نتایج جستجو برای: credit transaction

تعداد نتایج: 54198  

Journal: :Expert Syst. Appl. 2011
Ekrem Duman M. Hamdi Özçelik

In this study we develop a method which improves a credit card fraud detection solution currently being used in a bank. With this solution each transaction is scored and based on these scores the transactions are classified as fraudulent or legitimate. In fraud detection solutions the typical objective is to minimize the wrongly classified number of transactions. However, in reality, wrong clas...

Journal: :Electronic Commerce Research and Applications 2005
Yingjiu Li Xinwen Zhang

Traditional credit card payment is not secure against credit card frauds because an attacker can easily know a semisecret credit card number that is repetitively used. Recently one-time transaction number has been proposed by some researchers and credit card companies to enhance the security in credit card payment. Following this idea, we present a practical security enhancement scheme for one-...

Journal: :Expert Syst. Appl. 2011
Mieke Jans Jan Martijn E. M. van der Werf Nadine Lybaert Koen Vanhoof

Corporate fraud these days represents a huge cost to our economy. In the paper we address one specific type of corporate fraud, internal transaction fraud. Given the omnipresence of stored history logs, the field of process mining rises as an adequate answer to mitigating internal transaction fraud. Process mining diagnoses processes by mining event logs. This way we can expose opportunities to...

Journal: :Journal of Intelligent Learning Systems and Applications 2019

2007
Ian Molloy Jiangtao Li Ninghui Li

Theft of stored credit card information is an increasing threat to e-commerce. We propose a dynamic virtual credit card number scheme that reduces the damage caused by stolen credit card numbers. A user can use an existing credit card account to generate multiple virtual credit card numbers that are either usable for a single transaction or are tied with a particular merchant. We call the schem...

Journal: Money and Economy 2016

Letter of Credit is an international payment instrument whereby the issuing bank undertakes to pay the beneficiary, against presentation of certain stipulated documents, according to the conditions of the Letter of Credit. Discounting of LC for the short-term financing of the seller, due to the independent and irrevocable undertaking of the bank to make payment, is prevalent. Beneficiary gets t...

2016
Su Zhou Alan Montgomery Geoff Gordon

Background: Prepaid cards are reloadable charge cards typically designed for customers that would not be able to have a traditional credit card due to no or poor credit history, and hence unable to open checking account or credit card at a bank. Many prepaid card customers would have their salary credited to their account and make most withdrawals and purchases on this card since they do not ha...

2013
Jung-San Lee Kuo-Jui Wei Shin-Jen Chen Bo Li Yuan Xue Feng Chia

People have transferred their business model from traditional commerce to e-commerce in recent decades. Both shopping and payment can be completed through the Internet and bring convenience to consumers and business opportunities to industry. These trade techniques are mostly set up based on the SSL (Secure Sockets Layer). SSL provides the security for transaction information and is easy to set...

2012
Khyati Chaudhary Bhawna Mallick

Data mining has been increasing as one of the chief key features of many security initiatives. Often, used as a means for detection of fraud, assessing risk as well. Data mining involves the use of data analysis tools to discover unknown, valid patterns as well as relationships in large data sets. Decades have seen a massive growth in the use of credit cards as a transactional medium. Data mini...

2015
MANOJ MISHRA NITESH GUPTA

Instant identification of outlier patterns is very important in modern-day engineering problems such as credit card fraud detection and network intrusion detection. Most previous studies focused on finding outliers that are hidden in numerical datasets. Unfortunately, those outlier detection methods were not directly applicable to real life transaction databases. Outlier detection methods are d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید