메뉴 건너뛰기




Volumn 39, Issue 6, 2007, Pages 671-680

Applying manufacturing batch techniques to fraud detection with incomplete customer information

Author keywords

Batch library method; Multi way Principal Component Analysis (MPCA); Statistical process control; Telecommunication industry

Indexed keywords

COMPUTER SIMULATION; DATA REDUCTION; PRINCIPAL COMPONENT ANALYSIS; STATISTICAL PROCESS CONTROL;

EID: 33947665534     PISSN: 0740817X     EISSN: 15458830     Source Type: Journal    
DOI: 10.1080/07408170600897510     Document Type: Article
Times cited : (24)

References (33)
  • 2
    • 33947658295 scopus 로고    scopus 로고
    • Risk and fraud management for telecommunications
    • Anon Fair Isaac Inc
    • Anon (2003) Risk and fraud management for telecommunications, Fair Isaac Inc
    • (2003)
  • 3
    • 0042421807 scopus 로고    scopus 로고
    • Statistical fraud detection: A review (with discussion)
    • Bolton, J. R. and Hand, J. D. (2002) Statistical fraud detection: A review (with discussion). Statistical Science, 17:3, pp. 235-255.
    • (2002) Statistical Science , vol.17 , Issue.3 , pp. 235-255
    • Bolton, J.R.1    Hand, J.D.2
  • 4
    • 0000235653 scopus 로고
    • Some theorems on quadratic forms applied in the study of analysis of variance problems: Effect of inequality of variance in one-way classification
    • Box, G. E. P. (1954) Some theorems on quadratic forms applied in the study of analysis of variance problems: Effect of inequality of variance in one-way classification. Annals of Mathematical Statistics, 25, pp. 290-302.
    • (1954) Annals of Mathematical Statistics , vol.25 , pp. 290-302
    • Box, G.E.P.1
  • 6
    • 85083464467 scopus 로고    scopus 로고
    • Toward scalable learning with non-uniform class and cost distributions: A case study in credit card fraud detection
    • New York, NY
    • Chan, P. and Stolfo, S. (1998) Toward scalable learning with non-uniform class and cost distributions: A case study in credit card fraud detection. Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining New York, NY pp. 164-168.
    • (1998) Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining , pp. 164-168
    • Chan, P.1    Stolfo, S.2
  • 7
    • 0043256723 scopus 로고    scopus 로고
    • A method for predicting future observations in the monitoring of a batch process
    • Cho, H. and Kim, K. (2003) A method for predicting future observations in the monitoring of a batch process. Journal of Quality Technology, 35, pp. 59-69.
    • (2003) Journal of Quality Technology , vol.35 , pp. 59-69
    • Cho, H.1    Kim, K.2
  • 10
    • 0036122767 scopus 로고    scopus 로고
    • Robustness of chi-square and Canberra techniques in detecting intrusions into information systems
    • Emran, S. M. and Ye, N. (2002) Robustness of chi-square and Canberra techniques in detecting intrusions into information systems. Quality and Reliability Engineering International, 18, pp. 19-28.
    • (2002) Quality and Reliability Engineering International , vol.18 , pp. 19-28
    • Emran, S.M.1    Ye, N.2
  • 14
    • 84972541029 scopus 로고    scopus 로고
    • A statistical derivation of the significant-digit law
    • Hill, T. P. (1996) A statistical derivation of the significant-digit law. Statistical Science, 10:4, pp. 354-363.
    • (1996) Statistical Science , vol.10 , Issue.4 , pp. 354-363
    • Hill, T.P.1
  • 15
    • 0018503842 scopus 로고
    • Control procedures for residuals associated with principle component analysis
    • Jackson, J. E. and Mudholkar, G. G. (1979) Control procedures for residuals associated with principle component analysis. Technometrics, 21, pp. 341-349.
