SlideShare a Scribd company logo
Graphs	in	Fraud	Detection
Max	De	Marzi	
Field	Engineer,	Neo4j	
@maxdemarzi
About	Me
• Max	De	Marzi	-	Neo4j	Field	Engineer		
• My	Blog:	http://maxdemarzi.com	
• Find	me	on	Twitter:	@maxdemarzi	
• Email	me:	maxdemarzi@gmail.com	
• GitHub:	http://github.com/maxdemarzi
Overview
Types	of	Fraud	
• Credit	Card	Fraud	
• First-Party	Fraud	
• Synthetic	Identities	and	Fraud	Rings	
• Insurance	Fraud	
Types	of	Analysis	
• Traditional	Analysis	
• Graph-Based	Analysis	
Fraud	Detection	and	Prevention	
Common	Questions
…but	before	we	get	into	that	…
• What	isn’t	Fraud?
I	don’t	know,	but	I	know	who	does
• Alex	Beutel,	CMU	
• Leman	Akoglu,	Stony	Brook	
• Christos	Faloutsos,	CMU	
• Graph-Based	User	Behavior	Modeling:	From	Prediction	to	
Fraud	Detection	
• http://www.cs.cmu.edu/~abeutel/kdd2015_tutorial/
User	Behavior	Challenges
• How	can	we	understand	
normal	user	behavior?
User	Behavior	Challenges
• How	can	we	understand	
normal	user	behavior?	
• How	can	we	find	
suspicious	behavior?
User	Behavior	Challenges
• How	can	we	understand	
normal	user	behavior?	
• How	can	we	find	
suspicious	behavior?	
• How	can	we	distinguish	
the	two?
Users
Does	your	little	girl	like	Rambo?
Personalization
Understanding	our	Users
• What	do	we	know	about	them?
Demographics:	Age
Demographics:	Gender
Understanding	our	Users
MATCH	(u:User)-[r:RATED]->(m:Movie)

RETURN	u.gender,	u.age,	

COUNT	(DISTINCT	u)	AS	user_cnt,	

COUNT	(DISTINCT	m)	AS	mov_cnt,	

COUNT(r)	AS	rtg_cnt
Understanding	our	Users
Understanding	our	Users
MATCH	(me:User	{id:1})	-[r1:RATED]->	(m:Movie)	

<-[r2:RATED]-	(similar_users:User)

WHERE	ABS(r1.stars-r2.stars)	<=	1	

RETURN	similar_users.gender,	

similar_users.age,	

COUNT(DISTINCT	similar_users)	AS	user_cnt,	

COUNT(r2)	AS	rtg_cnt
Understanding	our	Users
Little	Girls	like	Movies	other	Little	Girls	Like
Little	Girls	like	Movies	other	Little	Girls	Like
What	do	Little	Girls	Like?
MATCH	(u:User)-[r:RATED]->(m:Movie)

WHERE	u.age	=	1	AND	u.gender	=	"F"	AND	r.stars	>	3

RETURN	m.title,	COUNT(r)	AS	cnt

ORDER	BY	cnt	DESC

LIMIT	10
What	do	Little	Girls	Like?
What	do	Men	25-34	Like?
MATCH	(u:User)-[r:RATED]->(m:Movie)

WHERE	u.age	=	25	AND	u.gender	=	"M"	AND	r.stars	>	3

RETURN	m.title,	COUNT(r)	AS	cnt

ORDER	BY	cnt	DESC

LIMIT	10
What	do	Men	25-34	Like?
Modeling	“Normal”	Behavior
• Predict	Edges

(Similar	Users)
Modeling	“Normal”	Behavior
• Predict	Edges

(Movies	I	should	Watch)
Recommendation	Engine	with	Neo4j
Recommendation
Content	Based	Recommendations
• Step	1:	Collect	Item	Characteristics	
• Step	2:	Find	similar	Items	
• Step	3:	Recommend	Similar	Items	
• Example:	Similar	Movie	Genres
There	is	more	to	life	than	Romantic	Zombie-coms
Collaborative	Filtering	Recommendations
• Step	1:	Collect	User	Behavior	
• Step	2:	Find	similar	Users	
• Step	3:	Recommend	Behavior	taken	by	similar	users	
• Example:	People	with	similar	musical	tastes
You	are	so	original!
Using	Relationships	for	Recommendations
Content-based	filtering	
Recommend	items	based	on	what	users	
have	liked	in	the	past	
Collaborative	filtering	 	
Predict	what	users	like	based	on	the	
similarity	of	their	behaviors,	activities	
and	preferences	to	others	
Movie
Person
Person
RATED
SIMILARITY
rating:	7
value:	.92
Hybrid	Recommendations
• Combine	the	two	for	
better	results	
• Like	Peanut	Butter	and	
Jelly
Hello	World	Recommendation
Hello	World	Recommendation
X
Movie	Data	Model
Cypher	Query:	Movie	Recommendation
MATCH	(watched:Movie	{title:"Toy	Story”})	<-[r1:RATED]-	()	-[r2:RATED]->	(unseen:Movie)	
WHERE	r1.rating	>	7	AND	r2.rating	>	7	
AND	watched.genres	=	unseen.genres	
AND	NOT(	(:Person	{username:”maxdemarzi"})	-[:RATED]->	(unseen)	)	
RETURN	unseen.title,	COUNT(*)	
ORDER	BY	COUNT(*)	DESC	
LIMIT	25
What	are	the	Top	25	Movies	
• that	I	haven't	seen	
• with	the	same	genres	as	Toy	Story		
• given	high	ratings	
• by	people	who	liked	Toy	Story
Let’s	try	k-nearest	neighbors	(k-NN)
Cosine	Similarity
Cypher	Query:	Ratings	of	Two	Users
MATCH		(p1:Person	{name:'Michael	Sherman’})	-[r1:RATED]->	(m:Movie),	
															(p2:Person	{name:'Michael	Hunger’})	-[r2:RATED]->	(m:Movie)	
RETURN	m.name	AS	Movie,	

