-
1
-
-
0030652931
-
CARDWATCH: A neural network based database mining system for credit card fraud detection
-
IEEE, Piscataway, NJ
-
ALESKEROV, E., FREISLEBEN, B. and RAO, B. (1997). CARDWATCH: A neural network based database mining system for credit card fraud detection. In Computational Intelligence for Financial Engineering. Proceedings of the IEEE/IAFE 220-226. IEEE, Piscataway, NJ.
-
(1997)
Computational Intelligence for Financial Engineering. Proceedings of the IEEE/IAFE
, pp. 220-226
-
-
Aleskerov, E.1
Freisleben, B.2
Rao, B.3
-
2
-
-
0041960001
-
A day in the life of a Medicaid fraud statistician
-
ALLEN, T. (2000). A day in the life of a Medicaid fraud statistician. Stats 29 20-22.
-
(2000)
Stats
, vol.29
, pp. 20-22
-
-
Allen, T.1
-
3
-
-
0003964874
-
-
Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, CA
-
ANDERSON, D., FRIVOLD, T. and VALDES, A. (1995). Next-generation intrusion detection expert system (NIDES): A summary. Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, CA.
-
(1995)
Next-generation Intrusion Detection Expert System (NIDES): A Summary
-
-
Anderson, D.1
Frivold, T.2
Valdes, A.3
-
5
-
-
0042460592
-
Modelling different types of automobile insurance fraud behaviour in the Spanish market
-
ARTÍS, M., AYUSO, M. and GUILLÉN, M. (1999). Modelling different types of automobile insurance fraud behaviour in the Spanish market. Insurance Mathematics and Economics 24 67-81.
-
(1999)
Insurance Mathematics and Economics
, vol.24
, pp. 67-81
-
-
Artís, M.1
Ayuso, M.2
Guillén, M.3
-
6
-
-
0033472954
-
Extremal analysis of short series with outliers: Sea-levels and athletics records
-
BARAO, M. I. and TAWN, J. A. (1999) Extremal analysis of short series with outliers: Sea-levels and athletics records. Appl. Statist. 48 469-487.
-
(1999)
Appl. Statist.
, vol.48
, pp. 469-487
-
-
Barao, M.I.1
Tawn, J.A.2
-
7
-
-
0004310565
-
-
Technical report, Dept. Mathematics, Imperial College, London
-
BLUNT, G. and HAND, D. J. (2000). The UK credit card market. Technical report, Dept. Mathematics, Imperial College, London.
-
(2000)
The UK Credit Card Market
-
-
Blunt, G.1
Hand, D.J.2
-
8
-
-
0041458680
-
Unsupervised profiling methods for fraud detection
-
Edinburgh, UK, 5-7 Sept.
-
BOLTON, R. J. and HAND, D. J. (2001). Unsupervised profiling methods for fraud detection. In Conference on Credit Scoring and Credit Control 7, Edinburgh, UK, 5-7 Sept.
-
(2001)
Conference on Credit Scoring and Credit Control
, vol.7
-
-
Bolton, R.J.1
Hand, D.J.2
-
9
-
-
0033344304
-
Neural data mining for credit card fraud detection
-
IEEE Computer Society Press, Silver Spring, MD
-
BRAUSE, R., LANGSDORF, T. and HEPP, M. (1999). Neural data mining for credit card fraud detection. In Proceedings of the 11th IEEE International Conference on Tools with Artificial Intelligence 103-106. IEEE Computer Society Press, Silver Spring, MD.
-
(1999)
Proceedings of the 11th IEEE International Conference on Tools with Artificial Intelligence
, pp. 103-106
-
-
Brause, R.1
Langsdorf, T.2
Hepp, M.3
-
10
-
-
0003802343
-
-
Wadsworth, Belmont, CA
-
BREIMAN, L., FRIEDMAN, J. H., OLSHEN, R. A. and STONE, C. J. (1984). Classification and Regression Trees. Wadsworth, Belmont, CA.
-
(1984)
Classification and Regression Trees
-
-
Breiman, L.1
Friedman, J.H.2
Olshen, R.A.3
Stone, C.J.4
-
11
-
-
0001040806
-
Using Kohonen's self-organising feature map to uncover automobile bodily injury claims fraud
-
BROCKETT, P. L., XIA, X. and DERRIG, R. A. (1998). Using Kohonen's self-organising feature map to uncover automobile bodily injury claims fraud. The Journal of Risk and Insurance 65 245-274.
