| ²é¿´: 548 | »Ø¸´: 2 | |||
lyrambler½ð³æ (СÓÐÃûÆø)
|
[ÇóÖú]
Çë¸÷λ´óÏÀ°ïæ¿´¿´Õ⼸ƪÎÄÕÂistpÁËÂð£¿
|
|
Çë¸÷λ´óÏÀ°ïæ¿´¿´Õ⼸ƪÎÄÕÂistpÁËÂð£¿ÆäÖÐ5ƪÒѾeiÁË¡£ 1. Cross Layer Algorithm for Lifetime Maximization of Wireless Sensor Network 2. Research of Multi-path routing protocols based on AODV 3. The study on multipath DSDV in Ad Hoc 4.RESEARCH OF DETECTING E-BUSINESS FRAUD BASED ON DATA MINING 5.Research of electronic business security based on public key encryption methods 6.The study on Data Mining for Customer Behavior Modeling in Electronic Commerce ¼´Ê¹±¯¾çÒ²Íû¸æÖªÏ£¬¶àл£¬£¬30½ð±Ò·îÉÏ¡£¡£¡£¡£ |
» ²ÂÄãϲ»¶
²ÄÁÏÓ뻯¹¤328·Öµ÷¼Á
ÒѾÓÐ3È˻ظ´
279·ÖÇóµ÷¼Á Ò»Ö¾Ô¸211
ÒѾÓÐ20È˻ظ´
293Çóµ÷¼Á
ÒѾÓÐ3È˻ظ´
Ò»Ö¾Ô¸»ª¶«Àí¹¤´óѧ081700£¬³õÊÔ·ÖÊý271
ÒѾÓÐ6È˻ظ´
085404µç×ÓÐÅÏ¢284·ÖÇóµ÷¼Á
ÒѾÓÐ3È˻ظ´
306Çó0703µ÷¼ÁÒ»Ö¾Ô¸»ªÖÐʦ·¶
ÒѾÓÐ9È˻ظ´
Ò»Ö¾Ô¸¼ª´ó»¯Ñ§322Çóµ÷¼Á
ÒѾÓÐ6È˻ظ´
Çóµ÷¼Á
ÒѾÓÐ5È˻ظ´
344Çóµ÷¼Á
ÒѾÓÐ3È˻ظ´
Ò»Ö¾Ô¸¹þ¹¤´ó£¬085400£¬320£¬Çóµ÷¼Á
ÒѾÓÐ3È˻ظ´
» ±¾Ö÷ÌâÏà¹Ø¼ÛÖµÌùÍÆ¼ö£¬¶ÔÄúͬÑùÓаïÖú:
Çë¸÷λ´óÏÀ°ïÎÒ¿´¿´Õâ¸ö¹ØÓÚATRP·´Ó¦Ôõô×ö£¬ÓÐûÓбØÒªÕâÑù×ö¡£Ð»Ð»¡£
ÒѾÓÐ3È˻ظ´
Çë¸÷λ°ïæ¿´¿´Õ⼸¸ö·ÛÄ©ÑÜÉäÆ×ͼ
ÒѾÓÐ11È˻ظ´
µÚÒ»´Î·¢SCI Óöµ½ÎÊÌâ Çë¸÷λ´óÏÀ°ïæ·ÖÎö
ÒѾÓÐ7È˻ظ´
°ë·³ö¼Ò£¬Óöµ½Õâ¸ö½»Á÷×迹Æ×²»ÖªµÀÔõô·ÖÎö£¬»¹Çë¸÷λ´óÏÀ°ïæ¿´¿´¡£
ÒѾÓÐ13È˻ظ´
Çë¸÷λ´óÏÀ°ïæ¿´¿´ÈçºÎÐÞ¸Ä
ÒѾÓÐ6È˻ظ´
¸÷λ´óÏÀ°ïÎÒ¿´¿´£¬elsevier
ÒѾÓÐ7È˻ظ´
Çë¸÷λ´óÏÀ°ïæ¿´¿´£ºÃº¶Ñ×Ôȼ±ß½çÌõ¼þÉèÖÃÎÊÌ⡣лл£¡
ÒѾÓÐ6È˻ظ´
¸÷λ´óÏÀ°ïæ¿´¿´ÎÒµÄÕâ¸öÒº¾§Ð¡·Ö×ÓµÄDSCºÍTGAͼ£¬Çó½â´ð¡£
ÒѾÓÐ14È˻ظ´
´óÏÀÃǰïæ¿´¿´Õâ¸ö½ÌÊڵĻظ´ÊÇDZÔÚofferÂð£¿
ÒѾÓÐ17È˻ظ´
¹òÇó¸÷λ´óÏÀ°ïæ¿´¿´ÎÒµÃϸ°ûÔõôÁË~
ÒѾÓÐ11È˻ظ´
ÕâËã²»ËãѧÊõÂÛÎÄÒ»¸å¶àͶ£¨¸÷λ´óÏÀ°ï°ïæ·ÖÎöһϣ¬½ð±ÒºÜÉÙ£¬°ï°ïæ°¡£©
ÒѾÓÐ8È˻ظ´
Çë¸÷λ´óÏÀ°ïæ¿´Ò»ÏÂÎÒµÄÒºÏàÉ«Æ×ͼ¾¿¾¹ÔõôÁË£¿
ÒѾÓÐ13È˻ظ´
Çë´ó¼Ò°ïæ¿´¿´Õ⼸¸öÒ½ÔºÄĸöºÃ£¬Âé·³´ó¼ÒÁË£¿£¿
ÒѾÓÐ12È˻ظ´
ÇëÄÄλ´óÏÀ°ïæ²éһƪÎÄÕÂÊÇ·ñ±»ISTP¼ìË÷
ÒѾÓÐ5È˻ظ´
¡¾ÌÖÂÛ¡¿Óм¸µÀÌâʵÔڸ㲻¶®£¬Âé·³¸÷λ´óÏÀ°ïæ½â¾öÏ£¬»áµÄÈ˺ܼòµ¥¡£
ÒѾÓÐ7È˻ظ´
¡¾ÇóÖú¡¿Çë¸÷λ´óÏÀ°ïÃ¦ÍÆ¼ö¼¸ÖֱȽÏÄÍË®µÄÆøÏàÉ«Æ×Öù~~
ÒѾÓÐ5È˻ظ´
julien323
ľ³æ (ÕýʽдÊÖ)
- Ó¦Öú: 1 (Ó×¶ùÔ°)
- ½ð±Ò: 2646.7
- É¢½ð: 259
- Ìû×Ó: 925
- ÔÚÏß: 545.8Сʱ
- ³æºÅ: 551918
- ×¢²á: 2008-04-28
- ÐÔ±ð: GG
- רҵ: ¿ØÖÆÀíÂÛÓë·½·¨
¡¾´ð°¸¡¿Ó¦Öú»ØÌû
|
RESEARCH OF DETECTING E-BUSINESS FRAUD BASED ON DATA MINING ×÷Õß: Jun, M (Jun, Ma) Êé¼®ÍÅÌå×÷Õß: IEEE À´Ô´³ö°æÎï: 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4 Ò³: 2201-2204 ³ö°æÄê: 2012 ±»ÒýƵ´Î: 0 (À´×Ô Web of Science) ÒýÓõIJο¼ÎÄÏ×: 8 [ ²é¿´ Related Records ] ÒýÖ¤¹ØÏµÍ¼ »áÒé: International Conference on Computer Science and Network Technology (ICCSNT) »áÒ鵨µã: Harbin Normal Univ, Harbin, PEOPLES R CHINA »áÒéÈÕÆÚ: DEC 24-26, 2011 »áÒéÔÞÖúÉÌ: IEEE ÕªÒª: The advent of electronic business (e-business) has made a large change in the way of business. Electronic business growth has increased very much in a great deal of practices. Researchers have posed rules-based auditing systems for electronic business transactions, but they rely on the auditor's knowledge of e-business fraud highly. While fraud happen, it is difficult to deal with by business systems due to the large number of online transactions. In this paper, we introduce a method that to bring about rules from fraud patterns based on data mining. Nextly, the system can distinguish transactions that have a high chance be deceptive by making use of these rules to e-business databases. Èë²ØºÅ: WOS:000304720100502 ÎÄÏ×ÀàÐÍ: Proceedings Paper ÓïÖÖ: English ×÷Õ߹ؼü´Ê: e-business; data mining; auditing systems ͨѶ×÷ÕßµØÖ·: Jun, M (ͨѶ×÷Õß),Luoyang Inst Sci & Technol, Dept Econ & Business Adm, Luoyang, Peoples R China µØÖ·: 1. Luoyang Inst Sci & Technol, Dept Econ & Business Adm, Luoyang, Peoples R China µç×ÓÓʼþµØÖ·: mj@lit.edu.cn ³ö°æÉÌ: IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA Web of Science ·ÖÀà: Computer Science, Hardware & Architecture; Computer Science, Theory & Methods; Engineering, Electrical & Electronic ѧ¿ÆÀà±ð: Computer Science; Engineering IDS ºÅ: BAM59 ISBN: 978-1-4577-1584-6 |