															r1.rating	AS	`M.	Sherman's	Rating`,		
															r2.rating	AS	`M.	Hunger's	Rating`
What	are	the	Movies	these	2	users	have	both	rated
Cypher	Query:	Ratings	of	Two	Users
Calculating	Cosine	Similarity
Cypher	Query:	Cosine	Similarity	
MATCH	(p1:Person)	-[x:RATED]->	(m:Movie)	<-[y:RATED]-	(p2:Person)	
WITH		SUM(x.rating	*	y.rating)	AS	xyDotProduct,	
						SQRT(REDUCE(xDot	=	0.0,	a	IN	COLLECT(x.rating)	|	xDot	+	a^2))	AS	xLength,	
						SQRT(REDUCE(yDot	=	0.0,	b	IN	COLLECT(y.rating)	|	yDot	+	b^2))	AS	yLength,	
						p1,	p2	
MERGE	(p1)-[s:SIMILARITY]-(p2)	
SET			s.similarity	=	xyDotProduct	/	(xLength	*	yLength)
Calculate	it	for	all	Person	nodes	with	at	least	one	Movie	between	them
Movie	Data	Model	(v2)
Cypher	Query:	Your	nearest	neighbors
MATCH	(p1:Person	{name:'Grace	Andrews’})	-[s:SIMILARITY]-	(p2:Person)	
WITH		p2,	s.score	AS	sim	
RETURN		p2.name	AS	Neighbor,	sim	AS	Similarity	
ORDER	BY	sim	DESC	
LIMIT	5	
Who	are	the	
• top	5	Persons	and	their	similarity	score	
• ordered	by	similarity	in	descending	order	
• for	Grace	Andrews
Your	nearest	neighbors
Cypher	Query:	k-NN	Recommendation
MATCH	(m:Movie)	<-[r:RATED]-	(b:Person)	-[s:SIMILARITY]-	(p:Person	{name:'Zoltan	Varju'})	
WHERE	NOT(	(p)	-[:RATED]->	(m)	)	
WITH	m,	s.similarity	AS	similarity,	r.rating	AS	rating	
ORDER	BY	m.name,	similarity	DESC	
WITH	m.name	AS	movie,	COLLECT(rating)[0..3]	AS	ratings	
WITH	movie,	REDUCE(s	=	0,	i	IN	ratings	|	s	+	i)*1.0	/	LENGTH(ratings)	AS	recommendation	
ORDER	BY	recommendation	DESC	
RETURN	movie,	recommendation

LIMIT	25
What	are	the	Top	25	Movies	
• that	Zoltan	Varju	has	not	seen	
• using	the	average	rating	
• by	my	top	3	neighbors
Modeling	“Normal”	Behavior
• Predict	Edges	
• Predict	Node	Attributes

(Age,	Gender,	etc)
Age:	35
Age:	?
Modeling	“Normal”	Behavior
• Predict	Edges	
• Predict	Node	Attributes	
• Predict	Edge	Attributes

(Rating)
What	Rating	should	I	give	101	Dalmatians?
MATCH	(me:User	{id:1})-[r1:RATED]->(m:Movie)

<-[r2:RATED]-(:User)-[r3:RATED]->

(m2:Movie	{title:”101	Dalmatians”})

WHERE	ABS(r1.stars-r2.stars)	<=1

RETURN	AVG(r3.stars)
Modeling	“Normal”	Behavior
• Predict	Edges	
• Predict	Node	Attributes	
• Predict	Edge	Attributes	
• Clustering	and	
Community	Detection
Predict	a	Star	Rating	purely	on	Demographics
MATCH	(u:User)-[r:RATED]->(m:Movie	{title:”Toy	Story”})

WHERE	u.age	=	1	AND	u.gender	=	"F"	