-
(1998)
The Journal of Risk and Insurance
, vol.65
, pp. 245-274
-
-
Brockett, P.L.1
Xia, X.2
Derrig, R.A.3
-
13
-
-
0033619940
-
The role of biostatistics in the prevention, detection and treatment of fraud in clinical trials
-
BUYSE, M., GEORGE, S. L., EVANS, S., GELLER, N. L., RANSTAM, J., SCHERRER, B., LESAFFRE, E., MURRAY, G., EDLER, L., HUTTON, J., COLTON, T., LACHENBRUCH, P. and VERMA, B. L. (1999). The role of biostatistics in the prevention, detection and treatment of fraud in clinical trials. Statistics in Medicine 18 3435-3451.
-
(1999)
Statistics in Medicine
, vol.18
, pp. 3435-3451
-
-
Buyse, M.1
George, S.L.2
Evans, S.3
Geller, N.L.4
Ranstam, J.5
Scherrer, B.6
Lesaffre, E.7
Murray, G.8
Edler, L.9
Hutton, J.10
Colton, T.11
Lachenbruch, P.12
Verma, B.L.13
-
14
-
-
0041960000
-
Detecting fraud in the real world
-
(J. Abello, P. M. Pardalos and M. G. C. Resende, eds.). Kluwer, Dordrecht
-
CAHILL, M. H., LAMBERT, D., PINHEIRO, J. C. and SUN, D. X. (2002). Detecting fraud in the real world. In Handbook of Massive Datasets (J. Abello, P. M. Pardalos and M. G. C. Resende, eds.). Kluwer, Dordrecht.
-
(2002)
Handbook of Massive Datasets
-
-
Cahill, M.H.1
Lambert, D.2
Pinheiro, J.C.3
Sun, D.X.4
-
15
-
-
0033336136
-
Distributed data mining in credit card fraud detection
-
CHAN, P. K., FAN, W., PRODROMIDIS. A. L. and STOLFO, S. J. (1999). Distributed data mining in credit card fraud detection. IEEE Intelligent Systems 14(6) 67-74.
-
(1999)
IEEE Intelligent Systems
, vol.14
, Issue.6
, pp. 67-74
-
-
Chan, P.K.1
Fan, W.2
Prodromidis, A.L.3
Stolfo, S.J.4
-
16
-
-
85083464467
-
Toward scalable learning with non-uniform class and cost distributions: A case study in credit card fraud detection
-
AAAI Press, Menlo Park, CA
-
CHAN, P. and STOLFO, S. (1998). Toward scalable learning with non-uniform class and cost distributions: A case study in credit card fraud detection. In Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining 164-168. AAAI Press, Menlo Park, CA.
-
(1998)
Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining
, pp. 164-168
-
-
Chan, P.1
Stolfo, S.2
-
17
-
-
0041959999
-
Money laundering detection with a neural network
-
(P. J. G. Lisboa, A. Vellido and B. Edisbury, eds.) World Scientific, Singapore
-
CHARTIER, B. and SPILLANE, T. (2000). Money laundering detection with a neural network. In Business Applications of Neural Networks (P. J. G. Lisboa, A. Vellido and B. Edisbury, eds.) 159-172. World Scientific, Singapore.
-
(2000)
Business Applications of Neural Networks
, pp. 159-172
-
-
Chartier, B.1
Spillane, T.2
-
18
-
-
0011210217
-
Linear discriminant analysis with misallocation in training samples
-
CHHIKARA, R. S. and MCKEON, J. (1984). Linear discriminant analysis with misallocation in training samples. J. Amer. Statist. Assoc. 79 899-906.
-
(1984)
J. Amer. Statist. Assoc.
, vol.79
, pp. 899-906
-
-
Chhikara, R.S.1
Mckeon, J.2
-
19
-
-
34249966007
-
The CN2 induction algorithm
-
CLARK, P. and NIBLETT, T. (1989). The CN2 induction algorithm. Machine Learning 3 261-285.
