Sciweavers

95 search results - page 14 / 19
» Credit Card Forensics
Sort
View
FMICS
2008
Springer
15 years 1 months ago
Dynamic Event-Based Runtime Monitoring of Real-Time and Contextual Properties
Given the intractability of exhaustively verifying software, the use of runtime-verification, to verify single execution paths at runtime, is becoming popular. Although the use of ...
Christian Colombo, Gordon J. Pace, Gerardo Schneid...
IJNSEC
2008
120views more  IJNSEC 2008»
14 years 11 months ago
Formal Specification and Verification of a Secure Micropayment Protocol
As online businesses keep growing and Web services become pervasive, there is an increasing demand for micropayment protocols that facilitate microcommerce, namely selling content...
Mohamed G. Gouda, Alex X. Liu
KAIS
2006
77views more  KAIS 2006»
14 years 11 months ago
Finding centric local outliers in categorical/numerical spaces
Outlier detection techniques are widely used in many applications such as credit card fraud detection, monitoring criminal activities in electronic commerce, etc. These application...
Jeffrey Xu Yu, Weining Qian, Hongjun Lu, Aoying Zh...
KAIS
2007
120views more  KAIS 2007»
14 years 11 months ago
Capabilities of outlier detection schemes in large datasets, framework and methodologies
Abstract. Outlier detection is concerned with discovering exceptional behaviors of objects. Its theoretical principle and practical implementation lay a foundation for some importa...
Jian Tang, Zhixiang Chen, Ada Wai-Chee Fu, David W...
IVS
2010
83views more  IVS 2010»
14 years 10 months ago
Variable binned scatter plots
The scatter plot is a well-known method of visualizing pairs of two-dimensional continuous variables. Multidimensional data can be depicted in a scatter plot matrix. They are intu...
Ming C. Hao, Umeshwar Dayal, Ratnesh K. Sharma, Da...