RETURN	AVG(r.stars)
Modeling	“Normal”	Behavior
• Predict	Edges	
• Predict	Node	Attributes	
• Predict	Edge	Attributes	
• Clustering	and	
Community	Detection	
• Fraud	Detection
Two	Sides	of	the	Same	Coin
Recommendations	
• Add	the	relationship	
that	does	not	exist	
Fraud	Detection	
• Find	the	relationships	
that	should	not	exist
Modeling	User	Behavior
• Modeling	normal	users	
and	detecting	anomalies	
are	two	sides	of	
understanding	user	
behavior
Modeling	User	Behavior
• Modeling	normal	users	
and	detecting	anomalies	
are	two	sides	of	
understanding	user	
behavior	
• Rough	Model	of	normal	
vs	outlier
Modeling	User	Behavior
• Modeling	normal	users	
and	detecting	anomalies	
are	two	sides	of	
understanding	user	
behavior.	
• Fine	grained	models	can	
find	more	subtle	outliers
Modeling	User	Behavior
• Modeling	normal	users	
and	detecting	anomalies	
are	two	sides	of	
understanding	user	
behavior	
• Complex	models	can	
capture	normal	and	
abnormal	patterns
Modeling	User	Behavior
• Modeling	normal	users	
and	detecting	anomalies	
are	two	sides	of	
understanding	user	
behavior	
• Known	fraudulent	
patterns	can	be	searched	
for	directly
Credit	Card	Fraud
Cross	Reference
Find	the	Nodes
ArrayList<Node>	nodes	=	new	ArrayList<Node>();

nodes.add(db.findNode(Labels.CC,	“number”,	card));	
nodes.add(db.findNode(Labels.Phone,	“number”,	phone));	
nodes.add(db.findNode(Labels.Email,	“address”,	address));	
nodes.add(db.findNode(Labels.IP,	“address”,	ip));
Add	the	Crosses
for(Node	node	:	nodes){	
				HashMap<String,	AtomicInteger>	crosses	=	new	HashMap<String,	AtomicInteger>();	
				crosses.put("CCs",	new	AtomicInteger(0));	
				crosses.put("Phones",	new	AtomicInteger(0));	
				crosses.put("Emails",	new	AtomicInteger(0));	
				crosses.put("IPs",	new	AtomicInteger(0));	
				for	(	Relationship	relationship	:	node.getRelationships(RELATED,	Direction.BOTH)	){	
												Node	thing	=	relationship.getOtherNode(node);	
												String	type	=	thing.getLabels().iterator().next().name()	+	"s";	
												crosses.get(type).getAndIncrement();	
				}	
				results.add(crosses);	
}
Examine	Results
[{"ips":4,"emails":7,"ccs":0,"phones":4},	--	cc	returned	4	ips,	7	
emails,	and	3	phones.	
{"ips":1,"emails":1,"ccs":1,"phones":0},	--	phone	returned	just	1	
item	for	each	cross	reference	check.	
{"ips":2,"emails":0,"ccs":4,"phones":3},	--	email	returned	2	ips,	4	
credit	cards	and	3	phones.	
{"ips":0,"emails":1,"ccs":3,"phones":2}]	--	ip	returned	3	credit	
cards	and	2	phones.
What		is		a		subgraph?
KDD 2015 2
Subgraphs
What	is	a	subgraph?
KDD 2015 3
• A	Subset	of	nodes	and	
the	edges	between	them
What	are	some	useful	subgraphs?
Largest dense subgraph
(Greatest average
degree)
What	are	some	useful	subgraphs?
E
Ego-network:
the subgraph
among a node and
its neighbors
What	are	some	useful	subgraphs?
Graph queries:
find subgraphs of
particular pattern
What	are	some	useful	subgraphs?
Graph queries:
find subgraphs of
particular pattern
MATCH	(a)--(b)--(c)--(a)

RETURN	*
What	are	some	useful	subgraphs?
Graph queries:
find subgraphs of
particular pattern
What	are	some	useful	subgraphs?
Graph queries:
find subgraphs of
particular pattern
What	are	some	useful	subgraphs?
Graph queries:
find subgraphs of
particular pattern
What	are	some	useful	subgraphs?
Graph queries:
find subgraphs of
particular pattern
What	are	some	useful	subgraphs?
Graph queries:
find subgraphs of
particular pattern
MATCH	(a)—(b)—(c)—
(d)—(a)—(c),	(d)—(b)

RETURN	*
Graphs	as	Matrices
Clustering	gives	Clarity
Link
Ego-net	Patterns
Ego-net	Patterns
Ni: number of neighbors of ego i
Ei: number of edges in egonet i
Wi: total weight of egonet i
λw,i: principal eigenvalue of the
weighted adjacency matrix of egonet i
Power	Law	Density
slope=2
slope=1
slope=1.35
Power	Law	Weight
Power	Law	Eigenvalue
Find	Groups	within	Ego-Nets
Find	Groups	within	Ego-Nets
Link
First-Party	Fraud
First-Party	Fraud
• Fraudster’s	aim:	apply	for	lines	of	credit,	act	normally,	extend	credit,	
then…run	off	with	it	
• Fabricate	a	network	of	synthetic	IDs,	aggregate	smaller	lines	of	credit	
into	substantial	value	
• Often	a	hidden	problem	since	only	banks	are	hit	
• Whereas	third-party	fraud	involves	customers	whose	identities	are	stolen	
• More	on	that	later…
So	what?
• $10’s	billions	lost	by	banks	every	year	
• 25%	of	the	total	consumer	credit	write-offs	in	the	USA	
• Around	20%	of	unsecured	bad	debt	in	E.U.	and	N.A.	is	misclassified	
• In	reality	it	is	first-party	fraud
Fraud	Ring
Then	the	fraud	happens…
• Revolving	doors	strategy	
• Money	moves	from	account	to	account	to	provide	legitimate	transaction	
history	
• Banks	duly	increase	credit	lines	
• Observed	responsible	credit	behavior	
• Fraudsters	max	out	all	lines	of	credit	and	then	bust	out
…	and	the	Bank	loses
• Collections	process	ensues	
• Real	addresses	are	visited	
• Fraudsters	deny	all	knowledge	of	synthetic	IDs	
• Bank	writes	off	debt	
• Two	fraudsters	can	easily	rack	up	$80k	
• Well	organized	crime	rings	can	rack	up	many	times	that
Discrete	Analysis	Fails	to	predict…
…and	Makes	it	Hard	to	React
• When	the	bust	out	starts	to	happen,	how	do	you	know	what	to	cancel?	
• And	how	do	you	do	it	faster	then	the	fraudster	to	limit	your	losses?	
• A	graph,	that’s	how!
Probably	Non-Fraudulent	Cohabiters
Probable	Cohabiters	Query
MATCH (p1:Person)-[:HOLDS|LIVES_AT*]->()