-
(1989)
Machine Learning
, vol.3
, pp. 261-285
-
-
Clark, P.1
Niblett, T.2
-
21
-
-
0034592773
-
Hancock: A language for extracting signatures from data streams
-
ACM Press, New York
-
CORTES, C., FISHER, K., PREGIBON, D. and ROGERS, A. (2000). Hancock: A language for extracting signatures from data streams. In Proceedings of the Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining 9-17. ACM Press, New York.
-
(2000)
Proceedings of the Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 9-17
-
-
Cortes, C.1
Fisher, K.2
Pregibon, D.3
Rogers, A.4
-
26
-
-
2342452154
-
Cyberspace attacks and countermeasures
-
(D. E. Denning and P. J. Denning, eds.) ACM Press, New York
-
DENNING, D. E. (1997). Cyberspace attacks and countermeasures. In Internet Besieged (D. E. Denning and P. J. Denning, eds.) 29-55. ACM Press, New York.
-
(1997)
Internet Besieged
, pp. 29-55
-
-
Denning, D.E.1
-
27
-
-
0031192174
-
Neural fraud detection in credit card operations
-
DORRONSORO, J. R., GINEL, F., SANCHEZ, C. and CRUZ, C. S. (1997). Neural fraud detection in credit card operations. IEEE Transactions on Neural Networks 8 827-834.
-
(1997)
IEEE Transactions on Neural Networks
, vol.8
, pp. 827-834
-
-
Dorronsoro, J.R.1
Ginel, F.2
Sanchez, C.3
Cruz, C.S.4
-
28
-
-
0000892585
-
Detection of management fraud: A neural network approach
-
FANNING, K., COGGER, K. O. and SRIVASTAVA, R. (1995). Detection of management fraud: A neural network approach. International Journal of Intelligent Systems in Accounting, Finance and Management 4 113-126.
-
(1995)
International Journal of Intelligent Systems in Accounting, Finance and Management
, vol.4
, pp. 113-126
-
-
Fanning, K.1
Cogger, K.O.2
Srivastava, R.3
-
32
-
-
0029716418
-
A sense of self for UNIX processes
-
IEEE Computer Society Press, Silver Spring, MD
-
FORREST, S., HOFMEYR, S., SOMAYAJI, A. and LONGSTAFF. T. (1996). A sense of self for UNIX processes. In Proceedings of the 1996 IEEE Symposium on Security and Privacy 120-128. IEEE Computer Society Press, Silver Spring, MD.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
33
-
-
0027986244
-
Credit card fraud detection with a neural network
-
(J. F. Nunamaker and R. H. Sprague, eds.) IEEE Computer Society Press, Los Alamitos, CA
-
GHOSH, S. and REILLY, D. L. (1994). Credit card fraud detection with a neural network. In Proceedings of the 27th Hawaii International Conference on System Sciences (J. F. Nunamaker and R. H. Sprague, eds.) 3 621-630. IEEE Computer Society Press, Los Alamitos, CA.
-
(1994)
Proceedings of the 27th Hawaii International Conference on System Sciences
, vol.3
, pp. 621-630
-
-
Ghosh, S.1
Reilly, D.L.2
-
37
-
-
0041959996
-
The FinCEN AI system: Finding financial crimes in a large database of cash transactions
-
(N. Jennings and M. Wooldridge, eds.) Springer, Berlin
-
GOLDBERG, H. and SENATOR, T. E. (1998). The FinCEN AI system: Finding financial crimes in a large database of cash transactions. In Agent Technology: Foundations, Applications, and Markets (N. Jennings and M. Wooldridge, eds.) 283-302. Springer, Berlin.
-
(1998)
Agent Technology: Foundations, Applications, and Markets
, pp. 283-302
-
-
Goldberg, H.1
Senator, T.E.2
-
38
-
-
17144412609
-
Assessing the risk of management fraud through neural network technology
-
GREEN, B. P. and CHOI, J. H. (1997). Assessing the risk of management fraud through neural network technology. Auditing 16 14-28.
-
(1997)
Auditing
, vol.16
, pp. 14-28
-
-
Green, B.P.1
Choi, J.H.2
-
42
-
-
0000776603
-
Data mining for fun and profit (with discussion)
-
HAND, D. J., BLUNT, G., KELLY, M. G. and ADAMS, N. M. (2000). Data mining for fun and profit (with discussion). Statist. Sci. 15 111-131.
