Deysy Galeana Perez

  • Citations Per Year
Learn More
We present a method to detect outlier or exceptional transactions records applying an innovative user modeling. We use a large financial database to validate our method. Our method has two stages. The first stage is for user transaction modeling and it obtains user behavior according to historic transactions based on categorical or numerical attributes. The(More)
Transfer of data from source to destination is of prime concern in case of advanced computing. Virtual machines in terms of nodes exist in advance computing. Users of advance computing could be fair or malicious in nature. In case of malicious nodes some defence mechanism is needed. This defence mechanism is provided in terms of encryption. In advance(More)
  • 1