-
1
-
-
33749853906
-
Classification, detection and prosecution of fraud in mobile networks
-
Sorrento Italy
-
Gosset, P. and Hyland, M.: Classification, detection and prosecution of fraud in mobile networks. Proceedings of ACTS Mobile Summit, Sorrento Italy (1999)
-
(1999)
Proceedings of ACTS Mobile Summit
-
-
Gosset, P.1
Hyland, M.2
-
2
-
-
0042421807
-
Statistical fraud detection: A review
-
Bolton, R. J. and Hand, D. J.: Statistical fraud detection: a review. Statistical Science, vol. 17, no. 3. (2002) 235-255
-
(2002)
Statistical Science
, vol.17
, Issue.3
, pp. 235-255
-
-
Bolton, R.J.1
Hand, D.J.2
-
5
-
-
2942660612
-
Novel techniques for fraud detection in mobile telecommunication networks
-
Granada Spain
-
Moreau Y., Preneel B., Burge P., Shawe-Taylor J., Stoermann C., Cooke C.: Novel Techniques for Fraud Detection in Mobile Telecommunication Networks. ACTS Mobile Summit. Granada Spain (1997)
-
(1997)
ACTS Mobile Summit
-
-
Moreau, Y.1
Preneel, B.2
Burge, P.3
Shawe-Taylor, J.4
Stoermann, C.5
Cooke, C.6
-
7
-
-
0002688690
-
Discovery of fraud rules for telecommunications - Challenges and solutions
-
ACM Press, San Diego, CA, USA
-
Rosset, S., Murad, U., Neumann, E., Idan, Y., and Pinkas G.: Discovery of fraud rules for telecommunications - challenges and solutions. Proc. of ACM SIGKDD-99. ACM Press, San Diego, CA, USA (1999) 409-413
-
(1999)
Proc. of ACM SIGKDD-99
, pp. 409-413
-
-
Rosset, S.1
Murad, U.2
Neumann, E.3
Idan, Y.4
Pinkas, G.5
-
8
-
-
0002704048
-
User profiling in personalization applications through rule discovery and validation
-
ACM Press, San Diego, CA, USA
-
Adomavicious, G. and Tuzhilin, Al.: User profiling in Personalization Applications through Rule Discovery and Validation. Proc. of ACM SIGKDD-99. ACM Press, San Diego, CA, USA (1999) 377 - 381
-
(1999)
Proc. of ACM SIGKDD-99
, pp. 377-381
-
-
Adomavicious, G.1
Tuzhilin, Al.2
-
10
-
-
0242468747
-
An anomaly intrusion detection method by clustering normal user behavior
-
Oh, S. H. and Lee, W. S.: An anomaly intrusion detection method by clustering normal user behavior. Computers & Security, Vol. 22, No. 7. (2003) 596-612
-
(2003)
Computers & Security
, vol.22
, Issue.7
, pp. 596-612
-
-
Oh, S.H.1
Lee, W.S.2
-
11
-
-
21944445756
-
Visual data mining: Recognizing telephone calling fraud
-
Cox, K. C., Eick, S. G., Wills, G. J. and Brachman R. J.: Visual data mining: Recognizing telephone calling fraud. J. Data Mining and Knowledge Discover, 1 (2). (1997) 225-231
-
(1997)
J. Data Mining and Knowledge Discover
, vol.1
, Issue.2
, pp. 225-231
-
-
Cox, K.C.1
Eick, S.G.2
Wills, G.J.3
Brachman, R.J.4
-
12
-
-
84892142402
-
Fraud detection in communication networks using neural and probabilistic methods
-
Taniguchi, M., Haft, M., Hollmen, J. and Tresp V.: Fraud detection in communication networks using neural and probabilistic methods. Proc. of the 1998 IEEE Int. Conf. in Acoustics, Speech and Signal Processing, Vol. 2. (1998) 1241-1244
-
(1998)
Proc. of the 1998 IEEE Int. Conf. in Acoustics, Speech and Signal Processing
, vol.2
, pp. 1241-1244
-
-
Taniguchi, M.1
Haft, M.2
Hollmen, J.3
Tresp, V.4
-
13
-
-
0036804085
-
Network intrusion and fault detection: A statistical anomaly approach
-
Manikopoulos, C. and Papavassilliou, S.: Network Intrusion and Fault Detection: A Statistical Anomaly Approach. IEEE Communications Magazine, Vol. 40, 10. (2002) 76-82
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 76-82
-
-
Manikopoulos, C.1
Papavassilliou, S.2
-
15
-
-
29144443664
-
Minority report in fraud detection: Classification of skewed data
-
Phua, C., Alahakoon, D. and Lee, V.: Minority Report in Fraud Detection: Classification of Skewed Data. ACM SIGKDD Explorations - Special Issue on Imbalanced Data Sets, vol. 6(1). (2004) 50-58
-
(2004)
ACM SIGKDD Explorations - Special Issue on Imbalanced Data Sets
, vol.6
, Issue.1
, pp. 50-58
-
-
Phua, C.1
Alahakoon, D.2
Lee, V.3
-
20
-
-
84943274699
-
A direct adaptive method for faster backpropagation learning: The RPROP algorithm
-
Riedmiller, M., and H. Braun.: A direct adaptive method for faster backpropagation learning: The RPROP algorithm. Proc. of the IEEE Int. Conf. on Neural Networks, Vol.1. (1993) 586-591
-
(1993)
Proc. of the IEEE Int. Conf. on Neural Networks
, vol.1
, pp. 586-591
-
-
Riedmiller, M.1
Braun, H.2
-
21
-
-
0033326221
-
Using the receiver operating characteristic to asses the performance of neural classifiers
-
Downey, T. J., Meyer, D. J., Price R. K., and Spitznagel E. L.: Using the receiver operating characteristic to asses the performance of neural classifiers. Int. Joint Conf. Neural Networks, Vol. 5. (1999) 3642 -3646
-
(1999)
Int. Joint Conf. Neural Networks
, vol.5
, pp. 3642-3646
-
-
Downey, T.J.1
Meyer, D.J.2
Price, R.K.3
Spitznagel, E.L.4
-
22
-
-
0002900357
-
The case against accuracy estimation for comparing induction algorithms
-
San Francisco, Morgan Kaufmann
-
Provost, F., Fawcett, T. and Kohavi, R.: The case against accuracy estimation for comparing induction algorithms. Proc of the Fifteenth Int. Conf. on Machine Learning. San Francisco, Morgan Kaufmann (1998) 43-48
-
(1998)
Proc of the Fifteenth Int. Conf. on Machine Learning
, pp. 43-48
-
-
Provost, F.1
Fawcett, T.2
Kohavi, R.3
-
23
-
-
15544371595
-
Forecasting nonlinear time series with feed-forward neural networks: A case study of Canadian lynx data
-
Kajitani, Yoshio, Hipel, Keith W., McLeod Ian A.: Forecasting nonlinear time series with feed-forward neural networks: a case study of Canadian lynx data. Journal of Forecasting, Vol. 24 (2). (2005) 105-117
-
(2005)
Journal of Forecasting
, vol.24
, Issue.2
, pp. 105-117
-
-
Kajitani, Y.1
Hipel, K.W.2
McLeod Ian, A.3
|