A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions Accounts
[chapter]
2012
Lecture Notes in Computer Science
For over 15 years auction services have grown rapidly, constituting a major part of e-commerce worldwide. Unfortunately, they also provide opportunities for criminals to distribute illicit goods, launder money or commit other types of fraud. This calls for methods to mitigate this threat. The following paper discusses the methods of identifying the accounts of users participating in internet auctions that have been hijacked (taken over) by malicious individuals and utilised for fraudulent
doi:10.1007/978-3-642-32498-7_41
fatcat:n462tg4rjbb6vcnwfilo2tu4te