Sciweavers

95 search results - page 14 / 19
» Credit Card Forensics
Sort
View
136
Voted
FMICS
2008
Springer
15 years 5 months ago
Dynamic Event-Based Runtime Monitoring of Real-Time and Contextual Properties
Given the intractability of exhaustively verifying software, the use of runtime-verification, to verify single execution paths at runtime, is becoming popular. Although the use of ...
Christian Colombo, Gordon J. Pace, Gerardo Schneid...
116
Voted
IJNSEC
2008
120views more  IJNSEC 2008»
15 years 3 months ago
Formal Specification and Verification of a Secure Micropayment Protocol
As online businesses keep growing and Web services become pervasive, there is an increasing demand for micropayment protocols that facilitate microcommerce, namely selling content...
Mohamed G. Gouda, Alex X. Liu
171
Voted
KAIS
2006
77views more  KAIS 2006»
15 years 3 months ago
Finding centric local outliers in categorical/numerical spaces
Outlier detection techniques are widely used in many applications such as credit card fraud detection, monitoring criminal activities in electronic commerce, etc. These application...
Jeffrey Xu Yu, Weining Qian, Hongjun Lu, Aoying Zh...
KAIS
2007
120views more  KAIS 2007»
15 years 3 months ago
Capabilities of outlier detection schemes in large datasets, framework and methodologies
Abstract. Outlier detection is concerned with discovering exceptional behaviors of objects. Its theoretical principle and practical implementation lay a foundation for some importa...
Jian Tang, Zhixiang Chen, Ada Wai-Chee Fu, David W...
139
Voted
IVS
2010
83views more  IVS 2010»
15 years 2 months ago
Variable binned scatter plots
The scatter plot is a well-known method of visualizing pairs of two-dimensional continuous variables. Multidimensional data can be depicted in a scatter plot matrix. They are intu...
Ming C. Hao, Umeshwar Dayal, Ratnesh K. Sharma, Da...