메뉴 건너뛰기




Volumn 4065 LNAI, Issue , 2006, Pages 526-538

Establishing fraud detection patterns based on signatures

Author keywords

[No Author keywords available]

Indexed keywords

CUSTOMER SATISFACTION; DECISION MAKING; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; INDUSTRIAL ECONOMICS; PATTERN RECOGNITION; PROBLEM SOLVING; TELECOMMUNICATION SERVICES; TELECOMMUNICATION SYSTEMS;

EID: 33746450385     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11790853_41     Document Type: Conference Paper
Times cited : (22)

References (22)
  • 1
    • 0042421807 scopus 로고    scopus 로고
    • Hand statistical. Statistical fraud detection: A review
    • January
    • Richard J. Bolton and David J. Hand Statistical. Statistical fraud detection: A review. Statistical Science, 17(3):235-255, January 2002.
    • (2002) Statistical Science , vol.17 , Issue.3 , pp. 235-255
    • Bolton, R.J.1    David, J.2
  • 3
    • 28444443239 scopus 로고    scopus 로고
    • chapter Detecting fraud in the real world. Kluwer Academic Publishers, Norwell, MA, USA
    • M. Cahill, D. Lambert, J. Pinheiro, and D. Sun. Handbook of massive data sets, chapter Detecting fraud in the real world, pages 911-929. Kluwer Academic Publishers, Norwell, MA, USA, 2002.
    • (2002) Handbook of Massive Data Sets , pp. 911-929
    • Cahill, M.1    Lambert, D.2    Pinheiro, J.3    Sun, D.4
  • 8
  • 10
    • 7544223741 scopus 로고    scopus 로고
    • A survey of outlier detection methodologies
    • Victoria Hodge and Jim Austin. A survey of outlier detection methodologies. Artificial Intelligence Review, 22(2):85-126, 2004.
    • (2004) Artificial Intelligence Review , vol.22 , Issue.2 , pp. 85-126
    • Hodge, V.1    Austin, J.2
  • 12
    • 4544324490 scopus 로고    scopus 로고
    • Metadata for anomaly-based security protocol attack deduction
    • Tysen Leckie and Alec Yasinsac. Metadata for anomaly-based security protocol attack deduction. IEEE Trans. Knowl. Data Eng., 16(9):1157-1168, 2004.
    • (2004) IEEE Trans. Knowl. Data Eng. , vol.16 , Issue.9 , pp. 1157-1168
    • Leckie, T.1    Yasinsac, A.2
  • 13
    • 0027609384 scopus 로고    scopus 로고
    • A survey of intrusion detection techniques
    • T.F. Lunt. A survey of intrusion detection techniques. Computer and Security, (53):405-418, 1999.
    • (1999) Computer and Security , Issue.53 , pp. 405-418
    • Lunt, T.F.1
  • 14
    • 85009979512 scopus 로고    scopus 로고
    • Phenomenal data mining
    • John McCarthy. Phenomenal data mining. Commun. ACM, 43(8):75-79, 2000.
    • (2000) Commun. ACM , vol.43 , Issue.8 , pp. 75-79
    • McCarthy, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.