![]() | ![]() |
1990 | ||
---|---|---|
2 | EE | Lindsay C. J. Mercer: Tailor-made auditing of information systems for the detection of fraud. Computers & Security 9(1): 59-66 (1990) |
1 | EE | Lindsay C. J. Mercer: Fraud detection via regression analysis. Computers & Security 9(4): 331-338 (1990) |