-
1
-
-
39049155774
-
Global Consumer Attitude Towards On-Line Shopping
-
_onlineshopping.pdf, Mar
-
"Global Consumer Attitude Towards On-Line Shopping," http://www2.acnielsen.com/reports/documents/2005_cc_onlineshopping.pdf, Mar. 2007.
-
(2007)
-
-
-
2
-
-
0000776603
-
Data Mining for Fun and Profit
-
D.J. Hand, G. Blunt, M.G. Kelly, and N.M. Adams, "Data Mining for Fun and Profit," Statistical Science, vol. 15, no. 2, pp. 111-131, 2000.
-
(2000)
Statistical Science
, vol.15
, Issue.2
, pp. 111-131
-
-
Hand, D.J.1
Blunt, G.2
Kelly, M.G.3
Adams, N.M.4
-
3
-
-
39049158075
-
-
Statistics for General and On-Line Card Fraud, Mar. 2007
-
"Statistics for General and On-Line Card Fraud," http://www.epaynews.com/statistics/fraud.html, Mar. 2007.
-
-
-
-
5
-
-
0036454177
-
Parallel Granular Networks for Fast Credit Card Fraud Detection
-
M. Syeda, Y.Q. Zhang, and Y. Pan, "Parallel Granular Networks for Fast Credit Card Fraud Detection," Proc. IEEE Int'l Conf. Fuzzy Systems, pp. 572-577, 2002.
-
(2002)
Proc. IEEE Int'l Conf. Fuzzy Systems
, pp. 572-577
-
-
Syeda, M.1
Zhang, Y.Q.2
Pan, Y.3
-
6
-
-
0042961664
-
Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results
-
S.J. Stolfo, D.W. Fan, W. Lee, A.L. Prodromidis, and P.K. Chan, "Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results," Proc. AAAI Workshop AI Methods in Fraud and Risk Management, pp. 83-90, 1997.
-
(1997)
Proc. AAAI Workshop AI Methods in Fraud and Risk Management
, pp. 83-90
-
-
Stolfo, S.J.1
Fan, D.W.2
Lee, W.3
Prodromidis, A.L.4
Chan, P.K.5
-
7
-
-
84962238645
-
Cost-Based Modeling for Fraud and Intrusion Detection: Results from the JAM Project
-
S.J. Stolfo, D.W. Fan, W. Lee, A. Prodromidis, and P.K. Chan, "Cost-Based Modeling for Fraud and Intrusion Detection: Results from the JAM Project," Proc. DARPA Information Survivability Conf. and Exposition, vol. 2, pp. 130-144, 2000.
-
(2000)
Proc. DARPA Information Survivability Conf. and Exposition
, vol.2
, pp. 130-144
-
-
Stolfo, S.J.1
Fan, D.W.2
Lee, W.3
Prodromidis, A.4
Chan, P.K.5
-
8
-
-
0030652931
-
CARDWATCH: A Neural Network Based Database Mining System for Credit Card Fraud Detection
-
E. Aleskerov, B. Freisleben, and B. Rao, "CARDWATCH: A Neural Network Based Database Mining System for Credit Card Fraud Detection," Proc. IEEE/IAFE: Computational Intelligence for Financial Eng., pp. 220-226, 1997.
-
(1997)
Proc. IEEE/IAFE: Computational Intelligence for Financial Eng
, pp. 220-226
-
-
Aleskerov, E.1
Freisleben, B.2
Rao, B.3
-
10
-
-
0033336136
-
Distributed Data Mining in Credit Card Fraud Detection
-
W. Fan, A.L. Prodromidis, and S.J. Stolfo, "Distributed Data Mining in Credit Card Fraud Detection," IEEE Intelligent Systems, vol. 14, no. 6, pp. 67-74, 1999.
-
(1999)
IEEE Intelligent Systems
, vol.14
, Issue.6
, pp. 67-74
-
-
Fan, W.1
Prodromidis, A.L.2
Stolfo, S.J.3
-
11
-
-
0033344304
-
Neural Data Mining for Credit Card Fraud Detection
-
R. Brause, T. Langsdorf, and M. Hepp, "Neural Data Mining for Credit Card Fraud Detection," Proc. IEEE Int'l Conf. Tools with Artificial Intelligence, pp. 103-106, 1999.
-
(1999)
Proc. IEEE Int'l Conf. Tools with Artificial Intelligence
, pp. 103-106
-
-
Brause, R.1
Langsdorf, T.2
Hepp, M.3
-
13
-
-
37149053967
-
-
Mar. 2007
-
C. Phua, V. Lee, K. Smith, and R. Gayler, "A Comprehensive Survey of Data Mining-Based Fraud Detection Research," http://www.bsys.monash.edu. au/people/cphua/, Mar. 2007.
