نتایج جستجو برای: credit cards fraud detection

تعداد نتایج: 610495  

2016
Sapna Gupta

With the continuing growth of E-commerce, credit card fraud has evolved exponentially, where people are using more on-line services to conduct their daily transactions. Fraudsters masquerade normal behaviour of customers to achieve unlawful gains. Fraud patterns are changing rapidly where fraud detection needs to be re-evaluated from a reactive to a proactive approach. In recent years Deep Lear...

Journal: :Journal of Advances in Information Technology 2016

Journal: :IEEE Transactions on Neural Networks 1997

Journal: :Bayesian Analysis 2022

This paper addresses the risk of fraud in credit card transactions by developing a probabilistic model for quickest detection illegitimate purchases. Using optimal stopping theory, goal is to determine moment, known as disorder or time, at which continuously monitored process consumer’s exhibits due fraud, order return best trade-off between two sources cost: on one hand, time should be detecte...

Journal: :International Journal of Software & Hardware Research in Engineering 2021

Journal: :BCP business & management 2023

Credit card is a sign of credit that given to customers with good by commercial bank or firm. It takes the shape signature blank space on back and name dissipated bank, expiration date, CVS number, cardholder front. A payment can give cardholders’ abilities enable exchange for goods services based their credibility debt score. In this paper, it will explore fraud detection predictive model avoi...

1999
R. Brause T. Langsdorf M. Hepp

The prevention of credit card fraud is an important application for prediction techniques. One major obstacle for using neural network training techniques is the high necessary diagnostic quality: Since only one financial transaction of a thousand is invalid no prediction success less than 99.9% is acceptable. Due to these credit card transaction proportions complete new concepts had to be deve...

2012
Keith Weber Juan Pablo Mejía-Ramos

In a recent article, Inglis and Alcock (2012) contended that their data challenge the claim that when mathematicians validate proofs, they initially skim a proof to grasp its main idea prior to reading individual parts of the proof more carefully. This result is based on the fact that when mathematicians read proofs in their study, on average their initial reading of a proof took half as long a...

Journal: :Journal of information processing 2023

Fraudulent access by way of nInternet banking, credit cards and e-commerce are a serious problem. Fraudsters intend to steal credentials log in these websites many ways such as phishing, malware infection, list based attack etc. There products services prevent fraudulent like fraud detection software multi-factor authentication, however have issues installation costs, accuracy operation cost. S...

2016
Youngsam Park Damon McCoy Elaine Shi

Fraudulently posted online rental listings, rental scams, have been frequently reported by users. However, our understanding of the structure of rental scams is limited. In this paper, we conduct the first systematic empirical study of online rental scams on Craigslist. This study is enabled by a suite of techniques that allowed us to identify scam campaigns and our automated system that is abl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید