| ²é¿´: 378 | »Ø¸´: 1 | |||
lyrambler½ð³æ (СÓÐÃûÆø)
|
[ÇóÖú]
Çë¸÷λ´óÏÀ°ïæ¿´¿´Õ⼸ƪÎÄÕÂistpÁËÂð£¿
|
|
Çë¸÷λ´óÏÀ°ïæ¿´¿´Õ⼸ƪÎÄÕÂistpÁËÂð£¿ÆäÖÐ5ƪÒѾeiÁË¡£ 1. Cross Layer Algorithm for Lifetime Maximization of Wireless Sensor Network 2. Research of Multi-path routing protocols based on AODV 3. The study on multipath DSDV in Ad Hoc 4.RESEARCH OF DETECTING E-BUSINESS FRAUD BASED ON DATA MINING 5.Research of electronic business security based on public key encryption methods 6.The study on Data Mining for Customer Behavior Modeling in Electronic Commerce ¼´Ê¹±¯¾çÒ²Íû¸æÖªÏ£¬¶àл£¬£¬20½ð±Ò·îÉÏ¡£¡£¡£¡£ |
» ²ÂÄãϲ»¶
081700 µ÷¼Á 267·Ö
ÒѾÓÐ8È˻ظ´
Çë½ÌÏ´ó¼Ò 2026Äê¹ú¼Ò»ù½ðÉêÇëÊÇ˫äÉóÂð£¿
ÒѾÓÐ5È˻ظ´
276Çóµ÷¼Á¡£ÓаëÄêµç³ØºÍ°ëÄê¸ß·Ö×Óʵϰ¾Àú
ÒѾÓÐ10È˻ظ´
Ò»Ö¾Ô¸ÄϺ½²ÄÁÏר317·ÖÇóµ÷¼Á
ÒѾÓÐ4È˻ظ´
Çóµ÷¼Á
ÒѾÓÐ4È˻ظ´
ÉúÎïѧѧ˶Çóµ÷¼Á
ÒѾÓÐ5È˻ظ´
284Çóµ÷¼Á
ÒѾÓÐ10È˻ظ´
һ־Ըɽ¶«´óѧҩѧѧ˶Çóµ÷¼Á
ÒѾÓÐ4È˻ظ´
07»¯Ñ§280·ÖÇóµ÷¼Á
ÒѾÓÐ4È˻ظ´
298-Ò»Ö¾Ô¸Öйúũҵ´óѧ-Çóµ÷¼Á
ÒѾÓÐ12È˻ظ´
» ±¾Ö÷ÌâÏà¹Ø¼ÛÖµÌùÍÆ¼ö£¬¶ÔÄúͬÑùÓаïÖú:
´óÏÀÃǰïæ¿´¿´ÕâÊǽÍĸ¾úÂð
ÒѾÓÐ30È˻ظ´
ÇëÅóÓѰïæ²éÏÂÕâÈýƪÎÄÕÂÓÐûÓб»ISTP¼ìË÷£¿Ð»Ð»£¡£¡
ÒѾÓÐ3È˻ظ´
ÇóÖú¸÷λ´óÏÀ ´óʦ ¿ìÀ´°ï°ïæ СŮ×Ó²»Ê¤¸Ð¼¤°¡ £¡£¡£¡
ÒѾÓÐ5È˻ظ´
¸÷λ´óÏÀ°ï°ïæ
ÒѾÓÐ3È˻ظ´
°ïæ¼ìË÷¼¸ÆªÂÛÎÄ£¬Ð»Ð»£¡
ÒѾÓÐ3È˻ظ´
Õâ¸öÄ£ÐÍÔõôÓÃÓ³É䡢ɨÂÔÍø¸ñ»®·Ö£¬Çë¸÷λ´óÏÀ°ïæ¿´¿´°É£¬Ð¡Å®×Ӹм¤²»¾¡£¡
ÒѾÓÐ3È˻ظ´
°ïæ²éϼìË÷-ÔÚÏßµÈ
ÒѾÓÐ4È˻ظ´
Çó´óÏÀ¿´¿´ÎÄÕ ÓÐûÓб»¼ìË÷
ÒѾÓÐ6È˻ظ´
Çó¸÷λ´óÏÀ°ïæ
ÒѾÓÐ11È˻ظ´
elsevierͶ¸åÇóÖú£¬Çó¸÷λ´óÏÀ°ïæ
ÒѾÓÐ9È˻ظ´
¸÷λ´óÏÀ£¬°ï°ïæ
ÒѾÓÐ19È˻ظ´
¼±£¬Íû¸÷λ´óÏÀ°ï棨¹ØÓÚ ÊÖÍóºÍ½ÅÏ¥¸ÇÓеãÏñŤµ½½îÒ»ÑùµÄÌÛÍ´£©
ÒѾÓÐ11È˻ظ´
°ïæ²éÒ»ÏÂÕâ2ƪÎÄÕµÄISTP¼ìË÷ºÅ
ÒѾÓÐ3È˻ظ´
°ë·³ö¼Ò£¬Óöµ½Õâ¸ö½»Á÷×迹Æ×²»ÖªµÀÔõô·ÖÎö£¬»¹Çë¸÷λ´óÏÀ°ïæ¿´¿´¡£
ÒѾÓÐ13È˻ظ´
ÄÄλ´óÏÀ°ïæ²éһϣ¬ÕâÁ½ÆªÎÄÕ£¬ÊÇ·ñÒѾ±»SCIÊÕ¼£¬ÆÀÖ°³Æ¼±ÓÃ
ÒѾÓÐ9È˻ظ´
ÇëÄÄλ´óÏÀ°ïæ²éһƪÎÄÕÂÊÇ·ñ±»ISTP¼ìË÷
ÒѾÓÐ5È˻ظ´
¡¾ÌÖÂÛ¡¿Óм¸µÀÌâʵÔڸ㲻¶®£¬Âé·³¸÷λ´óÏÀ°ïæ½â¾öÏ£¬»áµÄÈ˺ܼòµ¥¡£
ÒѾÓÐ7È˻ظ´
¡¾ÇóÖú/½»Á÷¡¿vector °²×°²»ÁËÔõô»ØÊ°¡£¿¸÷λ´óÏÀ°ï°ïæ°¡
ÒѾÓÐ3È˻ظ´
ÎÄÕ»ØÀ´£¬Çë´óÏÀ°ïæ¿´¿´
ÒѾÓÐ8È˻ظ´
¡¾ÇóÖú¡¿ÇëÄÄλ´óÏÀ°ïæËãÏÂÕ⼸¸ö³ÌÐò
ÒѾÓÐ8È˻ظ´
tjuzhuzhiwen
Ìú¸Ëľ³æ (ÖªÃû×÷¼Ò)
- Ó¦Öú: 41 (СѧÉú)
- ½ð±Ò: 5280.2
- ºì»¨: 89
- ɳ·¢: 5
- Ìû×Ó: 5382
- ÔÚÏß: 3364.7Сʱ
- ³æºÅ: 1436262
- ×¢²á: 2011-10-11
- ÐÔ±ð: GG
- רҵ: ¶¯Á¦Ñ§Óë¿ØÖÆ
¡¾´ð°¸¡¿Ó¦Öú»ØÌû
¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï
lyrambler: ½ð±Ò+20, ¡ï¡ï¡ï¡ï¡ï×î¼Ñ´ð°¸, Ê®·Ö¸Ðл¡£ 2012-08-31 00:11:12
lyrambler: ½ð±Ò+20, ¡ï¡ï¡ï¡ï¡ï×î¼Ñ´ð°¸, Ê®·Ö¸Ðл¡£ 2012-08-31 00:11:12
|