-
A Comprehensive Survey of Data Mining-Based Fraud Detection Research
-
-
Phua, C.1
Lee, V.2
Smith, K.3
Gayler, R.4
-
14
-
-
4244169431
-
Agent-Based Distributed Learning Applied to Fraud Detection,
-
Technical Report CUCS-014-99, Columbia Univ
-
S. Stolfo and A.L. Prodromidis, "Agent-Based Distributed Learning Applied to Fraud Detection," Technical Report CUCS-014-99, Columbia Univ., 1999.
-
(1999)
-
-
Stolfo, S.1
Prodromidis, A.L.2
-
15
-
-
29144443664
-
Minority Report in Fraud Detection: Classification of Skewed Data
-
C. Phua, D. Alahakoon, and V. Lee, "Minority Report in Fraud Detection: Classification of Skewed Data," ACM SIGKDD Explorations Newsletter, vol. 6, no. 1, pp. 50-59, 2004.
-
(2004)
ACM SIGKDD Explorations Newsletter
, vol.6
, Issue.1
, pp. 50-59
-
-
Phua, C.1
Alahakoon, D.2
Lee, V.3
-
16
-
-
33646848433
-
A Game-theoretic Approach to Credit Card Fraud Detection
-
V. Vatsa, S. Sural, and A.K. Majumdar, "A Game-theoretic Approach to Credit Card Fraud Detection," Proc. First Int'l Conf. Information Systems Security, pp. 263-276, 2005.
-
(2005)
Proc. First Int'l Conf. Information Systems Security
, pp. 263-276
-
-
Vatsa, V.1
Sural, S.2
Majumdar, A.K.3
-
17
-
-
84928016636
-
The Base-Rate Fallacy and the Difficulty of Intrusion Detection
-
S. Axelsson, "The Base-Rate Fallacy and the Difficulty of Intrusion Detection," ACM Trans. Information and System Security, vol. 3, no. 3, pp. 186-205, 2000.
-
(2000)
ACM Trans. Information and System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
18
-
-
0024610919
-
A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition
-
L.R. Rabiner, "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition," Proc. IEEE, vol. 77, no. 2, pp. 257-286, 1989.
-
(1989)
Proc. IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
-
19
-
-
77953783421
-
Investigating Hidden Markov Models Capabilities in Anomaly Detection
-
S.S. Joshi and V.V. Phoha, "Investigating Hidden Markov Models Capabilities in Anomaly Detection," Proc. 43rd ACM Ann. Southeast Regional Conf., vol. 1, pp. 98-103, 2005.
-
(2005)
Proc. 43rd ACM Ann. Southeast Regional Conf
, vol.1
, pp. 98-103
-
-
Joshi, S.S.1
Phoha, V.V.2
-
20
-
-
0037282635
-
Efficient Anomaly Detection by Modeling Privilege Flows Using Hidden Markov Model
-
S.B. Cho and H.J. Park, "Efficient Anomaly Detection by Modeling Privilege Flows Using Hidden Markov Model," Computer and Security, vol. 22, no. 1, pp. 45-55, 2003.
-
(2003)
Computer and Security
, vol.22
, Issue.1
, pp. 45-55
-
-
Cho, S.B.1
Park, H.J.2
-
21
-
-
84969506768
-
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
-
D. Ourston, S. Matzner, W. Stump, and B. Hopkins, "Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks," Proc. 36th Ann. Hawaii Int'l Conf. System Sciences, vol. 9, pp. 334-344, 2003.
-
(2003)
Proc. 36th Ann. Hawaii Int'l Conf. System Sciences
, vol.9
, pp. 334-344
-
-
Ourston, D.1
Matzner, S.2
Stump, W.3
Hopkins, B.4
-
22
-
-
84890861404
-
A Multi-Layer Model for Anomaly Intrusion Detection Using Program Sequences of System Calls
-
X.D. Hoang, J. Hu, and P. Bertok, "A Multi-Layer Model for Anomaly Intrusion Detection Using Program Sequences of System Calls," Proc. 11th IEEE Int'l Conf. Networks, pp. 531-536, 2003.
-
(2003)
Proc. 11th IEEE Int'l Conf. Networks
, pp. 531-536
-
-
Hoang, X.D.1
Hu, J.2
Bertok, P.3
-
26
-
-
0003990308
-
-
fourth ed. Prentice Hall
-
J. Banks, J.S. Carson II, B.L. Nelson, and D.M. Nicol, Discrete-Event System Simulation, fourth ed. Prentice Hall, 2004.
-
(2004)
Discrete-Event System Simulation
-
-
Banks, J.1
Carson II, J.S.2
Nelson, B.L.3
Nicol, D.M.4
|