-
(2000)
Statist. Sci.
, vol.15
, pp. 111-131
-
-
Hand, D.J.1
Blunt, G.2
Kelly, M.G.3
Adams, N.M.4
-
43
-
-
0040453788
-
Statistical classification methods in consumer credit scoring: A review
-
HAND, D. J. and HENLEY, W. E. (1997). Statistical classification methods in consumer credit scoring: A review. J. Roy. Statist. Soc. Ser. A 160 523-541.
-
(1997)
J. Roy. Statist. Soc. Ser. A
, vol.160
, pp. 523-541
-
-
Hand, D.J.1
Henley, W.E.2
-
44
-
-
0013325845
-
Detecting payment card fraud with neural networks
-
(P. J. G. Lisboa, A. Vellido and B. Edisbury, eds.). World Scientific, Singapore
-
HASSIBI, K. (2000). Detecting payment card fraud with neural networks. In Business Applications of Neural Networks (P. J. G. Lisboa, A. Vellido and B. Edisbury, eds.). World Scientific, Singapore.
-
(2000)
Business Applications of Neural Networks
-
-
Hassibi, K.1
-
45
-
-
84956864676
-
Application of genetic algorithm and k-nearest neighbour method in medical fraud detection
-
Springer, Berlin
-
HE, H., GRACO, W. and YAO, X. (1999). Application of genetic algorithm and k-nearest neighbour method in medical fraud detection. Lecture Notes in Comput. Sci. 1585 74-81. Springer, Berlin.
-
(1999)
Lecture Notes in Comput. Sci.
, vol.1585
, pp. 74-81
-
-
He, H.1
Graco, W.2
Yao, X.3
-
46
-
-
0031270196
-
Application of neural networks to detection of medical fraud
-
HE, H. X., WANG, J. C., GRACO, W. and HAWKINS, S. (1997). Application of neural networks to detection of medical fraud. Expert Systems with Applications 13 329-336.
-
(1997)
Expert Systems with Applications
, vol.13
, pp. 329-336
-
-
He, H.X.1
Wang, J.C.2
Graco, W.3
Hawkins, S.4
-
47
-
-
84972541029
-
A statistical derivation of the significant-digit law
-
HILL, T. P. (1995). A statistical derivation of the significant-digit law. Statist. Sci. 10 354-363.
-
(1995)
Statist. Sci.
, vol.10
, pp. 354-363
-
-
Hill, T.P.1
-
48
-
-
0042460591
-
Experiences in mobile phone fraud
-
Report Tik-110.501, Helsinki Univ. Technology
-
HYNNINEN, J. (2000). Experiences in mobile phone fraud. Seminar on Network Security. Report Tik-110.501, Helsinki Univ. Technology.
-
(2000)
Seminar on Network Security
-
-
Hynninen, J.1
-
49
-
-
0041959997
-
Getting smart with fraudsters
-
JENKINS, P. (2000). Getting smart with fraudsters. Financial Times, September 23.
-
(2000)
Financial Times
, vol.SEPTEMBER
, pp. 23
-
-
Jenkins, P.1
-
50
-
-
0042961674
-
Prospective assessment of AI technologies for fraud detection: A case study
-
AAAI Press, Menlo Park, CA
-
JENSEN, D. (1997). Prospective assessment of AI technologies for fraud detection: a case study. In AAAI Workshop on AI Approaches to Fraud Detection and Risk Management 34-38. AAAI Press, Menlo Park, CA.
-
(1997)
AAAI Workshop on AI Approaches to Fraud Detection and Risk Management
, pp. 34-38
-
-
Jensen, D.1
-
51
-
-
0035616570
-
A hybrid high-order Markov chain model for computer intrusion detection
-
JU, W.-H. and VARDI, Y. (2001). A hybrid high-order Markov chain model for computer intrusion detection. J. Comput. Graph. Statist. 10 277-295.
