Search Results - (( fraud detection computer algorithm ) OR ( java implication based algorithm ))
Search alternatives:
-
1
Credit Card Fraud Detection Using AdaBoost and Majority Voting
Published 2018Get full text
Get full text
Article -
2
Employing Artificial Intelligence to Minimize Internet Fraud
Published 2009“…Following this, an a ttempt is made to propose using the MonITARS (Monitoring In sider Trading and Regulatory Surveillance) Systems framework which uses a combination of genetic algorithms, neural nets and statistical analysis in detecting insider dealing, to be used in the detection of transaction fraud. …”
Get full text
Get full text
Article -
3
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023Subjects:Conference Paper -
4
-
5
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…The identification of outliers can lead to the discovery of unexpected knowledge in areas such as credit card fraud detection, calling card fraud detection, discovering criminal behaviors, discovering computer intrusion, etc. …”
Get full text
Get full text
Conference or Workshop Item -
6
Botnet detection using automated script / Norfathin Rosli
Published 2020“…The project is dedicated for Network and Security Analyst to develop better algorithm for botnet detect and prevents. This Botnet are malicious software that controlled networks of hijacked computers and aiming for distributed coordinate network initiate various malicious over network activities including click fraud, spam, and phishing. …”
Get full text
Get full text
Thesis -
7
RFID-enabled supply chain detection using clustering algorithms
Published 2015Get full text
Get full text
Conference or Workshop Item -
8
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…Boyer - Moore algorithm was claimed to be the fastest algorithm among the others. …”
Get full text
Get full text
Research Reports -
9
-
10
A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Student attendance system using facial recognition based on deep learning / Syahila Aina Haris and Zulfikri Paidi
Published 2023“…As a result, the computer can identify faces. This algorithm can identify the faces of students who appear in class, and their attendance will be recorded automatically into the system. …”
Get full text
Get full text
Book Section -
12
An enhanced android botnet detection approach using feature refinement
Published 2019“…Although the existing analyses have been obtained a good accuracy, but the attackers find novel ways of skipping the detection while performing harmful activities. Furthermore, the existing detection techniques can detect only malicious Android applications, while they are unable to detect the Android botnet applications. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
-
16
-
17
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis
