Fraud prevention in the system of electronic payments on the basis of monitoring and analysis events in POS-networks
Abstract
Full Text:
PDF (Russian)References
Manworren, N., Letwat, J., Daily, O., Why you should care about the Target data breach, Business Horizons, Volume 59, Issue 3, 1 May 2016.
Lodi, G., Aniello, L., Di Luna, G.A., Baldoni, R., An event-based platform for collaborative threats detection and monitoring, Information Systems, Volume 39, Issue 1, 2014.
The PCI Security Standards [Jelektronnyj resurs]. Rezhim dostupa: https://www.pcisecuritystandards.org/pci_security/ (data obrashhenija: 01.05.2017).
Aihua Shen, Rencheng Tong, Yaochen Deng, Application of Classification Models on Credit Card Fraud Detection, 2007 International Conference on Service Systems and Service Management, 2007, pp 1 – 4.
Martin Fowler, Event Sourcing: Capture all changes to an application state as a sequence of events. 12 December 2005
Buchmann, A. "Real Time Database Systems." Encyclopedia of Database Technologies and Applications. Ed. Laura C. Rivero, Jorge H. Doorn, and Viviana E. Ferraggine. Idea Group, 2005.
Kanitkar, Vinay & Alex Delis (1997). "A Case for Real-Time Client-Server Databases.". Brooklyn, New York: Polytechnic University. Retrieved 13 December 2006.
I. Hickson, The WebSocket protocol draft-hixie-thewebsocketprotocol-76. Google, Inc. May 6, 2010.
Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., & Stal, M. (1996). Pattern Oriented Software Architecture, Volume 1: A System of Patterns. John Wiley & Sons, 1996, pp. 339—343.
Kozlov D.V., Analiz metodov obnaruzhenija i predotvrashhenija ugroz moshennichestva v informacionnyh sistemah, Izvestija Volgogradskogo gosudarstvennogo tehnicheskogo universiteta. 2017. # 1 (196). S. 112-115.
Gianluca Tiepolo, “Getting Started with RethinkDB”. March 2016.
Refbacks
- There are currently no refbacks.
Abava Кибербезопасность IT Congress 2024
ISSN: 2307-8162