-
(2001)
J. Comput. Graph. Statist.
, vol.10
, pp. 277-295
-
-
Ju, W.-H.1
Vardi, Y.2
-
52
-
-
0031628708
-
The NASD regulation advanced detection system (ADS)
-
AAAI Press, Menlo Park, CA
-
KIRKLAND, J. D., SENATOR, T. E., HAYDEN, J. J., DYBALA, T., GOLDBERG, H. G. and SHYR, P. (1998). The NASD regulation advanced detection system (ADS). In Proceedings of the 15th National Conference on Artificial Intelligence (AAAI-98) and of the 10th Conference on Innovative Applications of Artificial Intelligence (IAAI-98) 1055-1062. AAAI Press, Menlo Park, CA.
-
(1998)
Proceedings of the 15th National Conference on Artificial Intelligence (AAAI-98) and of the 10th Conference on Innovative Applications of Artificial Intelligence (IAAI-98)
, pp. 1055-1062
-
-
Kirkland, J.D.1
Senator, T.E.2
Hayden, J.J.3
Dybala, T.4
Goldberg, H.G.5
Shyr, P.6
-
53
-
-
0031233430
-
Intrusion detection via system call traces
-
KOSORESOW, A. P. and HOFMEYR, S. A. (1997). Intrusion detection via system call traces. IEEE Software 14 35-12.
-
(1997)
IEEE Software
, vol.14
, pp. 35-112
-
-
Kosoresow, A.P.1
Hofmeyr, S.A.2
-
55
-
-
0001385070
-
Discriminant analysis when the initial samples are misclassified
-
LACHENBRUCH, P. A. (1966). Discriminant analysis when the initial samples are misclassified. Technometrics 8 657-662.
-
(1966)
Technometrics
, vol.8
, pp. 657-662
-
-
Lachenbruch, P.A.1
-
56
-
-
0016093646
-
Discriminant analysis when the initial samples are misclassified. II: Non-random misclassification models
-
LACHENBRUCH, P. A. (1974). Discriminant analysis when the initial samples are misclassified. II: Non-random misclassification models. Technometrics 16 419-424.
-
(1974)
Technometrics
, vol.16
, pp. 419-424
-
-
Lachenbruch, P.A.1
-
58
-
-
85084163349
-
Data mining approaches for intrusion detection
-
San Antonio, TX USENIX Association, Berkeley, CA
-
LEE, W. and STOLFO, S. (1998). Data mining approaches for intrusion detection. In Proceedings of the 7th USENIX Security Symposium, San Antonio, TX 79-93. USENIX Association, Berkeley, CA.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
, pp. 79-93
-
-
Lee, W.1
Stolfo, S.2
-
59
-
-
0040911818
-
Detecting credit card fraud using expert systems
-
LEONARD, K. J. (1993). Detecting credit card fraud using expert systems. Computers and Industrial Engineering 25 103-106.
-
(1993)
Computers and Industrial Engineering
, vol.25
, pp. 103-106
-
-
Leonard, K.J.1
-
60
-
-
84962260018
-
-
Unpublished manuscript, MIT Lincoln Laboratory
-
LIPPMANN, R., FRIED, D., GRAF, I., HAINES, J., KENDALL, K., MCCLUNG, D., WEBER, D., WEBSTER, S., WYSCHOGROD, D., CUNNINGHAM, R. and ZISSMAN, M. (2000). Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion-detection evaluation. Unpublished manuscript, MIT Lincoln Laboratory.
-
(2000)
Evaluating Intrusion Detection Systems: The 1998 DARPA Off-line Intrusion-detection Evaluation
-
-
Lippmann, R.1
Fried, D.2
Graf, I.3
Haines, J.4
Kendall, K.5
Mcclung, D.6
Weber, D.7
Webster, S.8
Wyschogrod, D.9
Cunningham, R.10
Zissman, M.11
-
61
-
-
0026912635
-
EFD: A hybrid knowledge/statistical-based system for the detection of fraud
-
MAJOR, J. A. and RIEDINGER, D. R. (1992). EFD: A hybrid knowledge/statistical-based system for the detection of fraud. International Journal of Intelligent Systems 7 687-703.
-
(1992)
International Journal of Intelligent Systems
, vol.7
, pp. 687-703
-
-
Major, J.A.1
Riedinger, D.R.2
-
63
-
-
85009979512
-
Phenomenal data mining
-
MCCARTHY, J. (2000). Phenomenal data mining. Comm. ACM 43 75-79.
