-
3
-
-
51749100084
-
Verified By Visa
-
"Verified By Visa," http://www.visiieurope.com/verifiedbyvisa. 2006.
-
(2006)
-
-
-
4
-
-
38049000964
-
-
"Mastercard SecureCode," http://www.masterca.rd.com/securecode/ . 2006.
-
(2006)
-
-
SecureCode, M.1
-
5
-
-
0042421807
-
Statistical fraud detections review
-
R. Bolton and D. Hand, "Statistical fraud detections review," Statistical Science, vol. 17, pp. 233-255, 2002.
-
(2002)
Statistical Science
, vol.17
, pp. 233-255
-
-
Bolton, R.1
Hand, D.2
-
6
-
-
0033344304
-
-
R. Brause, T. Langsdorf, and M. Hepp, Neural Data Mining for Credit Card Fraud Detection, presented at ICTAI, 1999.
-
R. Brause, T. Langsdorf, and M. Hepp, "Neural Data Mining for Credit Card Fraud Detection," presented at ICTAI, 1999.
-
-
-
-
8
-
-
0027986244
-
Credit Card Fraud Detection with a Neural-Network
-
S. Ghosh and D. L. Reilly, "Credit Card Fraud Detection with a Neural-Network," IEEE Computer Society Press 3, pp. 621-630, 1994.
-
(1994)
IEEE Computer Society Press
, vol.3
, pp. 621-630
-
-
Ghosh, S.1
Reilly, D.L.2
-
9
-
-
2942674608
-
Survey of fraud detection techniques
-
presented at
-
Y. Kou, C.-T. Lu, S. Sirwongwattana, and Y.-P. Huang, "Survey of fraud detection techniques," presented at Networking, Sensing and Control, 2004 IEEE International Conference on, 2004.
-
(2004)
Networking, Sensing and Control, 2004 IEEE International Conference on
-
-
Kou, Y.1
Lu, C.-T.2
Sirwongwattana, S.3
Huang, Y.-P.4
-
11
-
-
38049081510
-
SWS for Financial Overdrawn Alerting
-
J. M. L. Cobo, S. Losada, Ó. Corcho, V. R. Benjamins, M. Niño, and J. Contreras, "SWS for Financial Overdrawn Alerting," Semantic Web, 2004.
-
(2004)
Semantic Web
-
-
Cobo, J.M.L.1
Losada, S.2
Corcho, O.3
Benjamins, V.R.4
Niño, M.5
Contreras, J.6
-
12
-
-
23044520423
-
Neural Fraud Detection in Mobile Phone Operations
-
Azzedine Boukerche and M. S. M. A. Notare, "Neural Fraud Detection in Mobile Phone Operations," IPDPS Workshops, vol. 1800, pp. 636-644, 2000.
-
(2000)
IPDPS Workshops
, vol.1800
, pp. 636-644
-
-
Boukerche, A.1
Notare, M.S.M.A.2
-
13
-
-
0010852727
-
An Unsupervised Neural Network Approach to Profiling the Behaviour of Mobile Phone Users for Use in Fraud Detection
-
P. Burge, "An Unsupervised Neural Network Approach to Profiling the Behaviour of Mobile Phone Users for Use in Fraud Detection," Journal of parallel and distributed computing, vol. 61, pp. 915, 2001.
-
(2001)
Journal of parallel and distributed computing
, vol.61
, pp. 915
-
-
Burge, P.1
-
14
-
-
38049062032
-
Data Mining Prototype for Detecting E-Commerce Fraud [Research in Progress]
-
presented at, Bled, Slovenia
-
M. Lek, B. Anandarajah, N. Cerpa, and R. Jamieson, "Data Mining Prototype for Detecting E-Commerce Fraud [Research in Progress]," presented at Global Co-operation in the New Millennium - The 9th European Conference on Information Systems, Bled, Slovenia, 2001.
-
(2001)
Global Co-operation in the New Millennium - The 9th European Conference on Information Systems
-
-
Lek, M.1
Anandarajah, B.2
Cerpa, N.3
Jamieson, R.4
-
16
-
-
51749095322
-
A medical claim fraud/abuse detection system based on data mining: A case study in Chile
-
presented at, Las Vegas, Nevada, USA
-
P. Ortega, C. Figueroa, and G. Ruz, "A medical claim fraud/abuse detection system based on data mining: A case study in Chile," presented at DMTN'06, Las Vegas, Nevada, USA, 2006.
