Author:
Yesuf Ahmed Seid,Probst Christian W.
Publisher
Springer International Publishing
Reference18 articles.
1. Aagedal, J.O., Den Braber, F., Dimitrakos, T., Gran, B.A., Raptis, D., Stolen, K.: Model-based risk assessment to improve enterprise security. In: Proceedings of Sixth International Enterprise Distributed Object Computing Conference 2002. EDOC 2002, pp. 51–62. IEEE (2002)
2. Abdallah, A., Maarof, M.A., Zainal, A.: Fraud detection system: a survey. J. Netw. Comput. Appl. 68, 90–113 (2016)
3. CFCA: Global telecom fraud report. Technical report, Communications Fraud Control Association (2015)
4. Dubois, É., Heymans, P., Mayer, N., Matulevičius, R.: A systematic approach to define the domain of information system security risk management. In: Nurcan, S., Salinesi, C., Souveyet, C., Ralyté, J. (eds.) Intentional Perspectives on Information Systems Engineering, pp. 289–306. Springer, Berlin Heidelberg (2010).
https://doi.org/10.1007/978-3-642-12544-7_16
5. Embley, D.W., Thalheim, B. (eds.): Handbook of Conceptual Modeling. Springer, Berlin Heidelberg, Berlin, Heidelberg (2011).
https://doi.org/10.1007/978-3-642-15865-0