-
1
-
-
0042421807
-
Hand statistical. Statistical fraud detection: A review
-
January
-
Richard J. Bolton and David J. Hand Statistical. Statistical fraud detection: A review. Statistical Science, 17(3):235-255, January 2002.
-
(2002)
Statistical Science
, vol.17
, Issue.3
, pp. 235-255
-
-
Bolton, R.J.1
David, J.2
-
2
-
-
0031362016
-
Fraud detection and management in mobile telecommunications networks
-
London, April. IEEE
-
P. Burge, J. Shawe-Taylor, Y. Moreau, H. Verrelst, C. Stoermann, and P. Gosset. Fraud detection and management in mobile telecommunications networks. In Proceedings of the 2nd IEEE European Conference on Security and Detection, volume 437, pages 91-96, London, April 1997. IEEE.
-
(1997)
Proceedings of the 2nd IEEE European Conference on Security and Detection
, vol.437
, pp. 91-96
-
-
Burge, P.1
Shawe-Taylor, J.2
Moreau, Y.3
Verrelst, H.4
Stoermann, C.5
Gosset, P.6
-
3
-
-
28444443239
-
-
chapter Detecting fraud in the real world. Kluwer Academic Publishers, Norwell, MA, USA
-
M. Cahill, D. Lambert, J. Pinheiro, and D. Sun. Handbook of massive data sets, chapter Detecting fraud in the real world, pages 911-929. Kluwer Academic Publishers, Norwell, MA, USA, 2002.
-
(2002)
Handbook of Massive Data Sets
, pp. 911-929
-
-
Cahill, M.1
Lambert, D.2
Pinheiro, J.3
Sun, D.4
-
4
-
-
24344504658
-
Communities of interest
-
C. Cortes, D. Pregibon, and C. Volinsky. Communities of interest. Intelligence Data Analysis, 6(3):211-219, 2002.
-
(2002)
Intelligence Data Analysis
, vol.6
, Issue.3
, pp. 211-219
-
-
Cortes, C.1
Pregibon, D.2
Volinsky, C.3
-
6
-
-
12244308133
-
Belief state approaches to signaling alarms in surveillance systems
-
New York, NY, USA. ACM Press
-
Kaustav Das, Andrew Moore, and Jeff Schneider. Belief state approaches to signaling alarms in surveillance systems. In Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 539-544, New York, NY, USA, 2004. ACM Press.
-
(2004)
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 539-544
-
-
Das, K.1
Moore, A.2
Schneider, J.3
-
8
-
-
85124136348
-
Combining data mining and machine learning for effective user profiling
-
Simoudis, Han, and Fayyad, editors, Menlo Park, CA. AAAI Press
-
Tom Fawcett and Foster Provost. Combining data mining and machine learning for effective user profiling. In Simoudis, Han, and Fayyad, editors, Proceedings on the Second International Conference on Knowledge Discovery and Data Mining, pages 8-13, Menlo Park, CA, 1996. AAAI Press.
-
(1996)
Proceedings on the Second International Conference on Knowledge Discovery and Data Mining
, pp. 8-13
-
-
Fawcett, T.1
Provost, F.2
-
10
-
-
7544223741
-
A survey of outlier detection methodologies
-
Victoria Hodge and Jim Austin. A survey of outlier detection methodologies. Artificial Intelligence Review, 22(2):85-126, 2004.
-
(2004)
Artificial Intelligence Review
, vol.22
, Issue.2
, pp. 85-126
-
-
Hodge, V.1
Austin, J.2
-
11
-
-
2942674608
-
Survey of fraud detection techniques
-
Taipei, Taiwan, March. IEEE, IEEE
-
Y. Kou, T. Lu S. Sirwongwattana, and Y. Huang. Survey of fraud detection techniques. In Proceedings of 2004 IEEE International Conference on Networking, Sensing and Control, Taipei, Taiwan, March 2004. IEEE, IEEE.
-
(2004)
Proceedings of 2004 IEEE International Conference on Networking, Sensing and Control
-
-
Kou, Y.1
Lu, T.2
Sirwongwattana, S.3
Huang, Y.4
-
12
-
-
4544324490
-
Metadata for anomaly-based security protocol attack deduction
-
Tysen Leckie and Alec Yasinsac. Metadata for anomaly-based security protocol attack deduction. IEEE Trans. Knowl. Data Eng., 16(9):1157-1168, 2004.
-
(2004)
IEEE Trans. Knowl. Data Eng.
, vol.16
, Issue.9
, pp. 1157-1168
-
-
Leckie, T.1
Yasinsac, A.2
-
13
-
-
0027609384
-
A survey of intrusion detection techniques
-
T.F. Lunt. A survey of intrusion detection techniques. Computer and Security, (53):405-418, 1999.
-
(1999)
Computer and Security
, Issue.53
, pp. 405-418
-
-
Lunt, T.F.1
-
14
-
-
85009979512
-
Phenomenal data mining
-
John McCarthy. Phenomenal data mining. Commun. ACM, 43(8):75-79, 2000.
-
(2000)
Commun. ACM
, vol.43
, Issue.8
, pp. 75-79
-
-
McCarthy, J.1
-
15
-
-
84956705634
-
Detection of mobile phone fraud using supervised neural networks: A first prototype
-
London, UK. Springer-Verlag
-
Yves Moreau, Herman Verrelst, and Joos Vandewalle. Detection of mobile phone fraud using supervised neural networks: A first prototype. In ICANN '97: Proceedings of the 7th International Conference on Artificial Neural Networks, pages 1065-1070, London, UK, 1997. Springer-Verlag.
-
(1997)
ICANN '97: Proceedings of the 7th International Conference on Artificial Neural Networks
, pp. 1065-1070
-
-
Moreau, Y.1
Verrelst, H.2
Vandewalle, J.3
-
18
-
-
0002688690
-
Discovery of fraud rules for telecommunications challenges and solutions
-
New York, NY, USA. ACM Press
-
Saharon Rosset, Uzi Murad, Einat Neumann, Yizhak Idan, and Gadi Pinkas. Discovery of fraud rules for telecommunications challenges and solutions. In Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 409-413, New York, NY, USA, 1999. ACM Press.
-
(1999)
Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 409-413
-
-
Rosset, S.1
Murad, U.2
Neumann, E.3
Idan, Y.4
Pinkas, G.5
-
19
-
-
3242757869
-
-
chapter Novel techniques for profiling and fraud detection in mobile telecommunications. Singapore: World Scientific
-
J. Shawe-Taylor, K. Howker, P. Gosset, M. Hyland, H. Verrelst, Y. Moreau, C. Stoermann, and P. Burge. In Business Applications of Neural Networks, chapter Novel techniques for profiling and fraud detection in mobile telecommunications, pages 113-139. Singapore: World Scientific, 2000.
-
(2000)
Business Applications of Neural Networks
, pp. 113-139
-
-
Shawe-Taylor, J.1
Howker, K.2
Gosset, P.3
Hyland, M.4
Verrelst, H.5
Moreau, Y.6
Stoermann, C.7
Burge, P.8
-
20
-
-
84892142402
-
Fraud detection in communications networks using neural and probabilistic methods
-
Michiaki Taniguchi, Michael Haft, Jaakko Hollmen, and Volker Tresp. Fraud detection in communications networks using neural and probabilistic methods. In Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP'98), number 2, page 1241-1244, 1998.
-
(1998)
Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP'98)
, vol.2
, pp. 1241-1244
-
-
Taniguchi, M.1
Haft, M.2
Hollmen, J.3
Tresp, V.4
|