
Search: (clear)
a
- Ad Stacking
- Ads.txt
- Anomaly Insights
- Assisted Installs - Mobile Advertising Assists
- Attribution Fraud
- Attribution Window
- Auto Downloads
- Auto Redirect
b
- Behavioral Anomalies
- Biased Attribution
- Blacklist
- Blocked In-App Events
- Bot Signatures
- Bots
- Brand Safety
c
- Clean Devices
- Click Farms
- Click Flooding
- Click Fraud
- Click Hijacking
- Click Injection
- Click Redirection
- Click To Install Time (CTIT)
- Contribution Rate
- Country Mismatch
- CPA Fraud
d
- Device Farm
- Device ID Reset Fraud
- DeviceID Reset Marathons
- DeviceRank
- Display Fraud
- Distribution Modeling
- Duplicate IP
e
- Emulated Devices
f
- Fake Users
- Financial Exposure (to Fraud)
- Forced Clicks
- Fraudster
- Fraudulent In-App Events
g
- GDPR
i
- Impression Fraud
- In-App Engagement (Revenue Fraud)
- Incentivized Install Mislabeling
- Install Broadcasting
- Install Farms
- Install Fraud
- Install Hijacking
- Install Validation
- IP Address
l
- Last Click Attribution
- Life Time Value (LTV)
- Limit Ad Tracking
- Loyal User
m
- Mislabeled Traffic
- Mobile Ad Fraud
- Mobile Fraud Detection and Protection
- Mobile Malware
- Mobile Marketing Transparency
n
- New Devices Fraud
p
- Phone Farms
- Pop Under
- Post Compilation SDK
- Post-Attribution Fraud Protection
- Protect360
- Proxy
- Purchase Fraud
r
- Raw Data Report
- Raw Data Reports
- Real-Time Protection (Prevention)
- Receipt Validation
- Reconciliation
- Referral Hijacking
s
- SDK Hacking (a.k.a Spoofing) Fraud
- Secure, Post-Compilation SDKs
- Server-Based Fraud (Simulated Devices)
- SiteIDs & Sub-Publishers
- Spoofed Traffic
- Store Validation
- Suspicious Devices
v
- Viewability Fraud
- VPNs - Virtual Private Networks