Sciweavers

95 search results - page 3 / 19
» Credit Card Forensics
Sort
View
ICMLA
2008
15 years 3 months ago
Comparison with Parametric Optimization in Credit Card Fraud Detection
We apply five classification methods, Neural Nets(NN), Bayesian Nets(BN), Naive Bayes(NB), Artificial Immune Systems(AIS) [4] and Decision Trees(DT), to credit card fraud detectio...
Manoel Fernando Alonso Gadi, Xidi Wang, Alair Pere...
FC
2007
Springer
113views Cryptology» more  FC 2007»
15 years 8 months ago
Vulnerabilities in First-Generation RFID-enabled Credit Cards
Thomas S. Heydt-Benjamin, Daniel V. Bailey, Kevin ...
ECIS
2000
15 years 3 months ago
Security and Productivity Improvements - Sufficient for the Success of Secure Electronic Transaction?
Online payments in business-to-consumer electronic commerce are mainly made with credit cards. Fraud and chargebacks are a significant issue for merchants and payment card brands, ...
Michael Fritscher, Oliver Kump
IJDE
2006
116views more  IJDE 2006»
15 years 1 months ago
Forensics and SIM Cards: An Overview
Nowadays there are many tools for the extraction of data objects [SWGDE] from SIM cards; unfortunately, most of them are proprietary, or their use is restricted to law enforcement...
Fabio Casadei, Antonio Savoldi, Paolo Gubian
JAR
2006
81views more  JAR 2006»
15 years 1 months ago
Verifying the SET Purchase Protocols
SET (Secure Electronic Transaction) is a suite of protocols proposed by a consortium of credit card companies and software corporations to secure ecommerce transactions. The Purcha...
Giampaolo Bella, Fabio Massacci, Lawrence C. Pauls...