<-[:HOLDS|LIVES_AT*]-(p2:Person)
WHERE p1 <> p2
RETURN DISTINCT p1
Dodgy-Looking	Chain
Risky	People
MATCH (p1:Person)-[:HOLDS|LIVES_AT]->()
<-[:HOLDS|LIVES_AT]-(p2:Person)
-[:HOLDS|LIVES_AT]->()
<-[:HOLDS|LIVES_AT]-(p3:Person)
WHERE p1 <> p2 AND p2 <> p3 AND p3 <> p1
WITH collect (p1.name) + collect(p2.name) +
collect(p3.name) AS names
UNWIND names AS fraudster
RETURN DISTINCT fraudster
Pretty	quick…
Number of people: [5163]
Number of fraudsters: [40]
Time taken: [100] ms
Localize	the	focus
MATCH (p1:Person {name:'Sol'})-[:HOLDS|LIVES_AT]-()…
Number of fraudsters: [5]
Time taken: [13] ms
Stop a bust-out

in ms.
Quickly	Revoke	Cards	in	Bust-Out
MATCH (p1:Person)-[:HOLDS|LIVES_AT]->()
<-[:HOLDS|LIVES_AT]-(p2:Person)
-[:HOLDS|LIVES_AT]->()
<-[:HOLDS|LIVES_AT]-(p3:Person)
WHERE p1 <> p2 AND p2 <> p3 AND p3 <> p1
WITH collect (p1) + collect(p2)+ collect(p3)

AS names
UNWIND names AS fraudster
MATCH (fraudster)-[o:OWNS]->(card:CreditCard)
DELETE o, card
Auto	Fraud
Whiplash
http://georgia-clinic.com/blog/wp-content/uploads/2013/10/whiplash.jpg
Whiplash	for	Cash
http://georgia-clinic.com/blog/wp-content/uploads/2013/10/whiplash.jpg http://cdn2.holytaco.com/wp-content/uploads/2012/06/lottery-winner.jpg
Whiplash for Cash Example
Accidents
Cars
Doctor Attorney
People
Drives
Is Passenger
Drivers

Passengers

Witnesses
Risk
• $80,000,000,000	annually	on	auto	insurance	fraud	and	growing	
• Even	small	%	reductions	are	worthwhile!	
• British	policyholders	pay	~£100	per	year	to	cover	fraud	
• US	drivers	pay	$200-$300	per	year	according	to	US	National	Insurance	
Crime	Bureau
Regular	Drivers
Regular	Drivers	Query
MATCH (p:Person)-[:DRIVES]->(c:Car)
WHERE NOT (p)<-[:BRIEFED]-(:Lawyer)
AND NOT (p)<-[:EXAMINED]-(:Doctor)
AND NOT (p)-[:WITNESSED]->(:Car)
AND NOT (p)-[:PASSENGER_IN]->(:Car)
RETURN p,c LIMIT 100
Genuine	Claimants
Genuine	Claimants	Query
MATCH (p:Person)-[:DRIVES]->(:Car),
(p)<-[:BRIEFED]-(:Lawyer),
(p)<-[:EXAMINED]-(:Doctor)
OPTIONAL MATCH (p)-[w:WITNESSED]->(:Car),
(p)-[pi:PASSENGER_IN]->(:Car)
RETURN p, count(w) AS noWitnessed,

count(pi) as noPassengerIn
Fraudsters
Fraudsters
MATCH (p:Person)-[:DRIVES]->(:Car),
(p)<-[:BRIEFED]-(:Lawyer),
(p)<-[:EXAMINED]-(:Doctor),
(p)-[w:WITNESSED]->(:Car),
(p)-[pi:PASSENGER_IN]->(:Car)
WITH p, count(w) AS noWitnessed, 

