-
2
-
-
33947658295
-
Risk and fraud management for telecommunications
-
Anon Fair Isaac Inc
-
Anon (2003) Risk and fraud management for telecommunications, Fair Isaac Inc
-
(2003)
-
-
-
3
-
-
0042421807
-
Statistical fraud detection: A review (with discussion)
-
Bolton, J. R. and Hand, J. D. (2002) Statistical fraud detection: A review (with discussion). Statistical Science, 17:3, pp. 235-255.
-
(2002)
Statistical Science
, vol.17
, Issue.3
, pp. 235-255
-
-
Bolton, J.R.1
Hand, J.D.2
-
4
-
-
0000235653
-
Some theorems on quadratic forms applied in the study of analysis of variance problems: Effect of inequality of variance in one-way classification
-
Box, G. E. P. (1954) Some theorems on quadratic forms applied in the study of analysis of variance problems: Effect of inequality of variance in one-way classification. Annals of Mathematical Statistics, 25, pp. 290-302.
-
(1954)
Annals of Mathematical Statistics
, vol.25
, pp. 290-302
-
-
Box, G.E.P.1
-
6
-
-
85083464467
-
Toward scalable learning with non-uniform class and cost distributions: A case study in credit card fraud detection
-
New York, NY
-
Chan, P. and Stolfo, S. (1998) Toward scalable learning with non-uniform class and cost distributions: A case study in credit card fraud detection. Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining New York, NY pp. 164-168.
-
(1998)
Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining
, pp. 164-168
-
-
Chan, P.1
Stolfo, S.2
-
7
-
-
0043256723
-
A method for predicting future observations in the monitoring of a batch process
-
Cho, H. and Kim, K. (2003) A method for predicting future observations in the monitoring of a batch process. Journal of Quality Technology, 35, pp. 59-69.
-
(2003)
Journal of Quality Technology
, vol.35
, pp. 59-69
-
-
Cho, H.1
Kim, K.2
-
8
-
-
84952261476
-
Projection pursuit indices based on orthonormal function expansions
-
Cook, D., Buja, A. and Cabrera, J. (1993) Projection pursuit indices based on orthonormal function expansions. Journal of Computational and Graphical Statistics, 2:3, pp. 225-250.
-
(1993)
Journal of Computational and Graphical Statistics
, vol.2
, Issue.3
, pp. 225-250
-
-
Cook, D.1
Buja, A.2
Cabrera, J.3
-
9
-
-
21944445756
-
Visual data mining: Recognizing telephone calling fraud
-
Cox, K. C., Eick, S. G., Wills, G. J. and Brachman, R. J. (1997) Visual data mining: Recognizing telephone calling fraud. Journal of Data Mining and Knowledge Discovery, 1:2, pp. 225-231.
-
(1997)
Journal of Data Mining and Knowledge Discovery
, vol.1
, Issue.2
, pp. 225-231
-
-
Cox, K.C.1
Eick, S.G.2
Wills, G.J.3
Brachman, R.J.4
-
10
-
-
0036122767
-
Robustness of chi-square and Canberra techniques in detecting intrusions into information systems
-
Emran, S. M. and Ye, N. (2002) Robustness of chi-square and Canberra techniques in detecting intrusions into information systems. Quality and Reliability Engineering International, 18, pp. 19-28.
-
(2002)
Quality and Reliability Engineering International
, vol.18
, pp. 19-28
-
-
Emran, S.M.1
Ye, N.2
-
11
-
-
0027986244
-
Credit card fraud detection with a neural network
-
Maui, HI Los Alamitos, CA
-
Ghosh, S. and Reilly, D. L. (1994) Credit card fraud detection with a neural network. Proceedings of the 27th Annual Hawaii International Conference on System Science, Volume 3, Information Systems: DSS/ Knowledge-Based Systems Maui, HI 621-630. Los Alamitos, CA
-
(1994)
Proceedings of the 27th Annual Hawaii International Conference on System Science, Volume 3, Information Systems: DSS/Knowledge-Based Systems
, pp. 621-630
-
-
Ghosh, S.1
Reilly, D.L.2
-
14
-
-
84972541029
-
A statistical derivation of the significant-digit law
-
Hill, T. P. (1996) A statistical derivation of the significant-digit law. Statistical Science, 10:4, pp. 354-363.
-
(1996)
Statistical Science
, vol.10
, Issue.4
, pp. 354-363
-
-
Hill, T.P.1
-
15
-
-
0018503842
-
Control procedures for residuals associated with principle component analysis
-
Jackson, J. E. and Mudholkar, G. G. (1979) Control procedures for residuals associated with principle component analysis. Technometrics, 21, pp. 341-349.
