SlideShare a Scribd company logo
1 of 44
Download to read offline
How AI is preventing
account fraud at web
scale
Amir Moghimi
Co-founder & CTO
crossclassify.com
1
Byron Bay data breach victim told to pay
Adidas, National Basketball Association
$1.2m by US courts
"The charges were cybersquatting,
trademark infringement, IP infringement,
things I don't know anything about."
ABC North Coast /
25 July 2023
2
3
■ In a survey run by AIC, 47% of respondents in 2023, experienced
at least one cybercrime in the 12 months prior to the survey.
■ 20% of these cybercrimes was identity crime and misuse. *
■ No surprise with Optus, Latitude and Medibank data breaches.
* Australian Institute of Criminology
Running an
online service
User
interactions
Sign-up
Sign-in
Range of fraud
patterns
Accelerate
user acquisition and
forget about fraud
4
AI-powered fraud detection and
prevention system
Understanding
Online Accounts
Entity Description
Fraud Detection
Methods
Evaluation
5
AI-powered fraud detection and
prevention system
Understanding
Online Accounts
Entity Description
Fraud Detection
Methods
Evaluation
6
Detecting
important entities
AI-powered fraud detection and
prevention system
Understanding
Online Accounts
Entity Description
Fraud Detection
Methods
Evaluation
Account Device IP
7
Profile
Construction
Detecting
important entities
AI-powered fraud detection and
prevention system
Understanding
Online Accounts
Entity Description
Fraud Detection
Methods
Evaluation
8
Account Device IP
More than 65 features for Account
9
More than 70 features for Device
10
More than 40 features for IP
11
12
Profile
Construction
Detecting
important entities
AI-powered fraud detection and
prevention system
Understanding
Online Accounts
Entity Description
Fraud Detection
Methods
Evaluation
Account Device IP
Deviation from
normal behavior
13
Profile
Construction
Detecting
important entities
AI-powered fraud detection and
prevention system
Understanding
Online Accounts
Entity Description
Fraud Detection
Methods
Evaluation
Account Device IP
14
Deviation from
normal behavior
Profile
Construction
Detecting
important entities
AI-powered fraud detection and
prevention system
Understanding
Online Accounts
Entity Description
Fraud Detection
Methods
Evaluation
Account Device IP
Statistical Supervised Unsupervised
Supervised
Z-score
Box
whisker
Clustering
Collective
Outliers
Outlier
Score
15
Deviation from
normal behavior
Profile
Construction
Detecting
important entities
AI-powered fraud detection and
prevention system
Understanding
Online Accounts
Entity Description
Fraud Detection
Methods
Evaluation
Account Device IP
Statistical Supervised Unsupervised
16
Supervised
Z-score
Box
whisker
Clustering
Collective
Outliers
Outlier
Score
Deviation from
normal behavior
Profile
Construction
Detecting
important entities
AI-powered fraud detection and
prevention system
Understanding
Online Accounts
Entity Description
Fraud Detection
Methods
Evaluation
Account Device IP
Statistical Supervised Unsupervised
Statistical
Box-Whisker
Outlier: An
account with
9 distinct
devices
Z-Score
Outlier
17
Device Count
Unsupervised
Account sharing like Netflix,
Spotify, Gaming apps
One account with more
than 20 distinct devices and
10 different IPs (Far from
normal accounts)
Accounts with
normal behavior
One account with
approximately near normal
behavior
18
Dev Count
IP Count
Supervised
Outlier
Residual= Anomaly Score
19
20
Supervised
Z-score
Box
whisker
Clustering
Collective
Outliers
Outlier
Score
Deviation from
normal behavior
Profile
Construction
Detecting
important entities
AI-powered fraud detection and
prevention system
Understanding
Online Accounts
Entity Description
Fraud Detection
Methods
Evaluation
Account Device IP
Statistics Supervised Unsupervised
Quantitative
21
Supervised
Z-score
Box
whisker
Clustering
Collective
Outliers
Outlier
Score
Deviation from
normal behavior
Profile
Construction
Detecting
important entities
AI-powered fraud detection and
prevention system
