Sciweavers

95 search results - page 6 / 19
» Credit Card Forensics
Sort
View
IPL
2006
85views more  IPL 2006»
14 years 11 months ago
A flaw in the electronic commerce protocol SET
The Secure Electronic Transaction (SET) protocol has been developed by the major credit card companies in association with some of the top software corporations to secure e-commer...
Srecko Brlek, Sardaouna Hamadou, John Mullins
FCCM
2008
IEEE
205views VLSI» more  FCCM 2008»
15 years 6 months ago
Credit Risk Modelling using Hardware Accelerated Monte-Carlo Simulation
The recent turmoil in global credit markets has demonstrated the need for advanced modelling of credit risk, which can take into account the effects of changing economic condition...
David B. Thomas, Wayne Luk
CCS
2009
ACM
15 years 6 months ago
Your botnet is my botnet: analysis of a botnet takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, ...
ECML
2004
Springer
15 years 5 months ago
Applying Support Vector Machines to Imbalanced Datasets
Support Vector Machines (SVM) have been extensively studied and have shown remarkable success in many applications. However the success of SVM is very limited when it is applied to...
Rehan Akbani, Stephen Kwek, Nathalie Japkowicz
SPW
2004
Springer
15 years 5 months ago
Accountable Privacy
Hardly a day passes without reports of new threats in or about the Internet. Denial of service, worms, viruses, spam, and divulged credit card information highlight the major secu...
Mike Burmester, Yvo Desmedt, Rebecca N. Wright, Al...