任意 发表于 2025-3-23 11:12:36

http://reply.papertrans.cn/15/1479/147817/147817_11.png

DUST 发表于 2025-3-23 16:47:46

Using Fraud Trees to Analyze Internet Credit Card Fraud978-1-137-29027-4

encomiast 发表于 2025-3-23 18:16:33

http://reply.papertrans.cn/15/1479/147817/147817_13.png

失眠症 发表于 2025-3-23 22:40:56

http://reply.papertrans.cn/15/1479/147817/147817_14.png

medium 发表于 2025-3-24 02:24:55

Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus978-94-015-3173-3

heirloom 发表于 2025-3-24 07:26:33

http://reply.papertrans.cn/15/1479/147817/147817_16.png

愤慨一下 发表于 2025-3-24 14:36:09

Active Linguistic Authentication Using Real-Time Stylometric Evaluation for Multi-Modal Decision Fus978-1-349-01854-3

者变 发表于 2025-3-24 14:51:01

http://reply.papertrans.cn/15/1479/147817/147817_18.png

遗弃 发表于 2025-3-24 21:06:31

An Exploratory Profiling Study of Online Auction Fraudstersomenon of affective nihilism, Creasy argues that affective nihilism might be overcome by employing a variety of Nietzschean strategies: experimentation, self-narration, and self-genealogy..978-3-030-37135-7978-3-030-37133-3

COLIC 发表于 2025-3-25 00:07:50

http://reply.papertrans.cn/15/1479/147817/147817_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Advances in Digital Forensics X; 10th IFIP WG 11.9 In Gilbert Peterson,Sujeet Shenoi Conference proceedings 2014 IFIP International Federat