Understanding
Online Accounts
Entity Description
Fraud Detection
Methods
Evaluation
Account Device IP
Statistics Supervised Unsupervised
Qualitative
Precision
Recall F-measure
Adaptability
Explainability Scalability
22
Quantitative
Supervised
Z-score
Box
whisker
Clustering
Collective
Outliers
Outlier
Score
Deviation from
normal behavior
Profile
Construction
Detecting
important entities
AI-powered fraud detection and
prevention system
Understanding
Online Accounts
Entity Description
Fraud Detection
Methods
Evaluation
Account Device IP
Statistics Supervised Unsupervised
Qualitative
23
Explainability-Accuracy Trade-Off
Prediction
Accuracy
Explainability
Learning Techniques (today) Explainability
(notional)
Neural
Nets
Statistica
l
Models
Ensembl
e
Methods
Decisio
n
Trees
Deep
Learnin
g
SVM
s
AOG
s
Bayesian
Belief
Nets
Markov
Models
HBN
s
MLN
s
New
Approach
Create a suite of
machine learning
techniques that
produce more
explainable models,
while maintaining a
high level of
learning
performance
SR
L
CRF
s
Rando
m
Forests
Graphic
al
Models
Challenges
Imbalanced
Dataset
Fraud Patterns
Change/Evolve
Cat & Mouse
Model Selection
+
Parameter Tuning
24
25
Challenges
Imbalanced
Dataset
Fraud Patterns
Change/Evolve
Cat & Mouse
Model Selection
+
Parameter Tuning
Make it
balanced
26
Challenges
Imbalanced
Dataset
Fraud Patterns
Change/Evolve
Cat & Mouse
Model Selection
+
Parameter Tuning
Imbalanced Dataset
Make it balanced
Data
Generation
Data
Augmentation
Sampling
27
Over
Sampling
Under
Sampling
0.001% of
actions are
fraud
Make it
balanced
Ensemble
methods
28
Make it
balanced
Challenges
Imbalanced
Dataset
Fraud Patterns
Change/Evolve
Cat & Mouse
Model Selection
+
Parameter Tuning
Ensemble methods
Model
1
Model
2
Model
3
New
Sample
Final
Prediction
What is the best
combination of
methods?
Random Forest and
XGBoost are best
practices
29
Imbalanced Dataset
Make it
balanced
Ensemble
methods
Adaptive AI
30
Challenges
Imbalanced
Dataset
Fraud Patterns
Change/Evolve
Cat & Mouse
Model Selection
+
Parameter Tuning
Unsupervised methods adaptively
detect fraud with unseen patterns
stream
Dynamic Clustering
Adaptive AI
31
New Inlier
Cluster
Unsupervised methods adaptively
detect fraud with unseen patterns
stream
32
outlier
Dynamic Clustering
Adaptive AI
stream
33
outlier
Unsupervised methods adaptively
detect fraud with unseen patterns
Dynamic Clustering
Adaptive AI
stream
34
Changing the
outlier Cluster
to inlier one
Unsupervised methods adaptively
detect fraud with unseen patterns
Dynamic Clustering
Adaptive AI
Make it
balanced
Ensemble
methods
Adaptive AI Trial and Error
Proper
Modeling
35
Challenges
Imbalanced
Dataset
Fraud Patterns
Change/Evolve
Cat & Mouse
Model Selection
+
Parameter Tuning
Trial and Error /
Experience
At the beginning,
interpretability &
explainability are more
important
As we get more data, more
complicated methods with
large parameters come into
the picture
Model Selection
Parameter Tuning
Implement the
Proper Modeling
36
Account Take Over
Modeling Example
37
Dataset (Account Take Over)
Account Login features:
✔ Timestamp, IP address, Country, City, User agent , … .
✔ Derived features from existing ones
Original dataset consists of:
✔ 34.1 million login attempts (records)
✔ 3.2 million users
✔ 14 features
✔ Non-fraud records: 32269123
✔ Fraud records: 181
38
Challenges
39
Imbalanced Dataset
Parameter Tuning
Explainability
Under Sampling
Neural Network Modeling
Decision Tree
Dataset sampling
✔ Non-fraud records: 32,269,123
✔ Fraud records: 181
✔ Too imbalanced for neural network classifiers
✔ Train and test split: 20% test size
✔ Under sampling for showcasing different model types:
• Under sampled the non-fraud records to 1,000
40
Layers architecture Parameter No. Recall F1
1 13 – 64 – 1 961 4% 6%
2 13 – 128 – 1 1,921 4% 7%
3 13 – 256 – 128 – 1 36,609 11% 19%
4 13 – 128 – 256 – 256 – 128 – 1 133,633 71% 23%
5 13 – 128 – 512 – 256 – 128 – 1 232,193 14% 20%
Neural Network
41
Decision Tree
42
43
Questions?
44