-
(2000)
Comm. ACM
, vol.43
, pp. 75-79
-
-
Mccarthy, J.1
-
65
-
-
0042961673
-
New IP world, new dangers
-
MOBILE EUROPE (2000). New IP world, new dangers. Mobile Europe, March.
-
(2000)
Mobile Europe
, vol.MARCH
-
-
-
66
-
-
0041458677
-
Novel techniques for fraud detection in mobile communications
-
Grenada
-
MOREAU, Y., PRENEEL, B., BURGE, P., SHAWE-TAYLOR, J., STOERMANN, C. and COOKE, C. (1996). Novel techniques for fraud detection in mobile communications. In ACTS Mobile Summit, Grenada.
-
(1996)
ACTS Mobile Summit
-
-
Moreau, Y.1
Preneel, B.2
Burge, P.3
Shawe-Taylor, J.4
Stoermann, C.5
Cooke, C.6
-
67
-
-
84956705634
-
Detection of mobile phone fraud using supervised neural networks: A first prototype
-
Springer, Berlin
-
MOREAU, Y., VERRELST, H. and VANDEWALLE, J. (1997). Detection of mobile phone fraud using supervised neural networks: A first prototype. In Proceedings of 7th International Conference on Artificial Neural Networks (ICANN'97) 1065-1070. Springer, Berlin.
-
(1997)
Proceedings of 7th International Conference on Artificial Neural Networks (ICANN'97)
, pp. 1065-1070
-
-
Moreau, Y.1
Verrelst, H.2
Vandewalle, J.3
-
69
-
-
0042961671
-
-
Report. Neural Technologies, Ltd., Petersfield, U.K.
-
NEURAL TECHNOLOGIES (2000). Reducing telecoms fraud and churn. Report. Neural Technologies, Ltd., Petersfield, U.K.
-
(2000)
Reducing Telecoms Fraud and Churn
-
-
-
72
-
-
0042961668
-
Nortel networks fraud solutions
-
Nortel Networks Corporation
-
NORTEL (2000). Nortel networks fraud solutions. Fraud Primer, Issue 2.0. Nortel Networks Corporation.
-
(2000)
Fraud Primer, Issue 2.0
-
-
-
73
-
-
0042460588
-
A statistical analysis of the U.S. Merchandise Trade Database and its uses in transfer pricing compliance and enforcement
-
PAK, S. J. and ZDANOWICZ, J. S. (1994). A statistical analysis of the U.S. Merchandise Trade Database and its uses in transfer pricing compliance and enforcement. Tax Management, May 11.
-
(1994)
Tax Management
, vol.MAY
, pp. 11
-
-
Pak, S.J.1
Zdanowicz, J.S.2
-
74
-
-
0041458678
-
Reducing online credit card fraud
-
PATIENT, S. (2000). Reducing online credit card fraud. Web Developer's Journal. Available at http://www. webdevelopersjournal.com/articles/card_fraud.html
-
(2000)
Web Developer's Journal
-
-
Patient, S.1
-
76
-
-
0035283313
-
Robust classification for imprecise environments
-
PROVOST, F. and FAWCETT, T. (2001). Robust classification for imprecise environments. Machine Learning 42 203-210.
-
(2001)
Machine Learning
, vol.42
, pp. 203-210
-
-
Provost, F.1
Fawcett, T.2
-
77
-
-
0032310679
-
Statistical anomaly detection for link-state routing protocols
-
IEEE Computer Society Press, Los Alamitos, CA
-
QU, D., VETTER, B. M., WANG, F., NARAYAN, R., WU, S. F., HOU, Y. F., GONG, F. and SARGOR, C. (1998). Statistical anomaly detection for link-state routing protocols. In Proceedings of the Sixth International Conference on Network Protocols 62-70. IEEE Computer Society Press, Los Alamitos, CA.
-
(1998)
Proceedings of the Sixth International Conference on Network Protocols
, pp. 62-70
-
-
Qu, D.1
Vetter, B.M.2
Wang, F.3
Narayan, R.4
Wu, S.F.5
Hou, Y.F.6
Gong, F.7
Sargor, C.8
-
78
-
-
0001172265
-
Learning logical definitions from relations
-
QUINLAN, J. R. (1990). Learning logical definitions from relations. Machine Learning 5 239-266.
