Computer fraud

Results: 842



#Item
31Identifying Individuals using Identity Features and Social Information Matthew Rowe Web Intelligence Technologies Lab Department of Computer Science University of Sheffield, UK

Identifying Individuals using Identity Features and Social Information Matthew Rowe Web Intelligence Technologies Lab Department of Computer Science University of Sheffield, UK

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2008-04-27 08:09:44
32+entrust.com/financial-institutions Entrust TransactionGuard for Real-Time Fraud Detection

+entrust.com/financial-institutions Entrust TransactionGuard for Real-Time Fraud Detection

Add to Reading List

Source URL: www.entrust.com

Language: English - Date: 2016-01-14 11:24:35
33SYSTEM AUTHORIZATION ACCESS REQUEST (SAAR) PRIVACY ACT STATEMENT Executive Order 10450, 9397; and Public Law, the Computer Fraud and Abuse Act. AUTHORITY: PRINCIPAL PURPOSE: To record names, signatures, and other

SYSTEM AUTHORIZATION ACCESS REQUEST (SAAR) PRIVACY ACT STATEMENT Executive Order 10450, 9397; and Public Law, the Computer Fraud and Abuse Act. AUTHORITY: PRINCIPAL PURPOSE: To record names, signatures, and other

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2014-11-25 11:39:13
    34White Paper  Combating Identity Fraud: An Overview of Complementary Approaches  Identity fraud demands constantly evolving

    White Paper Combating Identity Fraud: An Overview of Complementary Approaches Identity fraud demands constantly evolving

    Add to Reading List

    Source URL: lexisnexis.com

    Language: English - Date: 2014-10-15 08:43:57
    35Fraud taxonomy March, 2015 The terms defined in the taxonomy below are not necessarily mutually exclusive of one another. Ad impressions can have different but sometimes overlapping definitions. Illegitimate and Non-Huma

    Fraud taxonomy March, 2015 The terms defined in the taxonomy below are not necessarily mutually exclusive of one another. Ad impressions can have different but sometimes overlapping definitions. Illegitimate and Non-Huma

    Add to Reading List

    Source URL: www.tagtoday.net

    Language: English - Date: 2015-03-23 16:50:31
    36Computer Fraud & Security, March 2007                                                                                         

    Computer Fraud & Security, March 2007                                                                                         

    Add to Reading List

    Source URL: www.ucci.it

    Language: English - Date: 2007-06-22 07:58:26
      37White Paper  Identity Proofing: Government’s first line of defense against fraud and improper payments We haven’t been formally introduced. But I’d like my Social Service Benefits now, please.

      White Paper Identity Proofing: Government’s first line of defense against fraud and improper payments We haven’t been formally introduced. But I’d like my Social Service Benefits now, please.

      Add to Reading List

      Source URL: lexisnexis.com

      Language: English - Date: 2014-10-15 08:44:03
      38Mixnets in Electronic Voting Ben Adida Cryptography and Information Security Group MIT Computer Science and Artificial Intelligence Laboratory

      Mixnets in Electronic Voting Ben Adida Cryptography and Information Security Group MIT Computer Science and Artificial Intelligence Laboratory

      Add to Reading List

      Source URL: assets.adida.net

      Language: English - Date: 2011-04-11 17:38:58
      39AF-TRUST-GNC - Annual Review Presentations

      AF-TRUST-GNC - Annual Review Presentations

      Add to Reading List

      Source URL: w2spconf.com

      Language: English - Date: 2012-02-07 16:10:03
      40F.R.O.S.T. Fraud Recovery and Overpayment System Tracking “Put the Freeze on Fraud” Computer software designed for and in cooperation with overpayment & fraud professionals. F.R.O.S.T. is a comprehensive multi-user i

      F.R.O.S.T. Fraud Recovery and Overpayment System Tracking “Put the Freeze on Fraud” Computer software designed for and in cooperation with overpayment & fraud professionals. F.R.O.S.T. is a comprehensive multi-user i

      Add to Reading List

      Source URL: www.swordsolutions.com

      Language: English - Date: 2012-02-19 18:54:11