Which of the following systems or tools can recognize that a credit card transaction is more likely to have resulted from a stolen credit card than from the holder of the credit card?
A. Intrusion detection systems
B. Data mining techniques
C. Firewalls
D. Packet filtering routers
A. Intrusion detection systems
B. Data mining techniques
C. Firewalls
D. Packet filtering routers