Jonsson et al., 2000 - Google Patents
Combining fraud and intrusion detection–meeting new requirementJonsson et al., 2000
- Document ID
- 15887883347840455169
- Author
- Jonsson E
- Lundin E
- Kvarnström H
- Publication year
- Publication venue
- NORDIC WORKSHOP ON SECURE IT SYSTEMS-NORDSEC
External Links
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Anderson et al. | Measuring the cost of cybercrime | |
Oosthoek et al. | From hodl to heist: Analysis of cyber security threats to bitcoin exchanges | |
US8880435B1 (en) | Detection and tracking of unauthorized computer access attempts | |
US7756783B2 (en) | Fraud clearinghouse | |
Oosthoek et al. | Cyber Security Threats to Bitcoin Exchanges: Adversary Exploitation and Laundering Techniques. | |
WO2005045715A2 (en) | A method used in the control of a physical system affected by threats | |
EP3629551B1 (en) | An apparatus, computer program and method for real time tracing of transactions through a distributed network | |
CN109214177A (en) | A kind of anti-fake system of internet finance | |
CN107918911A (en) | System and method for performing safe web bank transaction | |
Fatoki | The influence of cyber security on financial fraud in the Nigerian banking industry | |
WO2020064462A1 (en) | An apparatus, computer program and method | |
Slewe et al. | Who will rob you on the digital highway? | |
McCarty | Automated identity theft | |
KR102740453B1 (en) | Deposit and withdrawal management apparatus for FDS and Managing Blacklists and method thereof | |
US12212681B1 (en) | Systems and methods for secure identifiers for electronic transactions | |
Cárdenas et al. | An economic map of cybercrime | |
Kigerl | Spam-based scams | |
Malphrus | Perspectives on retail payments fraud | |
Jonsson et al. | Combining fraud and intrusion detection–meeting new requirement | |
Wang et al. | The evolutional view of the types of identity thefts and online frauds in the era of the internet | |
Kikerpill | Work, prey, love: a critical analysis of Estonian cybercrime case law 2014-2019 | |
Rajput | Cyber economic crime typology | |
Amanze et al. | An enhanced model for bank fraud detection in nigerian | |
Singh et al. | When social networks meet payment: a security perspective | |
Chen et al. | Analysis of internet black market in new types of cyber-related crime–taking personal information transaction as an example |