The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for fraud with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1978-1990 (16) 1991-1994 (16) 1995-1997 (24) 1998 (18) 1999 (19) 2000 (28) 2001 (23) 2002 (26) 2003 (40) 2004 (56) 2005 (78) 2006 (74) 2007 (95) 2008 (101) 2009 (125) 2010 (69) 2011 (62) 2012 (73) 2013 (73) 2014 (86) 2015 (99) 2016 (108) 2017 (131) 2018 (193) 2019 (215) 2020 (211) 2021 (284) 2022 (307) 2023 (334) 2024 (78)
Publication types (Num. hits)
article(1233) book(2) incollection(41) inproceedings(1744) phdthesis(40) proceedings(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 686 occurrences of 433 keywords

Results
Found 3063 publication records. Showing 3062 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
28Luciano A. Digiampietri, Norton Trevisan Roman, Luis A. A. Meira, Jorge Jambeiro Filho, Cristiano D. Ferreira, Andreia A. Kondo, Everton Rufino Constantino, Rodrigo Carvalho Rezende, Bruno Cedraz Brandao, Helder S. Ribeiro, Pietro K. Carolino, Antonella Lanna, Jacques Wainer, Siome Goldenstein Uses of artificial intelligence in the Brazilian customs fraud detection system. Search on Bibsonomy DG.O The full citation details ... 2008 DBLP  BibTeX  RDF e-government, outlier detection, fraud detection
28Andrew S. Fast, Lisa Friedland, Marc E. Maier, Brian J. Taylor, David D. Jensen, Henry G. Goldberg, John Komoroske Relational data pre-processing techniques for improved securities fraud detection. Search on Bibsonomy KDD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF relational probability trees, normalization, fraud detection, statistical relational learning, data pre-processing
28Tammy Alexander Domain name registrars: are they part of the domain name fraud problem? Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cyber squatting, domain name fraud, domain name registrars, typosquatting
28Robert C. Newman Cybercrime, identity theft, and fraud: practicing safe internet - network security threats and vulnerabilities. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF internet fraud, identity theft, cybercrime
28Jennifer Neville, Özgür Simsek, David D. Jensen, John Komoroske, Kelly Palmer, Henry G. Goldberg Using relational knowledge discovery to prevent securities fraud. Search on Bibsonomy KDD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF relational probability trees, fraud detection, statistical relational learning
28Francesco Bonchi, Fosca Giannotti, Gianni Mainetto, Dino Pedreschi A Classification-Based Methodology for Planning Audit Strategies in Fraud Detection. Search on Bibsonomy KDD The full citation details ... 1999 DBLP  DOI  BibTeX  RDF integration of querying and mining, logic-based database languages, data mining, classification, decision trees, knowledge discovery in databases, fraud detection
28Saharon Rosset, Uzi Murad, Einat Neumann, Yizhak Idan, Gadi Pinkas Discovery of Fraud Rules for Telecommunications - Challenges and Solutions. Search on Bibsonomy KDD The full citation details ... 1999 DBLP  DOI  BibTeX  RDF telecommunications, rule discovery, fraud
26Roberto Daniele, Andrew J. Frew, Kate Varini, Asmik Magakian Affiliate Marketing in Travel and Tourism. Search on Bibsonomy ENTER The full citation details ... 2009 DBLP  DOI  BibTeX  RDF affiliate marketing, merchant - affiliate networks distribution channels, electronic distribution - online travel, brand management, online fraud
26Simon Attfield, Ann Blandford Improving the Cost Structure of Sensemaking Tasks: Analysing User Concepts to Inform Information System Design. Search on Bibsonomy INTERACT (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF fraud investigations, conceptual design, Sensemaking
26Yanlin Peng, Linfeng Zhang, J. Morris Chang, Yong Guan An Effective Method for Combating Malicious Scripts Clickbots. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Online Advertising Networks, Network Forensics, Attack Detection, Click Fraud
26Linda Dailey Paulson News Briefs. Search on Bibsonomy Computer The full citation details ... 2007 DBLP  DOI  BibTeX  RDF silicon clock, computer technology, digital camera, click fraud
26Neel Sundaresan Online trust and reputation systems. Search on Bibsonomy EC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF trust, electronic commerce, feedback, reputation, fraud detection
26Kenji Yamanishi, Jun'ichi Takeuchi, Graham J. Williams, Peter Milne On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms. Search on Bibsonomy Data Min. Knowl. Discov. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF intrusion detection, anomaly detection, EM algorithm, outlier detection, fraud detection, finite mixture model