More Related Content

What's hot

Information security-management-system
Information security-management-systemInformation security-management-system
Information security-management-systemintellisenseit
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...Aladdin Dandis
 
Face recognition with pi
Face recognition with piFace recognition with pi
Face recognition with pihetvi naik
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptxschetan202
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About ComplianceDinesh O Bareja
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
Industroyer: biggest threat to industrial control systems since Stuxnet by An...
Industroyer: biggest threat to industrial control systems since Stuxnet by An...Industroyer: biggest threat to industrial control systems since Stuxnet by An...
Industroyer: biggest threat to industrial control systems since Stuxnet by An...CODE BLUE
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemRoshan Ranabhat
 
Web Security
Web SecurityWeb Security
Web SecurityADIEFEH
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 
Modeling and Testing Security and Privacy Requirements: A Use Case-Driven App...
Modeling and Testing Security and Privacy Requirements: A Use Case-Driven App...Modeling and Testing Security and Privacy Requirements: A Use Case-Driven App...
Modeling and Testing Security and Privacy Requirements: A Use Case-Driven App...Lionel Briand
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousRaffael Marty
 
Modern Security Operations & Common Roles/Competencies
Modern Security Operations & Common Roles/Competencies Modern Security Operations & Common Roles/Competencies
Modern Security Operations & Common Roles/Competencies Harry McLaren
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Harsh Bhanushali
 

What's hot (20)

Information security-management-system
Information security-management-systemInformation security-management-system
Information security-management-system
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
 
Face recognition with pi
Face recognition with piFace recognition with pi
Face recognition with pi
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptx
 
Security monitoring and auditing
Security monitoring and auditingSecurity monitoring and auditing
Security monitoring and auditing
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
Security risks with fake apps
Security risks with fake appsSecurity risks with fake apps
Security risks with fake apps
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Cyber Security Threat Modeling
Cyber Security Threat ModelingCyber Security Threat Modeling
Cyber Security Threat Modeling
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Industroyer: biggest threat to industrial control systems since Stuxnet by An...
Industroyer: biggest threat to industrial control systems since Stuxnet by An...Industroyer: biggest threat to industrial control systems since Stuxnet by An...
Industroyer: biggest threat to industrial control systems since Stuxnet by An...
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Web Security
Web SecurityWeb Security
Web Security
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Modeling and Testing Security and Privacy Requirements: A Use Case-Driven App...
Modeling and Testing Security and Privacy Requirements: A Use Case-Driven App...Modeling and Testing Security and Privacy Requirements: A Use Case-Driven App...
Modeling and Testing Security and Privacy Requirements: A Use Case-Driven App...
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are Dangerous
 
Modern Security Operations & Common Roles/Competencies
Modern Security Operations & Common Roles/Competencies Modern Security Operations & Common Roles/Competencies
Modern Security Operations & Common Roles/Competencies
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 

Similar to How AI is preventing account fraud at web scale

Build Intelligent Fraud Prevention with Machine Learning and Graphs
Build Intelligent Fraud Prevention with Machine Learning and GraphsBuild Intelligent Fraud Prevention with Machine Learning and Graphs
Build Intelligent Fraud Prevention with Machine Learning and GraphsNeo4j
 
