Anderka et al., 2014 - Google Patents
Automatic ATM Fraud Detection as a Sequence-based Anomaly Detection Problem.Anderka et al., 2014
View PDF- Document ID
- 1552785030865865710
- Author
- Anderka M
- Klerx T
- Priesterjahn S
- Büning H
- Publication year
- Publication venue
- ICPRAM
External Links
Snippet
Because of the direct access to cash and customer data, automated teller machines (ATMs) are the target of manifold attacks and fraud. To counter this problem, modern ATMs utilize specialized hardware security systems that are designed to detect particular types of attacks …
- 238000001514 detection method 0 title abstract description 42
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
- G06K9/6284—Single class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00624—Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
- G06K9/00771—Recognising scenes under surveillance, e.g. with Markovian modelling of scene activity
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11194691B2 (en) | Anomaly detection using deep learning models | |
Anderka et al. | Automatic ATM Fraud Detection as a Sequence-based Anomaly Detection Problem. | |
US11005872B2 (en) | Anomaly detection in cybersecurity and fraud applications | |
US11314242B2 (en) | Methods and systems for fault detection and identification | |
US10629036B2 (en) | Surveillance device | |
CN110032490A (en) | Method and device thereof for detection system exception | |
CN113518011B (en) | Abnormality detection method and apparatus, electronic device, and computer-readable storage medium | |
CN111275416B (en) | Digital currency abnormal transaction detection method, device, electronic equipment and medium | |
CN105516152B (en) | Anomaly detection method | |
CN106792883A (en) | Sensor network abnormal deviation data examination method and system | |
CN106340138A (en) | Transaction behavior detection method and device | |
Alghamdi | Hidden Markov models (HMMs) and security applications | |
US9721162B2 (en) | Fusion-based object-recognition | |
CN107491058B (en) | A kind of industrial control system sequence attack detection method and equipment | |
CN111428572A (en) | Information processing method, information processing apparatus, electronic device, and medium | |
US8200595B1 (en) | Determing a disposition of sensor-based events using decision trees with splits performed on decision keys | |
Jonnalagadda et al. | Credit card fraud detection using Random Forest Algorithm | |
CN115438102B (en) | Space-time data anomaly identification method and device and electronic equipment | |
CN114285587B (en) | Domain name identification method and device and domain name classification model acquisition method and device | |
CN113282920A (en) | Log abnormity detection method and device, computer equipment and storage medium | |
Priesterjahn et al. | Generalized ATM fraud detection | |
Wang et al. | Cyber Threat Analysis and Trustworthy Artificial Intelligence | |
Klerx et al. | On the usage of behavior models to detect ATM fraud | |
CN112995331B (en) | User behavior threat detection method and device and computing equipment | |
Luca et al. | Anomaly detection using the Poisson process limit for extremes |