Which of the following systems or tools can recognize that a credit card transaction is more likely to have resulted from a stolen credit card than from the holder of the credit card?
A、Intrusion detection systems
B、Data mining techniques
C、Firewalls
D、Packet filtering routers