Digital banking Account Take Over
Digital banking Account Take OverDigital banking Account Take Over
Digital banking Account Take OverLaurent Pacalin
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer ExperienceTransUnion
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...TransUnion
 
160987-time-template-4x3.pptx
160987-time-template-4x3.pptx160987-time-template-4x3.pptx
160987-time-template-4x3.pptxAryanGour1
 
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...Institute of Contemporary Sciences
 
RSB72-PPT.pptx
RSB72-PPT.pptxRSB72-PPT.pptx
RSB72-PPT.pptxAryanGour1
 
Ibm financial crime management solution 3
Ibm financial crime management solution 3Ibm financial crime management solution 3
Ibm financial crime management solution 3Sunny Fei
 
Detecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeDetecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeLaurent Pacalin
 
5 startups using machine learning and behavioral biometrics to fight fraud
5 startups using machine learning and behavioral biometrics to fight fraud5 startups using machine learning and behavioral biometrics to fight fraud
5 startups using machine learning and behavioral biometrics to fight fraudChee Ming
 
Same day ach bec fraud detection prevention webinar 3 1-18
Same day ach bec fraud detection  prevention webinar 3 1-18 Same day ach bec fraud detection  prevention webinar 3 1-18
Same day ach bec fraud detection prevention webinar 3 1-18 Laurent Pacalin
 
credit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstractcredit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstractVenkat Projects
 
How Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments FraudHow Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments FraudKyriba Corporation
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET Journal
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
AI for optimizing customer journeys in online betting
AI for optimizing customer journeys in online bettingAI for optimizing customer journeys in online betting
AI for optimizing customer journeys in online bettingFrosmo
 
Preventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldPreventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldGuardian Analytics
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsAlejandro Correa Bahnsen, PhD
 

Similar to How AI is preventing account fraud at web scale (20)

Build Intelligent Fraud Prevention with Machine Learning and Graphs
Build Intelligent Fraud Prevention with Machine Learning and GraphsBuild Intelligent Fraud Prevention with Machine Learning and Graphs
Build Intelligent Fraud Prevention with Machine Learning and Graphs
 
Digital banking Account Take Over
Digital banking Account Take OverDigital banking Account Take Over
Digital banking Account Take Over
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer Experience
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
 
160987-time-template-4x3.pptx
160987-time-template-4x3.pptx160987-time-template-4x3.pptx
160987-time-template-4x3.pptx
 
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
 
RSB72-PPT.pptx
RSB72-PPT.pptxRSB72-PPT.pptx
RSB72-PPT.pptx
 
Ibm financial crime management solution 3
Ibm financial crime management solution 3Ibm financial crime management solution 3
Ibm financial crime management solution 3
 
Detecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeDetecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-Time
 
5 startups using machine learning and behavioral biometrics to fight fraud
5 startups using machine learning and behavioral biometrics to fight fraud5 startups using machine learning and behavioral biometrics to fight fraud
5 startups using machine learning and behavioral biometrics to fight fraud
 
Same day ach bec fraud detection prevention webinar 3 1-18
Same day ach bec fraud detection  prevention webinar 3 1-18 Same day ach bec fraud detection  prevention webinar 3 1-18
Same day ach bec fraud detection prevention webinar 3 1-18
 
credit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstractcredit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstract
 
How Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments FraudHow Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments Fraud
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Falcon 012009
Falcon 012009Falcon 012009
Falcon 012009
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
AI for optimizing customer journeys in online betting
AI for optimizing customer journeys in online bettingAI for optimizing customer journeys in online betting
AI for optimizing customer journeys in online betting
 
Preventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach WorldPreventing ATO in a Post-Equifax Breach World
Preventing ATO in a Post-Equifax Breach World
 
Fraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive AnalyticsFraud Detection with Cost-Sensitive Predictive Analytics
Fraud Detection with Cost-Sensitive Predictive Analytics
 

Recently uploaded

Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 

Recently uploaded (20)

Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 

How AI is preventing account fraud at web scale