-
(2006)
DMTN'06
-
-
Ortega, P.1
Figueroa, C.2
Ruz, G.3
-
17
-
-
24944475336
-
Learning of Neural Networks for Fraud Detection Based on a Partial Area Under Curve
-
L.-J. Park, "Learning of Neural Networks for Fraud Detection Based on a Partial Area Under Curve," ISNN, pp. 922-927, 2005.
-
(2005)
ISNN
, pp. 922-927
-
-
Park, L.-J.1
-
18
-
-
24144501096
-
Auto claim fraud detection using Bayesian learning neural networks
-
S. Viaene, G. Dedene, and R. A. Derrig, "Auto claim fraud detection using Bayesian learning neural networks," Expert Systems with Applications, vol. 29, pp. 653-666, 2005.
-
(2005)
Expert Systems with Applications
, vol.29
, pp. 653-666
-
-
Viaene, S.1
Dedene, G.2
Derrig, R.A.3
-
19
-
-
38049057115
-
-
Business Signatures Corporation
-
"Business Signatures Corporation," http://www. businesssignatures.com/, 2006.
-
(2006)
-
-
-
21
-
-
38049091933
-
-
Actimize Inc
-
"Actimize Inc, " http://www.actimize.com/, 2006.
-
(2006)
-
-
-
23
-
-
38049037262
-
The Evolving Threat of Card Skimming
-
FAIR ISAAC, White Paper December
-
"The Evolving Threat of Card Skimming," FAIR ISAAC, White Paper December 2005.
-
(2005)
-
-
-
24
-
-
67649794219
-
Combating eFraud-A Next Generation Approach
-
White Paper October 2005
-
K. Massey, "Combating eFraud-A Next Generation Approach," Financial Insights, White Paper October 2005.
-
Financial Insights
-
-
Massey, K.1
-
25
-
-
0142183967
-
One-Time Passwords: Security Analysis Using BAN Logic and Integrating with Smartcard Authentication
-
K. Bicakci and N. Baykal:, "One-Time Passwords: Security Analysis Using BAN Logic and Integrating with Smartcard Authentication," ISCIS, vol. 2869, pp. 794-801, 2003.
-
(2003)
ISCIS
, vol.2869
, pp. 794-801
-
-
Bicakci, K.1
Baykal, N.2
-
26
-
-
25144518435
-
Protecting Against Phishing by Implementing Strong Two-Factor Authentication
-
RSA Security, White Paper September
-
"Protecting Against Phishing by Implementing Strong Two-Factor Authentication," RSA Security, White Paper September 2004.
-
(2004)
-
-
-
27
-
-
4544325416
-
JESS, the rule engine for the java platform
-
"JESS, the rule engine for the java platform," http://www.iess.rules.com, 2006.
-
(2006)
-
-
-
28
-
-
38049052176
-
Drools Rule Engine Platform
-
"Drools Rule Engine Platform," http://www.drools.org, 2006.
-
(2006)
-
-
-
29
-
-
38049091027
-
-
StreamSQL
-
"StreamSQL," http://www.streamsql.org/, 2006.
-
(2006)
-
-
-
30
-
-
0141748992
-
Business Process Cockpit
-
presented at, Hong Kong
-
M. Sayal, F. Casati, M. C. Shan, and U. Dayal, "Business Process Cockpit," presented at Proceedings of the 28th VLDB Conference, Hong Kong, 2002.
-
(2002)
Proceedings of the 28th VLDB Conference
-
-
Sayal, M.1
Casati, F.2
Shan, M.C.3
Dayal, U.4
-
32
-
-
12344312073
-
-
D. K. W. Chiu, B. W. C. Kwok, R. L. S. Wong, S. C. Cheung, and E. Kafeza, Alert-Driven E-Service Managment, presented at Proeedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04), 2004.
-
D. K. W. Chiu, B. W. C. Kwok, R. L. S. Wong, S. C. Cheung, and E. Kafeza, "Alert-Driven E-Service Managment," presented at Proeedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04), 2004.
