[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Anderka et al., 2014 - Google Patents

Automatic ATM Fraud Detection as a Sequence-based Anomaly Detection Problem.

Anderka et al., 2014

View PDF
Document ID
1552785030865865710
Author
Anderka M
Klerx T
Priesterjahn S
Büning H
Publication year
Publication venue
ICPRAM

External Links

Snippet

Because of the direct access to cash and customer data, automated teller machines (ATMs) are the target of manifold attacks and fraud. To counter this problem, modern ATMs utilize specialized hardware security systems that are designed to detect particular types of attacks …
Continue reading at www.scitepress.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • G06K9/6284Single class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00624Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
    • G06K9/00771Recognising scenes under surveillance, e.g. with Markovian modelling of scene activity
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management

Similar Documents

Publication Publication Date Title
US11194691B2 (en) Anomaly detection using deep learning models
Anderka et al. Automatic ATM Fraud Detection as a Sequence-based Anomaly Detection Problem.
US11005872B2 (en) Anomaly detection in cybersecurity and fraud applications
US11314242B2 (en) Methods and systems for fault detection and identification
US10629036B2 (en) Surveillance device
CN110032490A (en) Method and device thereof for detection system exception
CN113518011B (en) Abnormality detection method and apparatus, electronic device, and computer-readable storage medium
CN111275416B (en) Digital currency abnormal transaction detection method, device, electronic equipment and medium
CN105516152B (en) Anomaly detection method
CN106792883A (en) Sensor network abnormal deviation data examination method and system
CN106340138A (en) Transaction behavior detection method and device
Alghamdi Hidden Markov models (HMMs) and security applications
US9721162B2 (en) Fusion-based object-recognition
CN107491058B (en) A kind of industrial control system sequence attack detection method and equipment
CN111428572A (en) Information processing method, information processing apparatus, electronic device, and medium
US8200595B1 (en) Determing a disposition of sensor-based events using decision trees with splits performed on decision keys
Jonnalagadda et al. Credit card fraud detection using Random Forest Algorithm
CN115438102B (en) Space-time data anomaly identification method and device and electronic equipment
CN114285587B (en) Domain name identification method and device and domain name classification model acquisition method and device
CN113282920A (en) Log abnormity detection method and device, computer equipment and storage medium
Priesterjahn et al. Generalized ATM fraud detection
Wang et al. Cyber Threat Analysis and Trustworthy Artificial Intelligence
Klerx et al. On the usage of behavior models to detect ATM fraud
CN112995331B (en) User behavior threat detection method and device and computing equipment
Luca et al. Anomaly detection using the Poisson process limit for extremes