Detection of adversarial networks

Devices and techniques are generally described for fraud detection. In various examples, a first plurality of requests are received over a first time period. In at least some examples, the first plurality of requests may be requests to access a first service. A hierarchical data representation compr...

Full description

Saved in:
Bibliographic Details
Main Authors Powers, Adam Edward, Colón, Brendan Cruz, Thalken, Jason L, Tatla, Manraj, Ufimtsev, Lev
Format Patent
LanguageEnglish
Published 28.06.2022
Subjects
Online AccessGet full text

Cover

Loading…