26Mark F. Vilardo Online Impersonation in Securities Scams. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF SEC, Securities and Exchange Commission, digital identity, fraud, impersonation
26Tao Wan 0004, Evangelos Kranakis, Paul C. van Oorschot S-RIP: A Secure Distance Vector Routing Protocol. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Distance Fraud, Security Analysis, Routing Security, Distance Vector
26Steve Donoho Early detection of insider trading in option markets. Search on Bibsonomy KDD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF insider trading, data mining, fraud detection, behavior detection
26Bill McCarty Automated Identity Theft. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Internet Relay Chat, credit-card fraud, identity theft, honeynets, honeynets, IRC
26Cem Kaner Liability for defective documentation. Search on Bibsonomy SIGDOC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF UCC, UCITA, deceptive practices, user manual, warranty, contract, fraud
26Ammar Alkassar, Christian Stüble, Ahmad-Reza Sadeghi Secure object identification: or: solving the Chess Grandmaster Problem. Search on Bibsonomy NSPW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Chessmaster Problem, fake equipment, mafia fraud, identification
26Ross J. Anderson, S. Johann Bezuidenhoudt On the Reliability of Electronic Payment Systems. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF prepayment, credit control, security, Reliability, cryptography, robustness, robustness, key management, revocation, fraud, metering
26Naftaly H. Minsky Independent On-Line Monitoring of Evolving Systems. Search on Bibsonomy ICSE The full citation details ... 1996 DBLP  BibTeX  RDF fraud prevention, independent on-line monitoring, irregularity detection, law-governed architecture, software maintenance, sensors, system monitoring, systems software, evolving software systems
23Lina Ni, Jufeng Li, Huixin Xu, Xiangbo Wang, Jinquan Zhang Fraud Feature Boosting Mechanism and Spiral Oversampling Balancing Technique for Credit Card Fraud Detection. Search on Bibsonomy IEEE Trans. Comput. Soc. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
23Jinghui Zhang, Zhengjia Xu, Dingyang Lv, Zhan Shi, Dian Shen, Jiahui Jin, Fang Dong 0001 DiG-In-GNN: Discriminative Feature Guided GNN-Based Fraud Detector against Inconsistencies in Multi-Relation Fraud Graph. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
23Farhad Alam, Shariq Ahmad Intelligent Fraud Detection Framework for PFMS Using HGRO Feature Selection and OC-LSTM Fraud Detection Technique. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Jinzhang Hu, Ruimin Hu, Zheng Wang 0007, Dengshi Li, Junhang Wu, Lingfei Ren, Yilong Zang, Zijun Huang, Mei Wang Collaborative Fraud Detection: How Collaboration Impacts Fraud Detection. Search on Bibsonomy ACM Multimedia The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Michaela Karin Trierweiler, Barbara Krumay Managing Cybersecurity and Other Fraud Risks in Small and Medium Enterprises - A Framework to Build a Fraud Management Program in Times of Digitalization. Search on Bibsonomy Wirtschaftsinformatik The full citation details ... 2023 DBLP  BibTeX  RDF
23Randi Jiang Exploring Employees' Computer Fraud Behaviors using the Fraud Triangle Theory. Search on Bibsonomy Pac. Asia J. Assoc. Inf. Syst. The full citation details ... 2022 DBLP  BibTeX  RDF
23Jie Li 0061, Qiaoling Lan, Enya Zhu, Yong Xu, Dan Zhu A Study of Health Insurance Fraud in China and Recommendations for Fraud Detection and Prevention. Search on Bibsonomy J. Organ. End User Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
23Shadi Sadeghpour, Natalija Vlajic Ads and Fraud: A Comprehensive Survey of Fraud in Online Advertising. Search on Bibsonomy J. Cybersecur. Priv. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Marco Sánchez-Aguayo, Luis Urquiza-Aguiar, José Estrada-Jiménez Fraud Detection Using the Fraud Triangle Theory and Data Mining Techniques: A Literature Review. Search on Bibsonomy Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Zain ul Abi Din, Hari Venugopalan, Henry Lin, Adam Wushensky, Steven Liu, Samuel T. King Doing good by fighting fraud: Ethical anti-fraud systems for mobile payments. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