count(pi) as noPassengerIn
WHERE noWitnessed > 1 OR noPassengerIn > 1
RETURN p
Auto-fraud	Graph
• Once	you	have	the	fraudsters,	finding	their	support	team	is	easy.	
• (fraudster)<-[:EXAMINED]-(d:Doctor)
• (fraudster)<-[:BRIEFED]-(l:Lawyer)
• And	it’s	also	easy	to	find	their	passengers	
• (fraudster)-[:DRIVES]->(:Car)<-[:PASSENGER_IN]-(p)
• And	easy	to	find	other	places	where	they’ve	maybe	committed	fraud	
• (fraudster)-[:WITNESSED]->(:Car)
• (fraudster)-[:PASSENGER_IN]->(:Car)
• And	you	can	see	this	in	milliseconds!
It’s all about
the patterns
Phony	Persona
Online	Payments	Fraud	(First-Party)
• Stealing	credentials	is	commonplace	
• Phishing,	malware,	simple	naïve	users	
• Buying	stolen	credit	card	numbers	is	easy	
• How	should	one	protect	against	seemingly	fine	credentials?	
• And	valid	credit	card	numbers?
We	are	all	little	stars
• Username	and	passwords	
• Two-factor	auth	
• IP	addresses,	cookies	
• Credit	card,	paypal	account	
• Some	gaming	sites	already	do	some	of	this	
• Arts	and	Crafts	platform	Etsy	already	embraced	the	idea	of	graph	of	
identity
An	Individual	Identity	Subgraph
128.240.229.18
fred@rbs.co.uk
1234LOL
We	are	all	made	of	stars…
Other		Specific	
Considerations
Specific	Weighted	Identity	Query
MATCH (u:User {username:'Jim', password: 'secret'})
OPTIONAL MATCH
(u) -[cookie:PROVIDED]->(:Cookie {id:'1234'})
OPTIONAL MATCH
(u)-[address:FROM]->(:IP {network:'128.240.0.0'})
RETURN SUM(cookie.weighting) + SUM(address.weighting)
AS score
Bare	
Minimum
Other	Specific	
Considerations
Final	
Decision
General	Weighted	Identity	Query
MATCH (u:User {username:'Jim', password: 'secret'})
OPTIONAL MATCH (u)-[rel]->()
WHERE has(rel.weighting)
RETURN SUM(rel.weighting) AS score
Bare	
Minimum
All	Available	
Weightings
Final	
Decision
An	Individual	Login	History
fred@rbs.co.uk
1234LOL
From	1st	to	3rd	Party
• The	1st	party	identity	graph	can	easily	be	extended	to	3rd	party	fraud	
• Like	in	the	bank	fraud	ring,	fraudsters	can	mix-n-match	claims	
• Start	with	a	few	phished	accounts	and	expand	from	there!
Shared	Connections
128.240.229.18
fred@rbs.co.uk
1234LOL nick@bearings.com
Ca$hMon£y
Graphing	Shared	Connections
Hmm….
Scan	for	Potential	Fraudsters
MATCH (u1:User)--(x)--(u2:User)
WHERE u1 <> u2 AND NOT (x:IP)
RETURN x
Network	in	
common	is	OK
Stop	specific	fraudster	network,	quickly
MATCH path = 

(u1:User {username: 'Jim'})-[*]-(x)-[*]-(u2:User)
WHERE u1<>u2 AND NOT (x:IP) AND NOT (x:User)
RETURN path
How	do	these	fit	with	traditional	fraud	prevention?
http://www.gartner.com/newsroom/id/1695014
Gartner’s	Layered	Fraud	Prevention	Approach
Demo	Time
Bank	Fraud
http://gist.neo4j.org/?dfdfbddfdc63f4858f80
Credit	Card	Fraud	Detection
http://gist.neo4j.org/?3ad4cb2e3187ab21416b
Whiplash	for	Cash
http://gist.neo4j.org/?6bae1e799484267e3c60
Ask	for	help	if	you	get	stuck
• Online	training	-	http://neo4j.com/graphacademy/	
• Videos	-	http://vimeo.com/neo4j/videos	
• Use	cases	-	http://www.neotechnology.com/industries-and-use-cases/	
• Meetups		
• Books	to	get	your	started		
• http://www.graphdatabases.com				
• http://neo4j.com/book-learning-neo4j/
Deep	Neural	Networks	for	Bank	Fraud
https://www.youtube.com/watch?v=TAer-PeIypI
Fraud	Detection	starts	about	half-way	(after	intro)
Thanks	for	listening
@maxdemarzi

More Related Content

Viewers also liked

Neo4j PartnerDay Amsterdam 2017
Neo4j PartnerDay Amsterdam 2017Neo4j PartnerDay Amsterdam 2017
Neo4j PartnerDay Amsterdam 2017
Neo4j
 
Navigating The Publishing Jungle
Navigating The Publishing JungleNavigating The Publishing Jungle
Navigating The Publishing Jungle
Redemption Press
 
Portadas nacionales 28 marzo-17
Portadas nacionales 28 marzo-17Portadas nacionales 28 marzo-17
Portadas nacionales 28 marzo-17
Portadas Nacionales Think Mercadotecnia
 
Lasting Impression: Package Yourself with Class
Lasting Impression: Package Yourself with ClassLasting Impression: Package Yourself with Class
Lasting Impression: Package Yourself with Class
Redemption Press
 
