24小时热门版块排行榜    

查看: 338  |  回复: 1

lyrambler

金虫 (小有名气)

[求助] 请各位大侠帮忙看看这几篇文章istp了吗?

请各位大侠帮忙看看这几篇文章istp了吗?其中5篇已经ei了。


1. Cross Layer Algorithm for Lifetime Maximization of Wireless Sensor Network

2. Research of Multi-path routing protocols based on AODV


3. The study on multipath DSDV in Ad Hoc

4.RESEARCH OF DETECTING E-BUSINESS FRAUD BASED ON DATA MINING

5.Research of electronic business security based on public key encryption methods

6.The study on Data Mining for Customer Behavior Modeling in Electronic Commerce

即使悲剧也望告知下,多谢,,20金币奉上。。。。
回复此楼

» 猜你喜欢

» 本主题相关价值贴推荐,对您同样有帮助:

已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖

tjuzhuzhiwen

铁杆木虫 (知名作家)

【答案】应助回帖

★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★
lyrambler: 金币+20, ★★★★★最佳答案, 十分感谢。 2012-08-31 00:11:12
1. Cross Layer Algorithm for Lifetime Maximization of Wireless Sensor Network

ISTP未检索。

2. Research of Multi-path routing protocols based on AODV

ISTP未检索。

3. The study on multipath DSDV in Ad Hoc

ISTP未检索。

4.RESEARCH OF DETECTING E-BUSINESS FRAUD BASED ON DATA MINING

ISTP已检索。
RESEARCH OF DETECTING E-BUSINESS FRAUD BASED ON DATA MINING  
作者: Jun, M (Jun, Ma)  
书籍团体作者: IEEE  
来源出版物: 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4  页: 2201-2204   出版年: 2012  
被引频次: 0 (来自 Web of Science)  
引用的参考文献: 8 [ 查看 Related Records ]     引证关系图      
会议: International Conference on Computer Science and Network Technology (ICCSNT) 会议地点: Harbin Normal Univ, Harbin, PEOPLES R CHINA 会议日期: DEC 24-26, 2011
会议赞助商: IEEE  
摘要: The advent of electronic business (e-business) has made a large change in the way of business. Electronic business growth has increased very much in a great deal of practices. Researchers have posed rules-based auditing systems for electronic business transactions, but they rely on the auditor's knowledge of e-business fraud highly. While fraud happen, it is difficult to deal with by business systems due to the large number of online transactions. In this paper, we introduce a method that to bring about rules from fraud patterns based on data mining. Nextly, the system can distinguish transactions that have a high chance be deceptive by making use of these rules to e-business databases.  
入藏号: WOS:000304720100502  
文献类型: Proceedings Paper  
语种: English  
作者关键词: e-business; data mining; auditing systems  
通讯作者地址: Jun, M (通讯作者),Luoyang Inst Sci & Technol, Dept Econ & Business Adm, Luoyang, Peoples R China.  
地址:
1. Luoyang Inst Sci & Technol, Dept Econ & Business Adm, Luoyang, Peoples R China  
电子邮件地址: mj@lit.edu.cn  
出版商: IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA  
Web of Science 类别: Computer Science, Hardware & Architecture; Computer Science, Theory & Methods; Engineering, Electrical & Electronic  
研究方向: Computer Science; Engineering  
IDS 号: BAM59  
ISBN: 978-1-4577-1584-6  

5.Research of electronic business security based on public key encryption methods

ISTP未检索。

6.The study on Data Mining for Customer Behavior Modeling in Electronic Commerce

ISTP未检索。
2楼2012-08-30 21:06:26
已阅   回复此楼   关注TA 给TA发消息 送TA红花 TA的回帖
相关版块跳转 我要订阅楼主 lyrambler 的主题更新
信息提示
请填处理意见