A method for fraud detection when installing mobile applications was proposed. The developed method, in contrast to existing ones, uses all available data regardless of their types, dimensions, and discrepancies and converts such data into homogeneous coefficients based on the proposed scaling method. This approach allows one to improve accuracy of task solution and build an open to expansion knowledge base with characteristics of fraudsters and rules of detecting fraudulent users. A system of scales for converting heterogeneous data into homogeneous coefficients has been developed which has enabled construction of a mathematical model of the scaling process. The algorithm of scaling heterogeneous data sets based on the proposed scales and ...
The topic of this thesis is fraud detection in mobile communications networks by means of user profi...
To overcome the financial loss and threat, fraud detection is a must. New theories and many techniqu...
During the course of the European project \Advanced Security for Personal Communication Technologies...
International audienceMobile payments become more and more popular and, thus, are very attractive ta...
The aim of this thesis is to analyze and design solutions in a digital platform. Part of the work wi...
Mobile application plays an important role for all the smart phone users to play or perform differen...
Mobile application plays an important role for all the smart phone users to play or perform differen...
Detecting anomalous pattern and data points when collecting information from online mobile devices i...
The thesis mainly focuses on applying fuzzy and rough set theory to the mobile adver-tisement fraud ...
Culprits' identi cation by the means of suspicious pattern detection techniques from mobile device ...
Fraud detection is an important application, since network operators lose a relevant portion of thei...
A methodology is proposed for optimizing the allocation of resources in the detection of computer fr...
The increase in mobile phones accessibility and technological advancement in almost every corner of ...
Abstract- Telecommunications fraud is increasing dramatically each year resulting in loss of a large...
The number of fraudulent activities is increasing dramatically in telecommunication networks, mobile...
The topic of this thesis is fraud detection in mobile communications networks by means of user profi...
To overcome the financial loss and threat, fraud detection is a must. New theories and many techniqu...
During the course of the European project \Advanced Security for Personal Communication Technologies...
International audienceMobile payments become more and more popular and, thus, are very attractive ta...
The aim of this thesis is to analyze and design solutions in a digital platform. Part of the work wi...
Mobile application plays an important role for all the smart phone users to play or perform differen...
Mobile application plays an important role for all the smart phone users to play or perform differen...
Detecting anomalous pattern and data points when collecting information from online mobile devices i...
The thesis mainly focuses on applying fuzzy and rough set theory to the mobile adver-tisement fraud ...
Culprits' identi cation by the means of suspicious pattern detection techniques from mobile device ...
Fraud detection is an important application, since network operators lose a relevant portion of thei...
A methodology is proposed for optimizing the allocation of resources in the detection of computer fr...
The increase in mobile phones accessibility and technological advancement in almost every corner of ...
Abstract- Telecommunications fraud is increasing dramatically each year resulting in loss of a large...
The number of fraudulent activities is increasing dramatically in telecommunication networks, mobile...
The topic of this thesis is fraud detection in mobile communications networks by means of user profi...
To overcome the financial loss and threat, fraud detection is a must. New theories and many techniqu...
During the course of the European project \Advanced Security for Personal Communication Technologies...