Which of the following systems or tools can recognize that a credit card transaction is more likely to have resulted from a stolen credit card than from the holder of the credit card? 
A、Intrusion detection systems 
B、Data mining techniques 
C、Firewalls 
D、Packet filtering routers 
							
