A Proposed Data Mining Approach for Internet Auction Fraud Detection (Englisch)
- Neue Suche nach: Ku, Yungchang
- Neue Suche nach: Chen, Yuchi
- Neue Suche nach: Chiu, Chaochang
- Neue Suche nach: Ku, Yungchang
- Neue Suche nach: Chen, Yuchi
- Neue Suche nach: Chiu, Chaochang
In:
Intelligence and Security Informatics
3
;
238-243
;
2007
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:A Proposed Data Mining Approach for Internet Auction Fraud Detection
-
Beteiligte:
-
Erschienen in:Intelligence and Security Informatics , 3 ; 238-243Lecture Notes in Computer Science ; 4430, 3 ; 238-243
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2007
-
Format / Umfang:6 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Exploring Extremism and Terrorism on the Web: The Dark Web ProjectChen, Hsinchun et al. | 2007
- 21
-
Analyzing and Visualizing Gray Web Forum StructureYang, Christopher C. / Ng, Torbun D. / Wang, Jau-Hwang / Wei, Chih-Ping / Chen, Hsinchun et al. | 2007
- 34
-
An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004Ku, Yungchang / Chen, Ying-Chieh / Wu, Kuo-Ching / Chiu, Chaochang et al. | 2007
- 46
-
Detecting Cyber Security Threats in Weblogs Using Probabilistic ModelsTsai, Flora S. / Chan, Kap Luk et al. | 2007
- 58
-
What-if Emergency Management System: A Generalized Voronoi Diagram ApproachLee, Ickjai / Pershouse, Reece / Phillips, Peter / Christensen, Chris et al. | 2007
- 70
-
Agent Based Framework for Emergency Rescue and Assistance PlanningZheng, Yujun / Wang, Jinquan / Xue, Jinyun et al. | 2007
- 82
-
Object Tracking with Self-updating Tracking WindowQian, Huimin / Mao, Yaobin / Geng, Jason / Wang, Zhiquan et al. | 2007
- 94
-
A Case-Based Evolutionary Group Decision Support Method for Emergency ResponseZhao, Jidi / Jin, Tao / Shen, Huizhang et al. | 2007
- 105
-
Lightweight Anomaly Intrusion Detection in Wireless Sensor NetworksChen, Haiguang / Han, Peng / Zhou, Xi / Gao, Chuanshan et al. | 2007
- 117
-
ASITL: Adaptive Secure Interoperation Using Trust-LevelJin, Li / Lu, Zhengding et al. | 2007
- 129
-
A RT0-Based Compliance Checker Model for Automated Trust NegotiationLiao, Zhensong / Jin, Hai et al. | 2007
- 141
-
TCM-KNN Algorithm for Supervised Network Intrusion DetectionLi, Yang / Fang, Bin-Xing / Guo, Li / Chen, You et al. | 2007
- 152
-
Research on Hidden Markov Model for System Call Anomaly DetectionQian, Quan / Xin, Mingjun et al. | 2007
- 160
-
Towards Identifying True Threat from Network Security DataLi, Zhi-tang / Lei, Jie / Wang, Li / Li, Dong / Ma, Yang-ming et al. | 2007
- 172
-
Security Assessment for Application Network Services Using Fault InjectionKang, Hyungwoo / Lee, Dong Hoon et al. | 2007
- 184
-
A Secure Data Transmission Protocol for Mobile Ad Hoc NetworksLu, Shejie / Li, Jun / Liu, Zhiyuan / Cui, Guohua et al. | 2007
- 196
-
Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement LearningXu, Xin / Sun, Yongqiang / Huang, Zunguo et al. | 2007
- 208
-
A Novel Relational Database Watermarking AlgorithmFu, Yu / Jin, Cong / Ma, Chuanxiang et al. | 2007
- 220
-
Anticipatory Event Detection for Bursty EventsChang, Kuiyu / He, Qi / Aminuddin, Ridzwan / Suri, Ridzwan / Lim, Ee-Peng et al. | 2007
