Beating AML: Know Your Enemy

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Know Your Enemy: Honeynets

Over the past several years the Honeynet Project has been dedicated to learning the tools, tactics, and motives of the blackhat community and sharing the lessons learned. The primary tool used to gather this information is the Honeynet. The purpose of this paper is to discuss what a Honeynet is, its value, how it works, and the risks/issues involved. It is hoped that the security community can ...

متن کامل

Cancer therapy: know your enemy?

BACKGROUND Most cancer therapies are devised for adult or even elder patients. However, when dealing with pediatric cancers, additional considerations are needed. CONCLUSIONS This review discusses non-classic components of tumors and highlights possible treatment approaches which might be of particular benefit for children and adolescents.

متن کامل

Animal Cognition: Know Your Enemy

Food-storing corvids are able to remember which individual saw them store food, and take preventive action that is tailored to that particular competitor's knowledge. This raises the question of whether abilities like 'theory of mind' have arisen independently more than once in evolution.

متن کامل

Know Your Enemy: Malicious Web Servers

INTRODUCTION Today, many attackers are part of organized crime with the intent to defraud their victims. Their goal is to deploy malware on a victim’s machine and to start collecting sensitive data, such as online account credentials and credit card numbers. Since attackers have a tendency to take the path of least resistance and many traditional attack paths are barred by a basic set of securi...

متن کامل

Know Your Enemy: Applying Cognitive Modeling in Security Domain

Game Theory -based decision aids have been successfully employed in real-world policing, anti-terrorism, and wildlife conservation efforts (Tambe, Jiang, An, & Jain, 2013). Cognitive modeling, in concert with model tracing and dynamic parameter fitting techniques, may be used to improve the performance of such decision aids by predicting individual attacker behavior in repeated security games. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Hematologist

سال: 2019

ISSN: 1551-8779

DOI: 10.1182/hem.v16.2.9454