Sciweavers

95 search results - page 3 / 19
» Credit Card Forensics
Sort
View
ICMLA
2008
14 years 9 days ago
Comparison with Parametric Optimization in Credit Card Fraud Detection
We apply five classification methods, Neural Nets(NN), Bayesian Nets(BN), Naive Bayes(NB), Artificial Immune Systems(AIS) [4] and Decision Trees(DT), to credit card fraud detectio...
Manoel Fernando Alonso Gadi, Xidi Wang, Alair Pere...
FC
2007
Springer
113views Cryptology» more  FC 2007»
14 years 5 months ago
Vulnerabilities in First-Generation RFID-enabled Credit Cards
Thomas S. Heydt-Benjamin, Daniel V. Bailey, Kevin ...
ECIS
2000
14 years 6 days ago
Security and Productivity Improvements - Sufficient for the Success of Secure Electronic Transaction?
Online payments in business-to-consumer electronic commerce are mainly made with credit cards. Fraud and chargebacks are a significant issue for merchants and payment card brands, ...
Michael Fritscher, Oliver Kump
IJDE
2006
116views more  IJDE 2006»
13 years 11 months ago
Forensics and SIM Cards: An Overview
Nowadays there are many tools for the extraction of data objects [SWGDE] from SIM cards; unfortunately, most of them are proprietary, or their use is restricted to law enforcement...
Fabio Casadei, Antonio Savoldi, Paolo Gubian
JAR
2006
81views more  JAR 2006»
13 years 10 months ago
Verifying the SET Purchase Protocols
SET (Secure Electronic Transaction) is a suite of protocols proposed by a consortium of credit card companies and software corporations to secure ecommerce transactions. The Purcha...
Giampaolo Bella, Fabio Massacci, Lawrence C. Pauls...