Author of the publication

A Taxonomy of Frauds and Fraud Detection Techniques.

, and . ICISTM, volume 31 of Communications in Computer and Information Science, page 256-267. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust modeling based on a combination of fuzzy analytic hierarchy process and fuzzy VIKOR., and . Soft Comput., 20 (1): 399-421 (2016)A stochastic epidemiological model for the propagation of active worms considering the dynamicity of network topology., and . Peer-to-Peer Netw. Appl., 8 (6): 1008-1022 (2015)Model checking the observational determinism security property using PROMELA and SPIN., and . Formal Aspects Comput., 27 (5-6): 789-804 (2015)Parametric multisingular hybrid Petri nets: Formal definitions and analysis techniques., and . Inf. Comput., (2015)Differential privacy preserving clustering using Daubechies-2 wavelet transform., and . Int. J. Wavelets Multiresolution Inf. Process., 13 (4): 1550028:1-1550028:35 (2015)A probabilistic trust model for cloud services using Bayesian networks., , and . Soft Comput., 28 (1): 509-526 (January 2024)An Extension for Combination of Duty Constraints in Role-Based Access Control, and . CoRR, (2010)Anomaly Detection in XML-Structured SOAP Messages Using Tree-Based Association Rule Mining., , and . CoRR, (2016)PDETool: A Multi-formalism Modeling Tool for Discrete-Event Systems Based on SDES Description., , and . Petri Nets, volume 5606 of Lecture Notes in Computer Science, page 343-352. Springer, (2009)Task scheduling modelling and reliability evaluation of grid services using coloured Petri nets., and . Future Gener. Comput. Syst., 26 (8): 1141-1150 (2010)