-
-
-
-
33
-
-
0002892316
-
Active Database Systems
-
N. W. Paton and O. Diaz, "Active Database Systems," ACM Computing Surveys, vol. 31, pp. 63-103, 1999.
-
(1999)
ACM Computing Surveys
, vol.31
, pp. 63-103
-
-
Paton, N.W.1
Diaz, O.2
-
34
-
-
0344303874
-
Rule Analysis
-
N. W. Paton, Ed, Springer-Verlag
-
E. Baralis, "Rule Analysis," in Active Rules in Database Systems, N. W. Paton, Ed.: Springer-Verlag, 1999, pp. 51-67.
-
(1999)
Active Rules in Database Systems
, pp. 51-67
-
-
Baralis, E.1
-
35
-
-
33745289988
-
The CQL continuous query language: Semantic foundations and query execution
-
A. Arasu, S. Babu, and J. Widom, "The CQL continuous query language: semantic foundations and query execution," The VLDB Journal, vol. 15, pp. 121-142, 2006.
-
(2006)
The VLDB Journal
, vol.15
, pp. 121-142
-
-
Arasu, A.1
Babu, S.2
Widom, J.3
-
36
-
-
38049021460
-
-
Fair Isaac Corporation
-
"Fair Isaac Corporation," http://www.fairi.saac.com, 2006.
-
(2006)
-
-
-
37
-
-
38049086097
-
-
"StreamBase," http://www.streambase.co.uk, 2006.
-
(2006)
-
-
StreamBase1
-
38
-
-
0042014316
-
Aurora: A new model and architecture for data stream management
-
D. J. Abadi, D. Carney, U. Cetintemel, M. Cherniack, C. Convey, S. Lee, M. Stonebraker, N. Tatbul, and S. Zdonik, "Aurora: a new model and architecture for data stream management," The VLDB Journal, vol. 12, pp. 120-139, 2003.
-
(2003)
The VLDB Journal
, vol.12
, pp. 120-139
-
-
Abadi, D.J.1
Carney, D.2
Cetintemel, U.3
Cherniack, M.4
Convey, C.5
Lee, S.6
Stonebraker, M.7
Tatbul, N.8
Zdonik, S.9
-
39
-
-
1142303663
-
STREAM: The Stanford stream data manager
-
San Diego, California: ACM Press
-
A. Arasu, B. Babcock, S. Babu, M. Datar, K. Ito, I. Nishizawa, J. Rosenstein, and J. Widom, "STREAM: the Stanford stream data manager," in Proceedings of the 2003 ACM SIGMOD international conference on Management of data. San Diego, California: ACM Press, 2003, pp. 665-665.
-
(2003)
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
, pp. 665-665
-
-
Arasu, A.1
Babcock, B.2
Babu, S.3
Datar, M.4
Ito, K.5
Nishizawa, I.6
Rosenstein, J.7
Widom, J.8
-
40
-
-
0013164114
-
Detecting fraud in the real world
-
Technical report, Bell Labs, Lucent Technologies
-
M. Cahill, D. Lambert, J. Pinheiro, and D. Sun, "Detecting fraud in the real world," Technical report, Bell Labs, Lucent Technologies., 2000.
-
(2000)
-
-
Cahill, M.1
Lambert, D.2
Pinheiro, J.3
Sun, D.4
-
41
-
-
38049071430
-
Establishing Fraud Detection Patterns Based on Signatures
-
presented at, Leipzig, Germany
-
P. Ferreira, R. Alves, O. Belo, and L. Cortesao, "Establishing Fraud Detection Patterns Based on Signatures," presented at Industrial Conference on Data Mining, Leipzig, Germany, 2006.
-
(2006)
Industrial Conference on Data Mining
-
-
Ferreira, P.1
Alves, R.2
Belo, O.3
Cortesao, L.4
-
42
-
-
23044525410
-
Signature-Based Methods for Data Streams
-
C. Cortes and D. Pregibon, "Signature-Based Methods for Data Streams," DataMin. Knowl. Discov., vol. 5, pp. 167-182, 2001.
-
(2001)
DataMin. Knowl. Discov
, vol.5
, pp. 167-182
-
-
Cortes, C.1
Pregibon, D.2
-
43
-
-
0034592773
-
Hancock: A language for extracting signatures from data streams
-
presented at
-
C. Cortes, K. Fisher, D. Pregibon, and A. Rogers, "Hancock: a language for extracting signatures from data streams," presented at Knowledge Discovery and Data Mining, 2000.
-
(2000)
Knowledge Discovery and Data Mining
-
-
Cortes, C.1
Fisher, K.2
Pregibon, D.3
Rogers, A.4
|