Move from Social Engagement to Community Impact
Move from Social Engagement to Community ImpactMove from Social Engagement to Community Impact
Move from Social Engagement to Community Impact
Lee Aase
 
Work As The New Leisure Time (Pauli Komonen, Quantified Employee Seminar 2017)
Work As The New Leisure Time (Pauli Komonen, Quantified Employee Seminar 2017) Work As The New Leisure Time (Pauli Komonen, Quantified Employee Seminar 2017)
Work As The New Leisure Time (Pauli Komonen, Quantified Employee Seminar 2017)
Pauli Komonen
 
Unemployment in India and Just Jobs
Unemployment in India and Just JobsUnemployment in India and Just Jobs
Unemployment in India and Just Jobs
Just.Jobs
 
The Skills Cross-over: building a career through science communication
The Skills Cross-over: building a career through science communicationThe Skills Cross-over: building a career through science communication
The Skills Cross-over: building a career through science communication
Esther De Smet
 
Campamentos de verano El Alamo 2017 Madrid
Campamentos de verano El Alamo 2017 MadridCampamentos de verano El Alamo 2017 Madrid
Campamentos de verano El Alamo 2017 Madrid
Veleta3000
 
Kiara collagen serum
Kiara collagen serumKiara collagen serum
Kiara collagen serum
Supplement Platform Website
 
今日こそ理解するHot変換
今日こそ理解するHot変換今日こそ理解するHot変換
今日こそ理解するHot変換
Yuki Takahashi
 
Corpora, tracked changes, and PDFs: some useful tips, at no cost!
Corpora, tracked changes, and PDFs: some useful tips, at no cost!Corpora, tracked changes, and PDFs: some useful tips, at no cost!
Corpora, tracked changes, and PDFs: some useful tips, at no cost!
Patricia Maria Ferreira Larrieux
 
Inside Developer Relations at AWS
Inside Developer Relations at AWSInside Developer Relations at AWS
Inside Developer Relations at AWS
Adam FitzGerald
 

Viewers also liked (13)

Neo4j PartnerDay Amsterdam 2017
Neo4j PartnerDay Amsterdam 2017Neo4j PartnerDay Amsterdam 2017
Neo4j PartnerDay Amsterdam 2017
 
Navigating The Publishing Jungle
Navigating The Publishing JungleNavigating The Publishing Jungle
Navigating The Publishing Jungle
 
Portadas nacionales 28 marzo-17
Portadas nacionales 28 marzo-17Portadas nacionales 28 marzo-17
Portadas nacionales 28 marzo-17
 
Lasting Impression: Package Yourself with Class
Lasting Impression: Package Yourself with ClassLasting Impression: Package Yourself with Class
Lasting Impression: Package Yourself with Class
 
Move from Social Engagement to Community Impact
Move from Social Engagement to Community ImpactMove from Social Engagement to Community Impact
Move from Social Engagement to Community Impact
 
Work As The New Leisure Time (Pauli Komonen, Quantified Employee Seminar 2017)
Work As The New Leisure Time (Pauli Komonen, Quantified Employee Seminar 2017) Work As The New Leisure Time (Pauli Komonen, Quantified Employee Seminar 2017)
Work As The New Leisure Time (Pauli Komonen, Quantified Employee Seminar 2017)
 
Unemployment in India and Just Jobs
Unemployment in India and Just JobsUnemployment in India and Just Jobs
Unemployment in India and Just Jobs
 
The Skills Cross-over: building a career through science communication
The Skills Cross-over: building a career through science communicationThe Skills Cross-over: building a career through science communication
The Skills Cross-over: building a career through science communication
 
Campamentos de verano El Alamo 2017 Madrid
Campamentos de verano El Alamo 2017 MadridCampamentos de verano El Alamo 2017 Madrid
Campamentos de verano El Alamo 2017 Madrid
 
Kiara collagen serum
Kiara collagen serumKiara collagen serum
Kiara collagen serum
 
今日こそ理解するHot変換
今日こそ理解するHot変換今日こそ理解するHot変換
今日こそ理解するHot変換
 
Corpora, tracked changes, and PDFs: some useful tips, at no cost!
Corpora, tracked changes, and PDFs: some useful tips, at no cost!Corpora, tracked changes, and PDFs: some useful tips, at no cost!
Corpora, tracked changes, and PDFs: some useful tips, at no cost!
 
Inside Developer Relations at AWS
Inside Developer Relations at AWSInside Developer Relations at AWS
Inside Developer Relations at AWS
 

Similar to Fraud Detection Class Slides

Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Steve Poole
 
Your Life Online
Your Life OnlineYour Life Online
Your Life Online
Ndimofor Ndimofor Aretas
 
btNOG 9 Keynote Speech on Evolution of Social Engineering
btNOG 9 Keynote Speech on Evolution of Social EngineeringbtNOG 9 Keynote Speech on Evolution of Social Engineering
btNOG 9 Keynote Speech on Evolution of Social Engineering
APNIC
 
Mangaing online identities with a personal landing page web version
Mangaing online identities with a personal landing page web versionMangaing online identities with a personal landing page web version
Mangaing online identities with a personal landing page web versionHeather Martyn
 
