侵略者 发表于 2025-4-1 04:45:34

http://reply.papertrans.cn/87/8636/863532/863532_61.png

judiciousness 发表于 2025-4-1 09:38:52

Fraud Detection in ERP Systems Using Scenario Matchingore sophisticated patterns of fraudulent activity as evidenced by the legal requirement for company audits and the common incidence of fraud. This paper describes the design and implementation of a framework for detecting patterns of fraudulent activity in ERP systems. We include the description of

Substance 发表于 2025-4-1 13:51:25

Use of IP Addresses for High Rate Flooding Attack DetectionIn this work we demonstrate how using packet source IP addresses coupled with a change-point analysis of the rate of arrival of new IP addresses may be sufficient to detect the onset of a high-rate flooding attack. Importantly, minimizing the number of features to be examined, directly addresses the

Esophagitis 发表于 2025-4-1 14:50:01

http://reply.papertrans.cn/87/8636/863532/863532_64.png
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Security and Privacy - Silver Linings in the Cloud; 25th IFIP TC 11 Inte Kai Rannenberg,Vijay Varadharajan,Christian Weber Conference proce