    • (1979) Technometrics , vol.21 , pp. 341-349
    • Jackson, J.E.1    Mudholkar, G.G.2
  • 16
    • 33947612948 scopus 로고    scopus 로고
    • Telecommunication frauds, Dimension Data Service Provider Solutions
    • Inc., South Africa
    • Jacobs, E. and Booth, I. (2000) Telecommunication frauds, Dimension Data Service Provider Solutions. Inc., South Africa
    • (2000)
    • Jacobs, E.1    Booth, I.2
  • 19
    • 0002754183 scopus 로고
    • Monitoring multinomial processes
    • Marcucci, M. (1985) Monitoring multinomial processes. Journal of Quality Technology, 17, pp. 86-91.
    • (1985) Journal of Quality Technology , vol.17 , pp. 86-91
    • Marcucci, M.1
  • 23
    • 0038697511 scopus 로고    scopus 로고
    • Determining process capability in a chemical batch process
    • Morris, R. A. and Watson, E. F. (1997) Determining process capability in a chemical batch process. Quality Engineering, 10, pp. 389-396.
    • (1997) Quality Engineering , vol.10 , pp. 389-396
    • Morris, R.A.1    Watson, E.F.2
  • 24
    • 84956863580 scopus 로고    scopus 로고
    • Unsupervised profiling for identifying superimposed fraud
    • Murad, U. and Dotas, G. (1999) Unsupervised profiling for identifying superimposed fraud. Lecture Notes in Artificial Intelligence, 1704, pp. 251-261.
    • (1999) Lecture Notes in Artificial Intelligence , vol.1704 , pp. 251-261
    • Murad, U.1    Dotas, G.2
  • 26
    • 0029252734 scopus 로고
    • Multivariate SPC charts for monitoring batch processes
    • Nomikos, P. and MacGregor, J. F. (1995) Multivariate SPC charts for monitoring batch processes. Technometrics, 37, pp. 41-59.
    • (1995) Technometrics , vol.37 , pp. 41-59
    • Nomikos, P.1    MacGregor, J.F.2
  • 28
    • 0242301582 scopus 로고    scopus 로고
    • Process monitoring for multiple count data using generalized linear model-based control charts
    • Skinner, K. R., Montgomery, D. C. and Runger, G. C. (2003) Process monitoring for multiple count data using generalized linear model-based control charts. International Journal of Production Research, 41, pp. 1167-1180.
    • (2003) International Journal of Production Research , vol.41 , pp. 1167-1180
    • Skinner, K.R.1    Montgomery, D.C.2    Runger, G.C.3
  • 31
    • 0036864028 scopus 로고    scopus 로고
    • EWMA techniques for computer intrusion detection through anomalous changes in event intensity
    • Ye, N., Borror, C. and Zhang, Y. (2002) EWMA techniques for computer intrusion detection through anomalous changes in event intensity. Quality and Reliability Engineering International, 18:6, pp. 443-451.
    • (2002) Quality and Reliability Engineering International , vol.18 , Issue.6 , pp. 443-451
    • Ye, N.1    Borror, C.2    Zhang, Y.3
  • 32
    • 0037333205 scopus 로고    scopus 로고
    • Computer intrusion detection through EWMA for auto-correlated and uncorrelated data
    • Ye, N. and Chen, Q. (2003) Computer intrusion detection through EWMA for auto-correlated and uncorrelated data. IEEE Transactions on Reliability, 52:1, pp. 73-82.
    • (2003) IEEE Transactions on Reliability , vol.52 , Issue.1 , pp. 73-82
    • Ye, N.1    Chen, Q.2
  • 33
    • 0036575252 scopus 로고    scopus 로고
    • First-order versus high-order stochastic models for computer intrusion detection
    • Ye, N., Ehiabor, T. and Zhang, Y. (2002) First-order versus high-order stochastic models for computer intrusion detection. Quality and Reliability Engineering International, 18:3, pp. 243-250.
    • (2002) Quality and Reliability Engineering International , vol.18 , Issue.3 , pp. 243-250
    • Ye, N.1    Ehiabor, T.2    Zhang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.