Cybercrimes and Cybercriminals
Cybercrimes and CybercriminalsCybercrimes and Cybercriminals
Cybercrimes and Cybercriminals
Ashikur Rahman
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Steve Poole
 
Observations on Social Engineering presentation by Warren Finch for LkNOG 6
Observations on Social Engineering presentation by Warren Finch for LkNOG 6Observations on Social Engineering presentation by Warren Finch for LkNOG 6
Observations on Social Engineering presentation by Warren Finch for LkNOG 6
APNIC
 
Catella e-Crime London2015
Catella e-Crime London2015Catella e-Crime London2015
Catella e-Crime London2015
Patrick Wheeler
 
How to Build a Fraud Detection Solution with Neo4j
How to Build a Fraud Detection Solution with Neo4jHow to Build a Fraud Detection Solution with Neo4j
How to Build a Fraud Detection Solution with Neo4j
Neo4j
 
Leeds Met talk on social media monitoring
Leeds Met talk on social media monitoringLeeds Met talk on social media monitoring
Leeds Met talk on social media monitoring
Anthony Devenish
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)
Marta Barrio Marcos
 
Why your digital reputation matters?
Why your digital reputation matters? Why your digital reputation matters?
Why your digital reputation matters?
Parakum Pathirana
 
My online image
My online imageMy online image
My online imagemsalissa
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
Justin Denton
 
Evil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application SecurityEvil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application Security
Anne Oikarinen
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
👀 Joe Gray
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
Lokender Yadav
 
Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01
overcertified
 
Times Union Job Fair
Times Union Job FairTimes Union Job Fair
Times Union Job Fair
Ben Thomas
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
Steve Poole
 

Similar to Fraud Detection Class Slides (20)

Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Your Life Online
Your Life OnlineYour Life Online
Your Life Online
 
btNOG 9 Keynote Speech on Evolution of Social Engineering
btNOG 9 Keynote Speech on Evolution of Social EngineeringbtNOG 9 Keynote Speech on Evolution of Social Engineering
btNOG 9 Keynote Speech on Evolution of Social Engineering
 
Mangaing online identities with a personal landing page web version
Mangaing online identities with a personal landing page web versionMangaing online identities with a personal landing page web version
Mangaing online identities with a personal landing page web version
 
Cybercrimes and Cybercriminals
Cybercrimes and CybercriminalsCybercrimes and Cybercriminals
Cybercrimes and Cybercriminals
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
Observations on Social Engineering presentation by Warren Finch for LkNOG 6
Observations on Social Engineering presentation by Warren Finch for LkNOG 6Observations on Social Engineering presentation by Warren Finch for LkNOG 6
Observations on Social Engineering presentation by Warren Finch for LkNOG 6
 
Catella e-Crime London2015
Catella e-Crime London2015Catella e-Crime London2015
Catella e-Crime London2015
 
How to Build a Fraud Detection Solution with Neo4j
How to Build a Fraud Detection Solution with Neo4jHow to Build a Fraud Detection Solution with Neo4j
How to Build a Fraud Detection Solution with Neo4j
 
Leeds Met talk on social media monitoring
Leeds Met talk on social media monitoringLeeds Met talk on social media monitoring
Leeds Met talk on social media monitoring
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)
 
Why your digital reputation matters?
Why your digital reputation matters? Why your digital reputation matters?
Why your digital reputation matters?
 
My online image
My online imageMy online image
My online image
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Evil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application SecurityEvil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application Security
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01
 
Times Union Job Fair
Times Union Job FairTimes Union Job Fair
Times Union Job Fair
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 

More from Max De Marzi

DataDay 2023 Presentation
DataDay 2023 PresentationDataDay 2023 Presentation
DataDay 2023 Presentation
Max De Marzi
 
DataDay 2023 Presentation - Notes
DataDay 2023 Presentation - NotesDataDay 2023 Presentation - Notes
DataDay 2023 Presentation - Notes
Max De Marzi
 
Developer Intro Deck-PowerPoint - Download for Speaker Notes
Developer Intro Deck-PowerPoint - Download for Speaker NotesDeveloper Intro Deck-PowerPoint - Download for Speaker Notes
Developer Intro Deck-PowerPoint - Download for Speaker Notes
Max De Marzi
 
Outrageous Ideas for Graph Databases
Outrageous Ideas for Graph DatabasesOutrageous Ideas for Graph Databases
Outrageous Ideas for Graph Databases
Max De Marzi
 
Neo4j Training Cypher
Neo4j Training CypherNeo4j Training Cypher
Neo4j Training Cypher
Max De Marzi
 
Neo4j Training Modeling
Neo4j Training ModelingNeo4j Training Modeling
Neo4j Training Modeling
Max De Marzi
 
Neo4j Training Introduction
Neo4j Training IntroductionNeo4j Training Introduction
Neo4j Training Introduction
Max De Marzi
 
Detenga el fraude complejo con Neo4j
Detenga el fraude complejo con Neo4jDetenga el fraude complejo con Neo4j
Detenga el fraude complejo con Neo4j
Max De Marzi
 
Data Modeling Tricks for Neo4j
Data Modeling Tricks for Neo4jData Modeling Tricks for Neo4j
Data Modeling Tricks for Neo4j
Max De Marzi
 
