A Proposed Data Mining Approach for Internet Auction Fraud Detection (English)
- New search for: Ku, Yungchang
- New search for: Chen, Yuchi
- New search for: Chiu, Chaochang
- New search for: Ku, Yungchang
- New search for: Chen, Yuchi
- New search for: Chiu, Chaochang
In:
Intelligence and Security Informatics
3
;
238-243
;
2007
- Article/Chapter (Book) / Electronic Resource
-
Title:A Proposed Data Mining Approach for Internet Auction Fraud Detection
-
Contributors:
-
Published in:Intelligence and Security Informatics , 3 ; 238-243Lecture Notes in Computer Science ; 4430, 3 ; 238-243
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2007-01-01
-
Size:6 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Exploring Extremism and Terrorism on the Web: The Dark Web ProjectChen, Hsinchun et al. | 2007
- 21
-
Analyzing and Visualizing Gray Web Forum StructureYang, Christopher C. / Ng, Torbun D. / Wang, Jau-Hwang / Wei, Chih-Ping / Chen, Hsinchun et al. | 2007
- 34
-
An Empirical Analysis of Online Gaming Crime Characteristics from 2002 to 2004Ku, Yungchang / Chen, Ying-Chieh / Wu, Kuo-Ching / Chiu, Chaochang et al. | 2007
- 46
-
Detecting Cyber Security Threats in Weblogs Using Probabilistic ModelsTsai, Flora S. / Chan, Kap Luk et al. | 2007
- 58
-
What-if Emergency Management System: A Generalized Voronoi Diagram ApproachLee, Ickjai / Pershouse, Reece / Phillips, Peter / Christensen, Chris et al. | 2007
- 70
-
Agent Based Framework for Emergency Rescue and Assistance PlanningZheng, Yujun / Wang, Jinquan / Xue, Jinyun et al. | 2007
- 82
-
Object Tracking with Self-updating Tracking WindowQian, Huimin / Mao, Yaobin / Geng, Jason / Wang, Zhiquan et al. | 2007
- 94
-
A Case-Based Evolutionary Group Decision Support Method for Emergency ResponseZhao, Jidi / Jin, Tao / Shen, Huizhang et al. | 2007
- 105
-
Lightweight Anomaly Intrusion Detection in Wireless Sensor NetworksChen, Haiguang / Han, Peng / Zhou, Xi / Gao, Chuanshan et al. | 2007
- 117
-
ASITL: Adaptive Secure Interoperation Using Trust-LevelJin, Li / Lu, Zhengding et al. | 2007
- 129
-
A RT0-Based Compliance Checker Model for Automated Trust NegotiationLiao, Zhensong / Jin, Hai et al. | 2007
- 141
-
TCM-KNN Algorithm for Supervised Network Intrusion DetectionLi, Yang / Fang, Bin-Xing / Guo, Li / Chen, You et al. | 2007
- 152
-
Research on Hidden Markov Model for System Call Anomaly DetectionQian, Quan / Xin, Mingjun et al. | 2007
- 160
-
Towards Identifying True Threat from Network Security DataLi, Zhi-tang / Lei, Jie / Wang, Li / Li, Dong / Ma, Yang-ming et al. | 2007
- 172
-
Security Assessment for Application Network Services Using Fault InjectionKang, Hyungwoo / Lee, Dong Hoon et al. | 2007
- 184
-
A Secure Data Transmission Protocol for Mobile Ad Hoc NetworksLu, Shejie / Li, Jun / Liu, Zhiyuan / Cui, Guohua et al. | 2007
- 196
-
Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement LearningXu, Xin / Sun, Yongqiang / Huang, Zunguo et al. | 2007
- 208
-
A Novel Relational Database Watermarking AlgorithmFu, Yu / Jin, Cong / Ma, Chuanxiang et al. | 2007
- 220
-
Anticipatory Event Detection for Bursty EventsChang, Kuiyu / He, Qi / Aminuddin, Ridzwan / Suri, Ridzwan / Lim, Ee-Peng et al. | 2007
