Sciweavers

95 search results - page 12 / 19
» Credit Card Forensics
Sort
View
ACSAC
2006
IEEE
15 years 5 months ago
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine
Performing sensitive online transactions using computers found in cybercaf´es and public libraries is risky. The untrusted nature of these machines creates a target rich environm...
Ravi Chandra Jammalamadaka, Timothy W. van der Hor...
CCGRID
2006
IEEE
15 years 5 months ago
gSET: Trust Management and Secure Accounting for Business in the Grid
We developed gSET as solution for the unsolved problems in the field of dynamic trust management and secure accounting in commercial virtual organizations. gSET establishes trust...
Thomas Weishäupl, Christoph Witzany, Erich Sc...
ACSAC
2005
IEEE
15 years 5 months ago
Lessons Learned: A Security Analysis of the Internet Chess Club
The Internet Chess Club (ICC) is a popular online chess server with more than 30,000 members worldwide including various celebrities and the best chess players in the world. Altho...
John Black, Martin Cochran, Martin Ryan Gardner
COMPSAC
2005
IEEE
15 years 5 months ago
Protecting Users Against Phishing Attacks with AntiPhish
Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have b...
Engin Kirda, Christopher Krügel
PAKDD
2004
ACM
199views Data Mining» more  PAKDD 2004»
15 years 5 months ago
Temporal Sequence Associations for Rare Events
In many real world applications, systematic analysis of rare events, such as credit card frauds and adverse drug reactions, is very important. Their low occurrence rate in large da...
Jie Chen, Hongxing He, Graham J. Williams, Huidong...