Author of the publication

Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud.

, , , , , , , , and . Financial Cryptography, volume 9603 of Lecture Notes in Computer Science, page 22-40. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Template Attacks., , and . CHES, volume 2523 of Lecture Notes in Computer Science, page 13-28. Springer, (2002)Randomness-Optimal Unique Element Isolation with Applications to Perfect Matching and Related Problems., , and . SIAM J. Comput., 24 (5): 1036-1050 (1995)Improving Known Solutions is Hard., , and . ICALP, volume 510 of Lecture Notes in Computer Science, page 381-392. Springer, (1991)On Completeness under Random Reductions., and . SCT, page 176-184. IEEE Computer Society, (1993)Generating Balanced Classifier-Independent Training Samples from Unlabeled Data., , , and . PAKDD (1), volume 7301 of Lecture Notes in Computer Science, page 266-281. Springer, (2012)Adversaries' Holy Grail: access control analytics., , and . BADGERS@EuroSys, page 54-61. ACM, (2011)Tri-Modularization of Firewall Policies., , , , , , and . SACMAT, page 37-48. ACM, (2016)BlueBoX: A policy-driven, host-based intrusion detection system., and . ACM Trans. Inf. Syst. Secur., 6 (2): 173-200 (2003)System for automatic estimation of data sensitivity with applications to access control and other applications., , , and . SACMAT, page 145-146. ACM, (2011)PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets., , , , , , and . WWW, page 594-604. ACM, (2019)