-
(1990)
Machine Learning
, vol.5
, pp. 239-266
-
-
Quinlan, J.R.1
-
81
-
-
21844509643
-
Statistics for exceptional athletics records
-
ROBINSON, M. E. and TAWN, J. A. (1995). Statistics for exceptional athletics records. Appl. Statist. 44 499-511.
-
(1995)
Appl. Statist.
, vol.44
, pp. 499-511
-
-
Robinson, M.E.1
Tawn, J.A.2
-
82
-
-
0002688690
-
Discovery of fraud rules for telecommunications - Challenges and solutions
-
ACM Press, New York
-
ROSSET, S., MURAD, U., NEUMANN, E., IDAN, Y. and PINKAS, G. (1999). Discovery of fraud rules for telecommunications - challenges and solutions. In Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining 409-413. ACM Press, New York.
-
(1999)
Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 409-413
-
-
Rosset, S.1
Murad, U.2
Neumann, E.3
Idan, Y.4
Pinkas, G.5
-
83
-
-
0013324757
-
Intrusion detection with neural networks
-
AAAI Press, Menlo Park, CA
-
RYAN, J., LIN, M. and MIIKKULAINEN, R. (1997). Intrusion detection with neural networks. In AAAI Workshop on AI Approaches to Fraud Detection and Risk Management 72-79. AAAI Press, Menlo Park, CA.
-
(1997)
AAAI Workshop on AI Approaches to Fraud Detection and Risk Management
, pp. 72-79
-
-
Ryan, J.1
Lin, M.2
Miikkulainen, R.3
-
84
-
-
0012282403
-
Computer intrusion: Detecting masquerades
-
SCHONLAU, M., DUMOUCHEL, W., JU, W.-H., KARR, A. F., THEUS, M. and VARDI, Y. (2001). Computer intrusion: Detecting masquerades. Statist. Sci. 16 58-74.
-
(2001)
Statist. Sci.
, vol.16
, pp. 58-74
-
-
Schonlau, M.1
Dumouchel, W.2
Ju, W.-H.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
-
85
-
-
0034592921
-
Ongoing management and application of discovered knowledge in a large regulatory organization: A case study of the use and impact of NASD regulation's advanced detection system (ADS)
-
ACM Press, New York
-
SENATOR, T. E. (2000). Ongoing management and application of discovered knowledge in a large regulatory organization: A case study of the use and impact of NASD regulation's advanced detection system (ADS). In Proceedings of the Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining 44-53. ACM Press, New York.
-
(2000)
Proceedings of the Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 44-53
-
-
Senator, T.E.1
-
86
-
-
0002673199
-
The financial crimes enforcement network AI system (FAIS) -Identifying potential money laundering from reports of large cash transactions
-
SENATOR, T. E., GOLDBERG, H. G., WOOTON, J., COTTINI, M. A., UMAR KHAN, A. F., KLINGER, C. D., LLAMAS, W. M., MARRONE, M. P. and WONG, R. W. H. (1995). The financial crimes enforcement network AI system (FAIS) -Identifying potential money laundering from reports of large cash transactions. AI Magazine 16 21-39.
-
(1995)
AI Magazine
, vol.16
, pp. 21-39
-
-
Senator, T.E.1
Goldberg, H.G.2
Wooton, J.3
Cottini, M.A.4
Umar Khan, A.F.5
Klinger, C.D.6
Llamas, W.M.7
Marrone, M.P.8
Wong, R.W.H.9
-
87
-
-
0042961665
-
Novel techniques for profiling and fraud detection in mobile telecommunications
-
(P. J. G. Lisboa, A. Vellido and B.Edisbury, eds.) World Scientific, Singapore
-
SHAWE-TAYLOR, J., HOWKER, K., COSSET, P., HYLAND, M., VERRELST, H., MOREAU, Y., STOERMANN, C. and BURGE, P. (2000). Novel techniques for profiling and fraud detection in mobile telecommunications. In Business Applications of Neural Networks (P. J. G. Lisboa, A. Vellido and B.Edisbury, eds.) 113-139. World Scientific, Singapore.
