2022
DOI: 10.1155/2022/4434714
|View full text |Cite
|
Sign up to set email alerts
|

A Detection Method for Abnormal Transactions in E-Commerce Based on Extended Data Flow Conformance Checking

Abstract: With the development of smart devices and mobile communication technologies, e-commerce has spread over all aspects of life. Abnormal transaction detection is important in e-commerce since abnormal transactions can result in large losses. Additionally, integrating data flow and control flow is important in the research of process modeling and data analysis since it plays an important role in the correctness and security of business processes. This paper proposes a novel method of detecting abnormal transaction… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

3
5

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 39 publications
0
4
0
Order By: Relevance
“…Petri nets PN is a modeling and analysis tool for distributed systems. It is particularly convenient for describing the sequence, concurrency, conflict, and synchronization of system processes (Yu et al, 2018b;Wang et al, 2022). PN can provide the graphical notations and the basic primitives for modeling concurrency, communication, and synchronization.…”
Section: Modeling Schemementioning
confidence: 99%
“…Petri nets PN is a modeling and analysis tool for distributed systems. It is particularly convenient for describing the sequence, concurrency, conflict, and synchronization of system processes (Yu et al, 2018b;Wang et al, 2022). PN can provide the graphical notations and the basic primitives for modeling concurrency, communication, and synchronization.…”
Section: Modeling Schemementioning
confidence: 99%
“…Afterwards, they resell these commodities at higher prices in the second-hand market to gain huge illegal profits. In order to effectively q (1) p q (2) Z (2) Encoder View 2…”
Section: The Proposed Modelmentioning
confidence: 99%
“…To address the problem in the above fraudulent scene, it is particularly urgent to design effective antifraud strategies and technologies. As an important data mining technique, anomaly detection has been successfully applied in various fields [1,2]; it also reveals enormous potential in the e-commerce fraud recognition.…”
Section: Introductionmentioning
confidence: 99%
“…Even a minor logic vulnerability can lead to serious impacts in mission critical financial applications, thus logic vulnerabilities pose serious threats to the security of e-commerce applications [1], [4], [5]. In such a hybrid system, coordinating the involved participants in a secure fashion is highly challenging, logic flaws are pervasive in modern e-commerce systems [3], [6], [7], [8], [9], [10]. Application and business logic refers to application-specific functionality and behaviors in concurrent business interactions.…”
Section: Introductionmentioning
confidence: 99%