Back to Results
First PageMeta Content
Anomaly detection / Data security / Anomaly / Outlier / Computer-aided audit tools / Intrusion detection system / Data Analysis Techniques for Fraud Detection / Statistics / Data analysis / Data mining


Document Date: 2008-10-16 10:32:33


Open Document

File Size: 606,89 KB

Share Result on Facebook
UPDATE