[go: up one dir, main page]

Jonsson et al., 2000 - Google Patents

Combining fraud and intrusion detection–meeting new requirement

Jonsson et al., 2000

Document ID
15887883347840455169
Author
Jonsson E
Lundin E
Kvarnström H
Publication year
Publication venue
NORDIC WORKSHOP ON SECURE IT SYSTEMS-NORDSEC

External Links

Continue reading at scholar.google.com (other versions)

Similar Documents

Publication Publication Date Title
Anderson et al. Measuring the cost of cybercrime
Oosthoek et al. From hodl to heist: Analysis of cyber security threats to bitcoin exchanges
US8880435B1 (en) Detection and tracking of unauthorized computer access attempts
US7756783B2 (en) Fraud clearinghouse
Oosthoek et al. Cyber Security Threats to Bitcoin Exchanges: Adversary Exploitation and Laundering Techniques.
WO2005045715A2 (en) A method used in the control of a physical system affected by threats
EP3629551B1 (en) An apparatus, computer program and method for real time tracing of transactions through a distributed network
CN109214177A (en) A kind of anti-fake system of internet finance
CN107918911A (en) System and method for performing safe web bank transaction
Fatoki The influence of cyber security on financial fraud in the Nigerian banking industry
WO2020064462A1 (en) An apparatus, computer program and method
Slewe et al. Who will rob you on the digital highway?
McCarty Automated identity theft
KR102740453B1 (en) Deposit and withdrawal management apparatus for FDS and Managing Blacklists and method thereof
US12212681B1 (en) Systems and methods for secure identifiers for electronic transactions
Cárdenas et al. An economic map of cybercrime
Kigerl Spam-based scams
Malphrus Perspectives on retail payments fraud
Jonsson et al. Combining fraud and intrusion detection–meeting new requirement
Wang et al. The evolutional view of the types of identity thefts and online frauds in the era of the internet
Kikerpill Work, prey, love: a critical analysis of Estonian cybercrime case law 2014-2019
Rajput Cyber economic crime typology
Amanze et al. An enhanced model for bank fraud detection in nigerian
Singh et al. When social networks meet payment: a security perspective
Chen et al. Analysis of internet black market in new types of cyber-related crime–taking personal information transaction as an example