Anonymous credit cards and their collusion analysis
IEEE/ACM Transactions on Networking (TON)
DEMIDS: a misuse detection system for database systems
Integrity and internal control information systems
Distributed Data Mining in Credit Card Fraud Detection
IEEE Intelligent Systems
Intrusion Detection in Real-Time Database Systems via Time Signatures
RTAS '00 Proceedings of the Sixth IEEE Real Time Technology and Applications Symposium (RTAS 2000)
Emerging eCommerce Credit and Debit Card Protocols
ISEC '02 Proceedings of the Third International Symposium on Electronic Commerce
A Security-Enhanced One-Time Payment Scheme for Credit Card
RIDE '04 Proceedings of the 14th International Workshop on Research Issues on Data Engineering: Web Services for E-Commerce and E-Government Applications (RIDE'04)
Design, Implementation, and Evaluation of A Repairable Database Management System
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
Proceedings of the 12th annual conference companion on Genetic and evolutionary computation
Two-Stage credit card fraud detection using sequence alignment
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Hi-index | 0.00 |
Intrusion prevention mechanisms are largely insufficient for protection of databases against Information Warfare attacks by authorized users and has drawn interest towards intrusion detection. We visualize the conflicting motives between an attacker and a detection system as a multi-stage game between two players, each trying to maximize his payoff. We consider the specific application of credit card fraud detection and propose a fraud detection system based on a game-theoretic approach. Not only is this approach novel in the domain of Information Warfare, but also it improvises over existing rule-based systems by predicting the next move of the fraudster and learning at each step.