2Â¥2012-07-09 10:43:57
julien323
ľ³æ (ÕýʽдÊÖ)
- Ó¦Öú: 1 (Ó×¶ùÔ°)
- ½ð±Ò: 2646.7
- É¢½ð: 259
- Ìû×Ó: 925
- ÔÚÏß: 545.8Сʱ
- ³æºÅ: 551918
- ×¢²á: 2008-04-28
- ÐÔ±ð: GG
- רҵ: ¿ØÖÆÀíÂÛÓë·½·¨
¡¾´ð°¸¡¿Ó¦Öú»ØÌû
¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï
lyrambler: ½ð±Ò+30, ¡ï¡ï¡ï¡ï¡ï×î¼Ñ´ð°¸, Ê®·Ö¸Ðл¡£ 2012-07-09 11:27:21
lyrambler: ½ð±Ò+30, ¡ï¡ï¡ï¡ï¡ï×î¼Ñ´ð°¸, Ê®·Ö¸Ðл¡£ 2012-07-09 11:27:21
|
1. Cross Layer Algorithm for Lifetime Maximization of Wireless Sensor Network 2. Research of Multi-path routing protocols based on AODV 3. The study on multipath DSDV in Ad Hoc 5.Research of electronic business security based on public key encryption methods 6.The study on Data Mining for Customer Behavior Modeling in Electronic Commerce ÆäËû¾ùδ²éµ½ |

3Â¥2012-07-09 10:45:41













»Ø¸´´ËÂ¥