Sciweavers

95 search results - page 10 / 19
» Credit Card Forensics
Sort
View
PUC
2010
84views more  PUC 2010»
14 years 10 months ago
Information privacy in institutional and end-user tracking and recording technologies
This paper presents an analysis of attitudes towards everyday tracking and recording technologies (e.g., credit cards, store loyalty cards, store video cameras). This work focuses ...
David H. Nguyen, Gillian R. Hayes
EDBT
2010
ACM
237views Database» more  EDBT 2010»
15 years 6 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek
CSFW
2002
IEEE
15 years 4 months ago
Security Protocol Design via Authentication Tests
We describe a protocol design process, and illustrate its use by creating ATSPECT, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design pr...
Joshua D. Guttman
DEBS
2007
ACM
15 years 1 months ago
Identification of suspicious, unknown event patterns in an event cloud
This paper describes an approach to detect unknown event patterns. In this context, an event is not only something that happens, but also something that can be analysed. This task...
Alexander Widder, Rainer von Ammon, Philippe Schae...
KDD
2003
ACM
148views Data Mining» more  KDD 2003»
16 years 4 days ago
Mining concept-drifting data streams using ensemble classifiers
Recently, mining data streams with concept drifts for actionable insights has become an important and challenging task for a wide range of applications including credit card fraud...
Haixun Wang, Wei Fan, Philip S. Yu, Jiawei Han