-
(2000)
Business Applications of Neural Networks
, pp. 113-139
-
-
Shawe-Taylor, J.1
Howker, K.2
Cosset, P.3
Hyland, M.4
Verrelst, H.5
Moreau, Y.6
Stoermann, C.7
Burge, P.8
-
90
-
-
0031335009
-
Statistics for exceptional athletics records
-
by M. E. Robinson and J. A. Tawn
-
SMITH, R. L. (1997). Comment on "Statistics for exceptional athletics records," by M. E. Robinson and J. A. Tawn. Appl. Statist. 46 123-128.
-
(1997)
Appl. Statist.
, vol.46
, pp. 123-128
-
-
Smith, R.L.1
-
91
-
-
0042961664
-
Credit card fraud detection using metalearning: Issues and initial results
-
AAAI Press, Menlo Park, CA
-
STOLFO, S. J., FAN, D. W., LEE, W., PRODROMIDIS, A. L. and CHAN, P. K. (1997a). Credit card fraud detection using metalearning: Issues and initial results. In AAAI Workshop on AI Approaches to Fraud Detection and Risk Management 83-90. AAAI Press, Menlo Park, CA.
-
(1997)
AAAI Workshop on AI Approaches to Fraud Detection and Risk Management
, pp. 83-90
-
-
Stolfo, S.J.1
Fan, D.W.2
Lee, W.3
Prodromidis, A.L.4
Chan, P.K.5
-
92
-
-
84962238645
-
Cost-based modeling for fraud and intrusion detection: Results from the JAM Project
-
IEEE Computer Press, New York
-
STOLFO, S., FAN, W., LEE, W., PRODROMIDIS, A. L. and CHAN, P. (1999). Cost-based modeling for fraud and intrusion detection: Results from the JAM Project. In Proceedings of the DARPA Information Survivability Conference and Exposition 2 130-144. IEEE Computer Press, New York.
-
(1999)
Proceedings of the DARPA Information Survivability Conference and Exposition
, vol.2
, pp. 130-144
-
-
Stolfo, S.1
Fan, W.2
Lee, W.3
Prodromidis, A.L.4
Chan, P.5
-
93
-
-
0002221749
-
JAM: Java agents for meta-learning over distributed databases
-
AAAI Press, Menlo Park, CA
-
STOLFO, S. J., PRODROMIDIS, A. L., TSELEPIS, S., LEE, W., FAN, D. W. and CHAN, P. K. (1997b). JAM: Java agents for meta-learning over distributed databases. In AAAI Workshop on AI Approaches to Fraud Detection and Risk Management 91-98. AAAI Press, Menlo Park, CA.
-
(1997)
AAAI Workshop on AI Approaches to Fraud Detection and Risk Management
, pp. 91-98
-
-
Stolfo, S.J.1
Prodromidis, A.L.2
Tselepis, S.3
Lee, W.4
Fan, D.W.5
Chan, P.K.6
-
94
-
-
84892142402
-
Fraud detection in communication networks using neural and probabilistic methods
-
IEEE Computer Society Press, Silver Spring, MD
-
TANIGUCHI, M., HAFT, M., HOLLMÉN, J. and TRESP, V. (1998). Fraud detection in communication networks using neural and probabilistic methods. In Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP'98) 2 1241-1244. IEEE Computer Society Press, Silver Spring, MD.
-
(1998)
Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP'98)
, vol.2
, pp. 1241-1244
-
-
Taniguchi, M.1
Haft, M.2
Hollmén, J.3
Tresp, V.4
-
95
-
-
9444255399
-
-
Office of Technology Assessment, Report OTA-ITC-630, U.S. Government Printing Office, Washington, DC
-
U.S. CONGRESS (1995). Information technologies for the control of money laundering. Office of Technology Assessment, Report OTA-ITC-630, U.S. Government Printing Office, Washington, DC.
-
(1995)
Information Technologies for the Control of Money Laundering
-
-
-
98
-
-
0033705131
-
Multiple algorithms for fraud detection
-
WHEELER, R. and AITKEN, S. (2000). Multiple algorithms for fraud detection. Knowledge-Based Systems 13(2/3) 93-99.
-
(2000)
Knowledge-Based Systems
, vol.13
, Issue.2-3
, pp. 93-99
-
-
Wheeler, R.1
Aitken, S.2
|