23Shali Liu Analysis of Accounting Fraud in Enterprises Based on Game Theory - - Take the Case of Geeya Technology Company Limited Fraud as an Example. Search on Bibsonomy IPEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Zain ul Abi Din, Hari Venugopalan, Henry Lin, Adam Wushensky, Steven Liu, Samuel T. King Doing good by fighting fraud: Ethical anti-fraud systems for mobile payments. Search on Bibsonomy SP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Richard A. Bauder, Taghi M. Khoshgoftaar A study on rare fraud predictions with big Medicare claims fraud data. Search on Bibsonomy Intell. Data Anal. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Andrew J. Harrison 0001, William N. Dilla, Brian E. Mennecke Relationships within the Fraud Diamond: The Decision Processes That Influence Fraudulent Intentions in Online Consumer Fraud. Search on Bibsonomy J. Inf. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Kiran Sharma Patterns of retractions from 1981-2020 : Does a fraud lead to another fraud? Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
23Cyril Onwubiko Fraud matrix: A morphological and analysis-based classification and taxonomy of fraud. Search on Bibsonomy Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Abbas Bagherian Kasgari, Mohammad Taghi Taghavifard, Saeideh Golchin Kharazi Price manipulation fraud detection by Intelligent Visual Fraud surveillance system. Search on Bibsonomy CoDIT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Ahmed Seid Yesuf Fraud prevention and security: a model-driven and pattern-based risk analysis framework of e-service fraud. Search on Bibsonomy 2019   RDF
23Galina Baader Aufdeckung von Fraud im Einkaufsprozess durch die Kombination des Red Flag Ansatzes mit Process Mining (Identification of Fraud in the Purchase-to-Pay Process by combining the Red Flag Approach with Process Mining) (PDF / PS) Search on Bibsonomy 2019   RDF
23Juan Luis López Herrera, Homero Vladimir Ríos-Figueroa, Ericka-Janet Rechy-Ramírez Deep fraud. A fraud intention recognition framework in public transport context using a deep-learning approach. Search on Bibsonomy CONIELECOMP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Paul Sarda, Mohammad Jabed Morshed Chowdhury, Alan Colman, Muhammad Ashad Kabir, Jun Han 0004 Blockchain for Fraud Prevention: A Work-History Fraud Prevention System. Search on Bibsonomy TrustCom/BigDataSE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
23Véronique Van Vlasselaer, Tina Eliassi-Rad, Leman Akoglu, Monique Snoeck, Bart Baesens GOTCHA! Network-Based Fraud Detection for Social Security Fraud. Search on Bibsonomy Manag. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Shaio Yan Huang, Chi-Chen Lin, An-An Chiu, David C. Yen Fraud detection using fraud triangle risk factors. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Ahmed Seid Yesuf, Jetzabel Serna-Olvera, Kai Rannenberg Using Fraud Patterns for Fraud Risk Assessment of E-services. Search on Bibsonomy SEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23John K. C. Kingston Representing, reasoning and predicting fraud using fraud plans. Search on Bibsonomy RCIS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Gert Jan van Hardeveld, Craig Webber, Kieron O'Hara Discovering credit card fraud methods in online tutorials. Search on Bibsonomy OnSt@WebSci The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Hoda Jannati Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems. Search on Bibsonomy Int. J. Crit. Infrastructure Prot. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Rajiv Arora, Daya Gupta, Payal Pahwa Fraud Detection Life Cycle Model: A Systematic Fuzzy Approach to Fraud Management. Search on Bibsonomy Int. J. Comput. Intell. Appl. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Selmer Bringsjord, Alexander Bringsjord Can Accomplices to Fraud Will Themselves to Innocence, and Thereby Dodge Counter-Fraud Machines? Search on Bibsonomy AAAI Fall Symposia The full citation details ... 2015 DBLP  BibTeX  RDF
23Edgar Alonso Lopez-Rojas, Stefan Axelsson Using the RetSim Fraud Simulation Tool to Set Thresholds for Triage of Retail Fraud. Search on Bibsonomy NordSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
23Clive Blackwell Using Fraud Trees to Analyze Internet Credit Card Fraud. Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
23William N. Dilla Can Avatars Fight Fraud? How Virtual Business Environments Facilitate Learning More About Fraud Investigation and Prevention. Search on Bibsonomy J. Inf. Syst. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Matthias Lang, Achim Wambach The fog of fraud - Mitigating fraud by strategic ambiguity. Search on Bibsonomy Games Econ. Behav. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Abdullah A. I. Alnajem, Ning Zhang 0001 A Copula-Based Fraud Detection (CFD) Method for Detecting Evasive Fraud Patterns in a Corporate Mobile Banking Context. Search on Bibsonomy ICITCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Brendan Kitts, Jing Ying Zhang, Gang Wu, Raj Mahato Click fraud botnet detection by calculating mix adjusted traffic value: A method for de-cloaking click fraud attacks that is resistant to spoofing. Search on Bibsonomy ISI The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Thomas C. Ormerod, Linden J. Ball, Nicola J. Morley Informing the development of a fraud prevention toolset through a situated analysis of fraud investigation expertise. Search on Bibsonomy Behav. Inf. Technol. