Detection of adversarial networks
Devices and techniques are generally described for fraud detection. In various examples, a first plurality of requests are received over a first time period. In at least some examples, the first plurality of requests may be requests to access a first service. A hierarchical data representation compr...
Saved in:
Main Authors | , , , , |
---|---|
Format | Patent |
Language | English |
Published |
28.06.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Be the first to leave a comment!