• Aucun résultat trouvé

Fraud detection

A Framework for Occupational Fraud Detection by Social Network Analysis

A Framework for Occupational Fraud Detection by Social Network Analysis

... mining, fraud detection, social net- work analysis, internal control, governance, risk, ...years, fraud- ster’s attack methodologies have evolved from an opportunistic approach to some more ...

9

Influence factors on users' perception on the independent auditor's fraud detection responsibility

Influence factors on users' perception on the independent auditor's fraud detection responsibility

... to fraud reinforces the view that the auditor should assume greater responsibility for fraud detection (Cohen et ...making fraud detection an objective of financial audit (Browning, ...

134

Synthetic logs generator for fraud detection in mobile transfer services

Synthetic logs generator for fraud detection in mobile transfer services

... simulation, fraud detection Mobile payments become more and more popular and, thus, are very attractive targets for ...avoid detection appear, research in the field of fraud is always ...in ...

2

Synthetic logs generator for fraud detection in mobile transfer services

Synthetic logs generator for fraud detection in mobile transfer services

... in fraud detection is limited because publicly available transactional databases containing frauds are scarce [1], ...for fraud detection in mobile ...about fraud is ...

7

A Multi-Agent Systems Approach for Fraud Detection in Personal Communication Systems

A Multi-Agent Systems Approach for Fraud Detection in Personal Communication Systems

... some detection may be carried out faster at the subscriber ...to fraud such as hacking User Profiles and falsely inserting numbers or clonning Personal Communication ...

11

Statistical methods for insurance fraud detection

Statistical methods for insurance fraud detection

... At first glance, the PRIDIT method seems to be a good option to detect fraudulent claims while the various clusters seem irrelevant to insurance fraud. It[r] ...

115

Low-field NMR for quality control and fraud detection : application to the analysis of dietary supplements and e-liquids

Low-field NMR for quality control and fraud detection : application to the analysis of dietary supplements and e-liquids

... LF NMR as an economic and user-friendly method was recently applied for forensic propose and synthetic drug detection. Several publications described the identification of psychoactive adulterants in seized drugs ...

174

An algorithm for rule selection on fuzzy rule-based system applied to the treatment of diabetics and detection fraud in electronic payment,

An algorithm for rule selection on fuzzy rule-based system applied to the treatment of diabetics and detection fraud in electronic payment,

... IV. A PPLICATION : D ETECTING FRAUDULOUS BEHAVIOR OF A BANK CUSTOMER A. The application Along with the development of credit cards, fraudulent activities become a major problem in electronic payment sys- tems. According ...

6

A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol

A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol

... rorist Fraud (TF), in which a malicious yet legitimate prover helps a cooperative MiM accomplice to ...back-end fraud detection mechanisms have been deployed to prevent any massive ...

13

Jeanne Dumée as Astronomer and Woman in Seventeenth-Century France : The Myth, the Fraud, and Her Lost Voice

Jeanne Dumée as Astronomer and Woman in Seventeenth-Century France : The Myth, the Fraud, and Her Lost Voice

... mention!of!Cartesian!vortices!around!Jupiter!(again!only!in!La!Roque’s!review!and!not!in! the!BNF!manuscript)!to!explain!the!fact!that!the!planet!carried!its!four!moon!around!it!in! its![r] ...

46

Detection and emergence

Detection and emergence

... would emerge anywhere in the absence of human observers and of their conceptual constructions. The study of emergence, somewhat unexpectedly, tells us something important about human cognition. The fact that perceptual ...

10

Transport congestion events detection (TCED): towards decorrelating congestion detection from TCP

Transport congestion events detection (TCED): towards decorrelating congestion detection from TCP

... 2. MOTIVATION TO BUILD A STAND-ALONE TCP CONGESTION EVENTS ALGORITHM These last years, the number of TCP variants and mi- nor extensions have greatly increase (see [tcpm], [iccrg] and [tsvwg] IETF mailing lists). Some of ...

9

Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data

Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data

... Other works use graphs to detect attacks and more precisely to detect bot- nets [23, 12, 18]. They use network-related data to build topological graphs with nodes representing hosts and links representing network ...

21

Acoustic boiling detection

Acoustic boiling detection

... Array Size Indicator (normal): Allows the user to choose the number of data of the. type indicated by the Input Type Ring[r] ...

107

On boundary detection

On boundary detection

... The aim of this paper is to provide a statistical test to decide whether the bound- ary of the support is empty or not and, when the answer is affirmative, to provide an heuristic method[r] ...

42

Detection d'objets en mouvement

Detection d'objets en mouvement

... L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignemen[r] ...

5

Tax Evasion, Welfare Fraud, and ”The Broken Windows” Effect: An Experiment in Belgium, France and the Netherlands

Tax Evasion, Welfare Fraud, and ”The Broken Windows” Effect: An Experiment in Belgium, France and the Netherlands

... welfare fraud but report their income honestly anyway; (iii) examples of low compliance tend to increase tax evasion while examples of high compliance exert no influence; (iv) tax evasion is more frequent in ...

49

Tax Evasion, Welfare Fraud, and "The Broken Windows" Effect: An Experiment in Belgium, France and the Netherlands

Tax Evasion, Welfare Fraud, and "The Broken Windows" Effect: An Experiment in Belgium, France and the Netherlands

... L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignemen[r] ...

52

DETECTION ET RECONNAISSANCE DE VISAGE

DETECTION ET RECONNAISSANCE DE VISAGE

... Résultats obtenus avec la méthode RIE: Les ensembles d'apprentissage et de test utilisés avec l'algorithme des visages propres des images réduites sont ceux de la deuxième configuration [r] ...

143

Detection Signal Design for Failure Detection: a Robust Approach

Detection Signal Design for Failure Detection: a Robust Approach

... L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignemen[r] ...

38

Show all 3033 documents...

Sujets connexes