- 226
-
Community Detection in Scale-Free Networks Based on Hypergraph ModelQian, Rong / Zhang, Wei / Yang, Bingru et al. | 2007
- 232
-
The Treelike Assembly Classifier for Pedestrian DetectionWei, C. X. / Cao, X. B. / Xu, Y. W. / Qiao, Hong / Wang, Fei-Yue et al. | 2007
- 238
-
A Proposed Data Mining Approach for Internet Auction Fraud DetectionKu, Yungchang / Chen, Yuchi / Chiu, Chaochang et al. | 2007
- 244
-
Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric ApproachLu, Chichao / Jen, Wenyuan / Chang, Weiping et al. | 2007
- 251
-
The Study of Government Website Information Disclosure in TaiwanChen, Yuan-Fa / Yeh, Sandy Yu-Lan / Wu, Kuo-Ching et al. | 2007
- 257
-
Informed Recognition in Software WatermarkingZhu, William et al. | 2007
- 262
-
An Inference Control Algorithm for RDF(S) RepositoryLu, Jianjiang / Wang, Jinpeng / Zhang, Yafei / Zhou, Bo / Li, Yanhui / Miao, Zhuang et al. | 2007
- 269
-
PPIDS: Privacy Preserving Intrusion Detection SystemPark, Hyun-A / Lee, Dong Hoon / Lim, Jongin / Cho, Sang Hyun et al. | 2007
- 275
-
Evaluating the Disaster Defense Ability of Information SystemsZhang, Baowen / Zhang, Jing / Zhou, Ning / Chen, Mingang et al. | 2007
- 282
-
Airline Safety Evaluation Based on Fuzzy TOPSISDeng, Yong / Xiong, Jia / Fu, Ping et al. | 2007
- 288
-
A Framework for Proving the Security of Data Transmission Protocols in Sensor NetworkWen, Mi / Dong, Ling / Zheng, Yanfei / Chen, Kefei et al. | 2007
- 295
-
Port and Address Hopping for Active Cyber-DefenseShi, Leyi / Jia, Chunfu / Lü, Shuwang / Liu, Zhenhua et al. | 2007
- 301
-
A Hybrid Model for Worm Simulations in a Large NetworkIm, Eul Gyu / Kim, Jung Sik / Noh, In Woo / Jang, Hyun Jun et al. | 2007
- 307
-
A Web Portal for Terrorism Activities in ChinaZeng, Daniel / Zhang, Li / Wei, Donghua / Wang, Fei-Yue et al. | 2007
- 309
-
An Overview of Telemarketing Fraud Problems and Countermeasures in TaiwanWang, Jau-Hwang / Jow, Jiing-Long / Liao, You-Lu / Tsai, Tyan-muh / Hung, Garfield et al. | 2007
- 311
-
Mining the Core Member of Terrorist Crime Group Based on Social Network AnalysisLiu, Qihong / Tang, Changjie / Qiao, Shaojie / Liu, Qiwei / Wen, Fenlian et al. | 2007
- 314
-
Providing Personalized Services for HWME System by Item-Based Collaborative FilteringLi, Qiudan / Li, Yaodong / He, Huiguang / Geng, Guanggang / Zhu, Yuanping / Wang, Chunheng et al. | 2007
- 316
-
An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security EventsMa, Yang-ming / Li, Zhi-tang / Lei, Jie / Wang, Li / Li, Dong et al. | 2007
- 318
-
Link Analysis-Based Detection of Anomalous Communication PatternsZeng, Daniel / Huang, Zan et al. | 2007
- 321
-
Social Modeling and Reasoning for Security InformaticsMao, Wenji / Zeng, Daniel / Zhang, Li / Wei, Donghua / Wang, Fei-Yue et al. | 2007
- 323
-
Detecting Botnets by Analyzing DNS TrafficTu, Hao / Li, Zhi-tang / Liu, Bin et al. | 2007
- 325
-
HMM-Based Approach for Evaluating Risk PropagationKim, Young-Gab / Lim, Jongin et al. | 2007
- 327
-
A Symptom-Based Taxonomy for an Early Detection of Network AttacksKim, Ki-Yoon / Choi, Hyoung-Kee et al. | 2007