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Stefan Hoyer, Halyna Zakhariya, Thorben Sandner, Michael H. Breitner Fraud Prediction and the Human Factor: An Approach to Include Human Behavior in an Automated Fraud Audit. Search on Bibsonomy HICSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Vikas Jain, Vishal Midha, Animesh Animesh Whose Click Fraud Data Do You Trust? Effect Of Click Fraud On Advertiser's Trust And Sponsored Search Advertising Decisions. Search on Bibsonomy ECIS The full citation details ... 2010 DBLP  BibTeX  RDF
23Naeimeh Laleh, Mohammad Abdollahi Azgomi An Overview of a Hybrid Fraud Scoring and Spike Detection Technique for Fraud Detection in Streaming Data. Search on Bibsonomy ICISTM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Jan Grijpink Biometrics and identity fraud protection: Two barriers to realizing the benefits of biometrics - A chain perspective on biometrics, and identity fraud - Part II. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Hua Zhang, Xiangming Wen, Peizhou He, Wei Zheng 0001 Dealing with Telephone Fraud Using CAPTCHA. Search on Bibsonomy ACIS-ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Abhinav Srivastava, Amlan Kundu 0002, Shamik Sural, Arun K. Majumdar Credit Card Fraud Detection Using Hidden Markov Model. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Electronic Commerce, Security and Protection
21Manoel Fernando Alonso Gadi, Xidi Wang, Alair Pereira do Lago Comparison with Parametric Optimization in Credit Card Fraud Detection. Search on Bibsonomy ICMLA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Anirban Banerjee, Dhiman Barman, Michalis Faloutsos, Laxmi N. Bhuyan Cyber-Fraud is One Typo Away. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Deholo Nali, Paul C. van Oorschot CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Gang Zhao 0001, Robert Meersman Towards a Topical Ontology of Fraud. Search on Bibsonomy ASWC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Constantinos S. Hilas, John N. Sahalos Testing the Fraud Detection Ability of Different User Profiles by Means of FF-NN Classifiers. Search on Bibsonomy ICANN (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Tho Manh Nguyen, Josef Schiefer, A Min Tjoa Sense & response service architecture (SARESA): an approach towards a real-time business intelligence solution and its use for a fraud detection application. Search on Bibsonomy DOLAP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF event sense & response, real-time business intelligence, real-time data warehousing and OLAP, data analysis
21Lae-Jeong Park Learning of Neural Networks for Fraud Detection Based on a Partial Area Under Curve. Search on Bibsonomy ISNN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Rong-Chang Chen, Tung-Shou Chen, Yuer Chien, Yuru Yang Novel Questionnaire-Responded Transaction Approach with SVM for Credit Card Fraud Detection. Search on Bibsonomy ISNN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Jesús M. Pérez, Javier Muguerza, Olatz Arbelaitz, Ibai Gurrutxaga, José Ignacio Martín Consolidated Tree Classifier Learning in a Car Insurance Fraud Detection Domain with Class Imbalance. Search on Bibsonomy ICAPR (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Ian MacInnes, Damani Musgrave, Jason Laska Electronic Commerce Fraud: Towards an Understanding of the Phenomenon. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21J. R. Filho, Edgar M. Gontijo, Antonio C. Delaiba, Evandro Mazina, José Edison Cabral, João O. P. Pinto Fraud identification in electricity company customers using decision tree. Search on Bibsonomy SMC (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21K. Suzanne Barber, Karen Fullam, Joonoo Kim Challenges for Trust, Fraud and Deception Research in Multi-agent Systems. Search on Bibsonomy Trust, Reputation, and Security The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21Francesco Bonchi, Fosca Giannotti, Gianni Mainetto, Dino Pedreschi Using Data Mining Techniques in Fiscal Fraud Detection. Search on Bibsonomy DaWaK The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
21Ruth Murbach, Éva Nonn Similarity in Harder Cases: Sentencing for Fraud. Search on Bibsonomy ICAIL The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
19Yunsang Oh, Takashi Obi, Joong Sun Lee, Hiroyuki Suzuki, Nagaaki Ohyama Empirical analysis of internet identity misuse: case study of south Korean real name system. Search on Bibsonomy Digital Identity Management The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