- 226
-
Community Detection in Scale-Free Networks Based on Hypergraph ModelQian, Rong / Zhang, Wei / Yang, Bingru et al. | 2007
- 232
-
The Treelike Assembly Classifier for Pedestrian DetectionWei, C. X. / Cao, X. B. / Xu, Y. W. / Qiao, Hong / Wang, Fei-Yue et al. | 2007
- 238
-
A Proposed Data Mining Approach for Internet Auction Fraud DetectionKu, Yungchang / Chen, Yuchi / Chiu, Chaochang et al. | 2007
- 244
-
Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric ApproachLu, Chichao / Jen, Wenyuan / Chang, Weiping et al. | 2007
- 251
-
The Study of Government Website Information Disclosure in TaiwanChen, Yuan-Fa / Yeh, Sandy Yu-Lan / Wu, Kuo-Ching et al. | 2007
- 257
-
Informed Recognition in Software WatermarkingZhu, William et al. | 2007
- 262
-
An Inference Control Algorithm for RDF(S) RepositoryLu, Jianjiang / Wang, Jinpeng / Zhang, Yafei / Zhou, Bo / Li, Yanhui / Miao, Zhuang et al. | 2007
- 269
-
PPIDS: Privacy Preserving Intrusion Detection SystemPark, Hyun-A / Lee, Dong Hoon / Lim, Jongin / Cho, Sang Hyun et al. | 2007
- 275
-
Evaluating the Disaster Defense Ability of Information SystemsZhang, Baowen / Zhang, Jing / Zhou, Ning / Chen, Mingang et al. | 2007
- 282
-
Airline Safety Evaluation Based on Fuzzy TOPSISDeng, Yong / Xiong, Jia / Fu, Ping et al. | 2007
- 288
-
A Framework for Proving the Security of Data Transmission Protocols in Sensor NetworkWen, Mi / Dong, Ling / Zheng, Yanfei / Chen, Kefei et al. | 2007
- 295
-
Port and Address Hopping for Active Cyber-DefenseShi, Leyi / Jia, Chunfu / Lü, Shuwang / Liu, Zhenhua et al. | 2007
- 301
-
A Hybrid Model for Worm Simulations in a Large NetworkIm, Eul Gyu / Kim, Jung Sik / Noh, In Woo / Jang, Hyun Jun et al. | 2007
- 307
-
A Web Portal for Terrorism Activities in ChinaZeng, Daniel / Zhang, Li / Wei, Donghua / Wang, Fei-Yue et al. | 2007
- 309
-
An Overview of Telemarketing Fraud Problems and Countermeasures in TaiwanWang, Jau-Hwang / Jow, Jiing-Long / Liao, You-Lu / Tsai, Tyan-muh / Hung, Garfield et al. | 2007
- 311
-
Mining the Core Member of Terrorist Crime Group Based on Social Network AnalysisLiu, Qihong / Tang, Changjie / Qiao, Shaojie / Liu, Qiwei / Wen, Fenlian et al. | 2007
- 314
-
Providing Personalized Services for HWME System by Item-Based Collaborative FilteringLi, Qiudan / Li, Yaodong / He, Huiguang / Geng, Guanggang / Zhu, Yuanping / Wang, Chunheng et al. | 2007
- 316
-
An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security EventsMa, Yang-ming / Li, Zhi-tang / Lei, Jie / Wang, Li / Li, Dong et al. | 2007
- 318
-
Link Analysis-Based Detection of Anomalous Communication PatternsZeng, Daniel / Huang, Zan et al. | 2007
- 321
-
Social Modeling and Reasoning for Security InformaticsMao, Wenji / Zeng, Daniel / Zhang, Li / Wei, Donghua / Wang, Fei-Yue et al. | 2007
- 323
-
Detecting Botnets by Analyzing DNS TrafficTu, Hao / Li, Zhi-tang / Liu, Bin et al. | 2007
- 325
-
HMM-Based Approach for Evaluating Risk PropagationKim, Young-Gab / Lim, Jongin et al. | 2007
- 327
-
A Symptom-Based Taxonomy for an Early Detection of Network AttacksKim, Ki-Yoon / Choi, Hyoung-Kee et al. | 2007