1. Cross Layer Algorithm for Lifetime Maximization of Wireless Sensor Network ISTPδ¼ìË÷¡£ 2. Research of Multi-path routing protocols based on AODV ISTPδ¼ìË÷¡£ 3. The study on multipath DSDV in Ad Hoc ISTPδ¼ìË÷¡£ 4.RESEARCH OF DETECTING E-BUSINESS FRAUD BASED ON DATA MINING ISTPÒѼìË÷¡£ RESEARCH OF DETECTING E-BUSINESS FRAUD BASED ON DATA MINING ×÷Õß: Jun, M (Jun, Ma) Êé¼®ÍÅÌå×÷Õß: IEEE À´Ô´³ö°æÎï: 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4 Ò³: 2201-2204 ³ö°æÄê: 2012 ±»ÒýƵ´Î: 0 (À´×Ô Web of Science) ÒýÓõIJο¼ÎÄÏ×: 8 [ ²é¿´ Related Records ] ÒýÖ¤¹ØÏµÍ¼ »áÒé: International Conference on Computer Science and Network Technology (ICCSNT) »áÒ鵨µã: Harbin Normal Univ, Harbin, PEOPLES R CHINA »áÒéÈÕÆÚ: DEC 24-26, 2011 »áÒéÔÞÖúÉÌ: IEEE ÕªÒª: The advent of electronic business (e-business) has made a large change in the way of business. Electronic business growth has increased very much in a great deal of practices. Researchers have posed rules-based auditing systems for electronic business transactions, but they rely on the auditor's knowledge of e-business fraud highly. While fraud happen, it is difficult to deal with by business systems due to the large number of online transactions. In this paper, we introduce a method that to bring about rules from fraud patterns based on data mining. Nextly, the system can distinguish transactions that have a high chance be deceptive by making use of these rules to e-business databases. Èë²ØºÅ: WOS:000304720100502 ÎÄÏ×ÀàÐÍ: Proceedings Paper ÓïÖÖ: English ×÷Õ߹ؼü´Ê: e-business; data mining; auditing systems ͨѶ×÷ÕßµØÖ·: Jun, M (ͨѶ×÷Õß),Luoyang Inst Sci & Technol, Dept Econ & Business Adm, Luoyang, Peoples R China. µØÖ·: 1. Luoyang Inst Sci & Technol, Dept Econ & Business Adm, Luoyang, Peoples R China µç×ÓÓʼþµØÖ·: mj@lit.edu.cn ³ö°æÉÌ: IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA Web of Science Àà±ð: Computer Science, Hardware & Architecture; Computer Science, Theory & Methods; Engineering, Electrical & Electronic Ñо¿·½Ïò: Computer Science; Engineering IDS ºÅ: BAM59 ISBN: 978-1-4577-1584-6 5.Research of electronic business security based on public key encryption methods ISTPδ¼ìË÷¡£ 6.The study on Data Mining for Customer Behavior Modeling in Electronic Commerce ISTPδ¼ìË÷¡£ |
2Â¥2012-08-30 21:06:26













»Ø¸´´ËÂ¥