19Mao Lin Huang, Jie Liang 0004, Quang Vinh Nguyen A Visualization Approach for Frauds Detection in Financial Market. Search on Bibsonomy IV The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Gaston L'Huillier, Richard Weber 0002, Nicolás Figueroa Online phishing classification using adversarial data mining and signaling games. Search on Bibsonomy KDD Workshop on CyberSecurity and Intelligence Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF adversarial classification, games of incomplete information, spam and phishing detection, data mining, game theory, email filtering
19Luís Torgo, Welma Pereira, Carlos Soares Detecting Errors in Foreign Trade Transactions: Dealing with Insufficient Data. Search on Bibsonomy EPIA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Dave Singelée, Bart Preneel Key Establishment Using Secure Distance Bounding Protocols. Search on Bibsonomy MobiQuitous The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Dave Singelée, Bart Preneel Distance Bounding in Noisy Environments. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF wireless sensor networks, distance bounding, secure localization, entity authentication
19Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srinivasan 0002 A new Dynamic Key Generation Scheme for Fraudulent Internet Payment Prevention. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Yeog Kim, Jewan Bang, Gu Taek Lee, Sangjin Lee 0002, Jongin Lim 0001 A Field Guide to Hidden Accounting Information Detection. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Masao Kobayashi, Takayuki Ito 0001 A Transactional Relationship Visualization System in Internet Auctions. Search on Bibsonomy IAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Yungchang Ku, Ying-Chieh Chen, Kuo-Ching Wu, Chaochang Chiu An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF online gaming crime, virtual property, MMORPG, cybercrime
19Janice Warner, Vijayalakshmi Atluri Inter-instance authorization constraints for secure workflow management. Search on Bibsonomy SACMAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, work flow, authorization constraints
19Sotiris B. Kotsiantis, Euaggelos Koumanakos, Dimitris Tzelepis, Vasilis Tampakas Predicting Fraudulent Financial Statements with Machine Learning Techniques. Search on Bibsonomy SETN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Yanbin Gao, Gang Zhao 0001 Knowledge-Based Information Extraction: A Case Study of Recognizing Emails of Nigerian Frauds. Search on Bibsonomy NLDB The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou, Moti Yung Electronic National Lotteries. Search on Bibsonomy Financial Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Christer Magnusson, Louise Yngström Method for Insuring IT Risks. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IT insurance method, IT insurance policies, estimated maximum IT loss, commercial and industrial security, risk management, security policies
19Alea M. Fairchild, Bruno de Vuyst Hot Spot Implosion: The Decline and Fall of Flanders Language Valley. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Tao Wan 0004, Evangelos Kranakis, Paul C. van Oorschot Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV). Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Security Analysis, Wireless Security, Routing Security, DSDV
19Koutarou Suzuki, Makoto Yokoo Secure Generalized Vickrey Auction Using Homomorphic Encryption. Search on Bibsonomy Financial Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Generalized Vickrey Auction, game-theory, mechanism design, combinatorial auction, homomorphic encryption
19Bernd Lamparter, Dirk Westhoff A Low-Cost Packet Originator Verification for Metering at Access-Routers. Search on Bibsonomy Networked Group Communication The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Packet originator verification, wireless last hop, charging support, unpredictable bits
19Yanjiang Yang, Feng Bao 0001, Robert H. Deng Security Analysis and Improvement of the Global Key Recovery System. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19S. Jantarang, Panan Potipantong, Apisak Worapishet A low cost real-time intelligent taximeter sensor. Search on Bibsonomy APCCAS (1) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Richard H. Stern Another Update on Standardization Skullduggery. Search on Bibsonomy IEEE Micro The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Richard H. Stern More standardization skullduggery. Search on Bibsonomy IEEE Micro The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 3062 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license