Sciweavers

95 search results - page 18 / 19
» Credit Card Forensics
Sort
View
VLDB
1998
ACM
192views Database» more  VLDB 1998»
14 years 3 months ago
Algorithms for Mining Distance-Based Outliers in Large Datasets
This paper deals with finding outliers (exceptions) in large, multidimensional datasets. The identification of outliers can lead to the discovery of truly unexpected knowledge in ...
Edwin M. Knorr, Raymond T. Ng
CCS
2008
ACM
14 years 26 days ago
Privacy oracle: a system for finding application leaks with black box differential testing
We describe the design and implementation of Privacy Oracle, a system that reports on application leaks of user information via the network traffic that they send. Privacy Oracle ...
Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David W...
ESORICS
2008
Springer
14 years 19 days ago
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud
Abstract. Identity fraud (IDF) may be defined as unauthorized exploitation of credential information through the use of false identity. We propose CROO, a universal (i.e. generic) ...
D. Nali, Paul C. van Oorschot
IIWAS
2007
14 years 8 days ago
User Data Privacy in Web Services Context Using Semantic Desktop - SemanticLIFE Case Study
The growing number of Web Services technologies and their use have revolutionized the web. Web Services will play an important role in the next web generation (i.e. Semantic Web) ...
Mansoor Ahmed, Amin Andjomshoaa, A. Min Tjoa
SDM
2004
SIAM
141views Data Mining» more  SDM 2004»
14 years 7 days ago
Active Mining of Data Streams
Most previously proposed mining methods on data streams make an unrealistic assumption that "labelled" data stream is readily available and can be mined at anytime. Howe...
Wei Fan, Yi-an Huang, Haixun Wang, Philip S. Yu