Deception technology

Results: 126



#Item
21Submit by Email  PLEASE PRINT OR TYPE Date  HUMAN SUBJECT RESEARCH REVIEW FORM

Submit by Email PLEASE PRINT OR TYPE Date HUMAN SUBJECT RESEARCH REVIEW FORM

Add to Reading List

Source URL: www.njit.edu

Language: English - Date: 2015-01-29 16:28:08
22The Hong Kong University of Science and Technology

The Hong Kong University of Science and Technology

Add to Reading List

Source URL: www.bm.ust.hk

Language: English - Date: 2011-01-23 20:24:15
23Fraud risk management  Report to Parliament 9 :  Queensland Audit Office Location

Fraud risk management Report to Parliament 9 : Queensland Audit Office Location

Add to Reading List

Source URL: www.qao.qld.gov.au

Language: English - Date: 2013-03-26 22:08:48
24W H I T E  P A P E R An Active Fight against Fraud Integrating People, Process & Data Analysis Technology

W H I T E P A P E R An Active Fight against Fraud Integrating People, Process & Data Analysis Technology

Add to Reading List

Source URL: www.audimation.com

Language: English - Date: 2013-03-13 16:30:45
25www.itee.uq.edu.au School of Information Technology & Electrical Engineering Short Course RADAR & ELECTRONIC

www.itee.uq.edu.au School of Information Technology & Electrical Engineering Short Course RADAR & ELECTRONIC

Add to Reading List

Source URL: www.itee.uq.edu.au

Language: English - Date: 2015-04-19 22:14:03
26ARBUTUS Fraud Detection Solutions Arbutus Software and Cash Recovery Partners, LLC have aligned to provide a powerful combination of services, technology and methodology that is based on over 20 years of experience in wo

ARBUTUS Fraud Detection Solutions Arbutus Software and Cash Recovery Partners, LLC have aligned to provide a powerful combination of services, technology and methodology that is based on over 20 years of experience in wo

Add to Reading List

Source URL: www.arbutussoftware.com

Language: English - Date: 2014-12-03 17:54:17
27Social Engineering Attacks Lightning Talk Sven Übelacker Security in Distributed Applications Hamburg University of Technology

Social Engineering Attacks Lightning Talk Sven Übelacker Security in Distributed Applications Hamburg University of Technology

Add to Reading List

Source URL: www.dfn-cert.de

Language: English - Date: 2015-03-03 03:21:19
28Evaluation of Voice Stress Analysis Technology Clifford S. Hopkins Law Enforcement Analysis Facility Lockheed Martin IT [removed]

Evaluation of Voice Stress Analysis Technology Clifford S. Hopkins Law Enforcement Analysis Facility Lockheed Martin IT [removed]

Add to Reading List

Source URL: www.nemesysco.com

Language: English - Date: 2011-12-13 14:05:23
29p21Jun07 Simon Green.indd

p21Jun07 Simon Green.indd

Add to Reading List

Source URL: library.printnet.com.au

Language: English - Date: 2012-01-24 01:17:14
30THE  TrusterPro™ TECHNOLOGY  RELIABILITY

THE TrusterPro™ TECHNOLOGY RELIABILITY

Add to Reading List

Source URL: www.nemesysco.com

Language: English - Date: 2012-02-08 14:00:55