Fraud Detection and Neo4j
Fraud Detection and Neo4j Fraud Detection and Neo4j
Fraud Detection and Neo4j
Max De Marzi
 
Detecion de Fraude con Neo4j
Detecion de Fraude con Neo4jDetecion de Fraude con Neo4j
Detecion de Fraude con Neo4j
Max De Marzi
 
Neo4j Data Science Presentation
Neo4j Data Science PresentationNeo4j Data Science Presentation
Neo4j Data Science Presentation
Max De Marzi
 
Neo4j Stored Procedure Training Part 2
Neo4j Stored Procedure Training Part 2Neo4j Stored Procedure Training Part 2
Neo4j Stored Procedure Training Part 2
Max De Marzi
 
Neo4j Stored Procedure Training Part 1
Neo4j Stored Procedure Training Part 1Neo4j Stored Procedure Training Part 1
Neo4j Stored Procedure Training Part 1
Max De Marzi
 
Decision Trees in Neo4j
Decision Trees in Neo4jDecision Trees in Neo4j
Decision Trees in Neo4j
Max De Marzi
 
Neo4j y Fraude Spanish
Neo4j y Fraude SpanishNeo4j y Fraude Spanish
Neo4j y Fraude Spanish
Max De Marzi
 
Data modeling with neo4j tutorial
Data modeling with neo4j tutorialData modeling with neo4j tutorial
Data modeling with neo4j tutorial
Max De Marzi
 
Neo4j Fundamentals
Neo4j FundamentalsNeo4j Fundamentals
Neo4j Fundamentals
Max De Marzi
 
Neo4j Presentation
Neo4j PresentationNeo4j Presentation
Neo4j Presentation
Max De Marzi
 
What Finance can learn from Dating Sites
What Finance can learn from Dating SitesWhat Finance can learn from Dating Sites
What Finance can learn from Dating Sites
Max De Marzi
 

More from Max De Marzi (20)

DataDay 2023 Presentation
DataDay 2023 PresentationDataDay 2023 Presentation
DataDay 2023 Presentation
 
DataDay 2023 Presentation - Notes
DataDay 2023 Presentation - NotesDataDay 2023 Presentation - Notes
DataDay 2023 Presentation - Notes
 
Developer Intro Deck-PowerPoint - Download for Speaker Notes
Developer Intro Deck-PowerPoint - Download for Speaker NotesDeveloper Intro Deck-PowerPoint - Download for Speaker Notes
Developer Intro Deck-PowerPoint - Download for Speaker Notes
 
Outrageous Ideas for Graph Databases
Outrageous Ideas for Graph DatabasesOutrageous Ideas for Graph Databases
Outrageous Ideas for Graph Databases
 
Neo4j Training Cypher
Neo4j Training CypherNeo4j Training Cypher
Neo4j Training Cypher
 
Neo4j Training Modeling
Neo4j Training ModelingNeo4j Training Modeling
Neo4j Training Modeling
 
Neo4j Training Introduction
Neo4j Training IntroductionNeo4j Training Introduction
Neo4j Training Introduction
 
Detenga el fraude complejo con Neo4j
Detenga el fraude complejo con Neo4jDetenga el fraude complejo con Neo4j
Detenga el fraude complejo con Neo4j
 
Data Modeling Tricks for Neo4j
Data Modeling Tricks for Neo4jData Modeling Tricks for Neo4j
Data Modeling Tricks for Neo4j
 
Fraud Detection and Neo4j
Fraud Detection and Neo4j Fraud Detection and Neo4j
Fraud Detection and Neo4j
 
Detecion de Fraude con Neo4j
Detecion de Fraude con Neo4jDetecion de Fraude con Neo4j
Detecion de Fraude con Neo4j
 
Neo4j Data Science Presentation
Neo4j Data Science PresentationNeo4j Data Science Presentation
Neo4j Data Science Presentation
 
Neo4j Stored Procedure Training Part 2
Neo4j Stored Procedure Training Part 2Neo4j Stored Procedure Training Part 2
Neo4j Stored Procedure Training Part 2
 
Neo4j Stored Procedure Training Part 1
Neo4j Stored Procedure Training Part 1Neo4j Stored Procedure Training Part 1
Neo4j Stored Procedure Training Part 1
 
Decision Trees in Neo4j
Decision Trees in Neo4jDecision Trees in Neo4j
Decision Trees in Neo4j
 
Neo4j y Fraude Spanish
Neo4j y Fraude SpanishNeo4j y Fraude Spanish
Neo4j y Fraude Spanish
 
Data modeling with neo4j tutorial
Data modeling with neo4j tutorialData modeling with neo4j tutorial
Data modeling with neo4j tutorial
 
Neo4j Fundamentals
Neo4j FundamentalsNeo4j Fundamentals
Neo4j Fundamentals
 
Neo4j Presentation
Neo4j PresentationNeo4j Presentation
Neo4j Presentation
 
What Finance can learn from Dating Sites
What Finance can learn from Dating SitesWhat Finance can learn from Dating Sites
What Finance can learn from Dating Sites
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

Fraud Detection Class Slides