-
(1979)
Technometrics
, vol.21
, pp. 341-349
-
-
Jackson, J.E.1
Mudholkar, G.G.2
-
16
-
-
33947612948
-
Telecommunication frauds, Dimension Data Service Provider Solutions
-
Inc., South Africa
-
Jacobs, E. and Booth, I. (2000) Telecommunication frauds, Dimension Data Service Provider Solutions. Inc., South Africa
-
(2000)
-
-
Jacobs, E.1
Booth, I.2
-
17
-
-
0034661322
-
Application of multivariate statistical process control to batch operations
-
Lennox, B., Hiden, H. G., Montague, G. A., Kornfeld, G. and Goulding, P. R. (2000) Application of multivariate statistical process control to batch operations. Computers and Chemical Engineering, 24, pp. 291-296.
-
(2000)
Computers and Chemical Engineering
, vol.24
, pp. 291-296
-
-
Lennox, B.1
Hiden, H.G.2
Montague, G.A.3
Kornfeld, G.4
Goulding, P.R.5
-
18
-
-
0028424619
-
Process monitoring and diagnosis by multiblock PLS methods
-
MacGregor, J. F., Jaeckle, C., Kiparissides, C. and Koutoudi, M. (1994) Process monitoring and diagnosis by multiblock PLS methods. American Institute of Chemical Engineering Journal, 40, pp. 826-838.
-
(1994)
American Institute of Chemical Engineering Journal
, vol.40
, pp. 826-838
-
-
MacGregor, J.F.1
Jaeckle, C.2
Kiparissides, C.3
Koutoudi, M.4
-
19
-
-
0002754183
-
Monitoring multinomial processes
-
Marcucci, M. (1985) Monitoring multinomial processes. Journal of Quality Technology, 17, pp. 86-91.
-
(1985)
Journal of Quality Technology
, vol.17
, pp. 86-91
-
-
Marcucci, M.1
-
23
-
-
0038697511
-
Determining process capability in a chemical batch process
-
Morris, R. A. and Watson, E. F. (1997) Determining process capability in a chemical batch process. Quality Engineering, 10, pp. 389-396.
-
(1997)
Quality Engineering
, vol.10
, pp. 389-396
-
-
Morris, R.A.1
Watson, E.F.2
-
24
-
-
84956863580
-
Unsupervised profiling for identifying superimposed fraud
-
Murad, U. and Dotas, G. (1999) Unsupervised profiling for identifying superimposed fraud. Lecture Notes in Artificial Intelligence, 1704, pp. 251-261.
-
(1999)
Lecture Notes in Artificial Intelligence
, vol.1704
, pp. 251-261
-
-
Murad, U.1
Dotas, G.2
-
26
-
-
0029252734
-
Multivariate SPC charts for monitoring batch processes
-
Nomikos, P. and MacGregor, J. F. (1995) Multivariate SPC charts for monitoring batch processes. Technometrics, 37, pp. 41-59.
-
(1995)
Technometrics
, vol.37
, pp. 41-59
-
-
Nomikos, P.1
MacGregor, J.F.2
-
28
-
-
0242301582
-
Process monitoring for multiple count data using generalized linear model-based control charts
-
Skinner, K. R., Montgomery, D. C. and Runger, G. C. (2003) Process monitoring for multiple count data using generalized linear model-based control charts. International Journal of Production Research, 41, pp. 1167-1180.
-
(2003)
International Journal of Production Research
, vol.41
, pp. 1167-1180
-
-
Skinner, K.R.1
Montgomery, D.C.2
Runger, G.C.3
-
30
-
-
0010040681
-
Multi-way principal components and PLS analysis
-
Wold, S., Geladi, P., Esbensen, K. and Ohman, J. (1987) Multi-way principal components and PLS analysis. Journal of Chemometrics, 1, pp. 41-56.
-
(1987)
Journal of Chemometrics
, vol.1
, pp. 41-56
-
-
Wold, S.1
Geladi, P.2
Esbensen, K.3
Ohman, J.4
-
31
-
-
0036864028
-
EWMA techniques for computer intrusion detection through anomalous changes in event intensity
-
Ye, N., Borror, C. and Zhang, Y. (2002) EWMA techniques for computer intrusion detection through anomalous changes in event intensity. Quality and Reliability Engineering International, 18:6, pp. 443-451.
-
(2002)
Quality and Reliability Engineering International
, vol.18
, Issue.6
, pp. 443-451
-
-
Ye, N.1
Borror, C.2
Zhang, Y.3
-
32
-
-
0037333205
-
Computer intrusion detection through EWMA for auto-correlated and uncorrelated data
-
Ye, N. and Chen, Q. (2003) Computer intrusion detection through EWMA for auto-correlated and uncorrelated data. IEEE Transactions on Reliability, 52:1, pp. 73-82.
-
(2003)
IEEE Transactions on Reliability
, vol.52
, Issue.1
, pp. 73-82
-
-
Ye, N.1
Chen, Q.2
-
33
-
-
0036575252
-
First-order versus high-order stochastic models for computer intrusion detection
-
Ye, N., Ehiabor, T. and Zhang, Y. (2002) First-order versus high-order stochastic models for computer intrusion detection. Quality and Reliability Engineering International, 18:3, pp. 243-250.
-
(2002)
Quality and Reliability Engineering International
, vol.18
, Issue.3
, pp. 243-250
-
-
Ye, N.1
Ehiabor, T.2
Zhang, Y.3
|