on Artificial Intelligence, EPIA 2009, Aveiro, Portugal, October 12-15, 2009. Proceedings, pp. 435-446, 2009, Springer, 978-3-642-04685-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Dave Singelée, Bart Preneel |
Key Establishment Using Secure Distance Bounding Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), August 6-10, 2007, Philadelphia, PA, USA, pp. 1-6, 2007, IEEE Computer Society, 978-1-4244-1024-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Dave Singelée, Bart Preneel |
Distance Bounding in Noisy Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings, pp. 101-115, 2007, Springer, 978-3-540-73274-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
wireless sensor networks, distance bounding, secure localization, entity authentication |
19 | Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srinivasan 0002 |
A new Dynamic Key Generation Scheme for Fraudulent Internet Payment Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 83-88, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Yeog Kim, Jewan Bang, Gu Taek Lee, Sangjin Lee 0002, Jongin Lim 0001 |
A Field Guide to Hidden Accounting Information Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (2) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 146-150, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Masao Kobayashi, Takayuki Ito 0001 |
A Transactional Relationship Visualization System in Internet Auctions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAT ![In: Proceedings of the 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, Silicon Valley, CA, USA, November 2-5, 2007, pp. 248-251, 2007, IEEE Computer Society, 0-7695-3027-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Yungchang Ku, Ying-Chieh Chen, Kuo-Ching Wu, Chaochang Chiu |
An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 34-45, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
online gaming crime, virtual property, MMORPG, cybercrime |
19 | Janice Warner, Vijayalakshmi Atluri |
Inter-instance authorization constraints for secure workflow management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 190-199, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, work flow, authorization constraints |
19 | Sotiris B. Kotsiantis, Euaggelos Koumanakos, Dimitris Tzelepis, Vasilis Tampakas |
Predicting Fraudulent Financial Statements with Machine Learning Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SETN ![In: Advances in Artificial Intelligence, 4th Helenic Conference on AI, SETN 2006, Heraklion, Crete, Greece, May 18-20, 2006, Proceedings, pp. 538-542, 2006, Springer, 3-540-34117-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Yanbin Gao, Gang Zhao 0001 |
Knowledge-Based Information Extraction: A Case Study of Recognizing Emails of Nigerian Frauds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NLDB ![In: Natural Language Processing and Information Systems, 10th International Conference on Applications of Natural Language to Information Systems, NLDB 2005, Alicante, Spain, June 15-17, 2005, Proceedings, pp. 161-172, 2005, Springer, 3-540-26031-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou, Moti Yung |
Electronic National Lotteries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers, pp. 147-163, 2004, Springer, 3-540-22420-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Christer Magnusson, Louise Yngström |
Method for Insuring IT Risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
IT insurance method, IT insurance policies, estimated maximum IT loss, commercial and industrial security, risk management, security policies |
19 | Alea M. Fairchild, Bruno de Vuyst |
Hot Spot Implosion: The Decline and Fall of Flanders Language Valley. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Tao Wan 0004, Evangelos Kranakis, Paul C. van Oorschot |
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 358-374, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Security Analysis, Wireless Security, Routing Security, DSDV |
19 | Koutarou Suzuki, Makoto Yokoo |
Secure Generalized Vickrey Auction Using Homomorphic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers, pp. 239-249, 2003, Springer, 3-540-40663-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Generalized Vickrey Auction, game-theory, mechanism design, combinatorial auction, homomorphic encryption |
19 | Bernd Lamparter, Dirk Westhoff |
A Low-Cost Packet Originator Verification for Metering at Access-Routers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networked Group Communication ![In: Group Communications and Charges; Technology and Business Models, 5th COST264 International Workshop on Networked Group Communications, NGC 2003, and 3rd International Workshop on Internet Charging and QoS Technologies, ICQT 2003, Munich, Germany, September 16-19, 2003, Proceedings, pp. 287-297, 2003, Springer, 3-540-20051-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Packet originator verification, wireless last hop, charging support, unpredictable bits |
19 | Yanjiang Yang, Feng Bao 0001, Robert H. Deng |
Security Analysis and Improvement of the Global Key Recovery System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 17-24, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | S. Jantarang, Panan Potipantong, Apisak Worapishet |
A low cost real-time intelligent taximeter sensor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APCCAS (1) ![In: IEEE Asia Pacific Conference on Circuits and Systems 2002, APCCAS 2002, Singapore, 16-18 December 2002, pp. 217-220, 2002, IEEE, 0-7803-7690-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Richard H. Stern |
Another Update on Standardization Skullduggery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Micro ![In: IEEE Micro 21(5), pp. 8-10, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Richard H. Stern |
More standardization skullduggery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Micro ![In: IEEE Micro 21(4), pp. 12-15, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 3062 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|