This survey paper categorises, compares, and summarises from almost all published technical and review articles in automated fraud detection within the last 10 years. It defines t...
Clifton Phua, Vincent C. S. Lee, Kate Smith-Miles,...
As the obfuscation is widely used by malware writers to evade antivirus scanners, so it becomes important to analyze how this technique is applied to malwares. This paper explores ...
The problem of automated visual surveillance has spawned a lively research area, with 2005 seeing three conferences or workshops and special issues of two major journals devoted to...
In the last few years, there has been increasing interest from the agent community in the use of techniques from decision theory and game theory. Our aims in this article are first...
Several techniques have been suggested for supporting reverse engineering and design recovery activities. While many of these techniques have been cataloged in various collections...