메뉴 건너뛰기




Volumn 5, Issue 1, 2008, Pages 37-48

Credit card fraud detection using Hidden Markov Model

Author keywords

Credit card; E commerce security; Fraud detection; Hidden Markov model; Internet; Online shopping

Indexed keywords

HIDDEN MARKOV MODELS; INTERNET; ONLINE SYSTEMS; SMART CARDS;

EID: 39049142137     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2007.70228     Document Type: Conference Paper
Times cited : (376)

References (26)
  • 1
    • 39049155774 scopus 로고    scopus 로고
    • Global Consumer Attitude Towards On-Line Shopping
    • _onlineshopping.pdf, Mar
    • "Global Consumer Attitude Towards On-Line Shopping," http://www2.acnielsen.com/reports/documents/2005_cc_onlineshopping.pdf, Mar. 2007.
    • (2007)
  • 3
    • 39049158075 scopus 로고    scopus 로고
    • Statistics for General and On-Line Card Fraud, Mar. 2007
    • "Statistics for General and On-Line Card Fraud," http://www.epaynews.com/statistics/fraud.html, Mar. 2007.
  • 5
    • 0036454177 scopus 로고    scopus 로고
    • Parallel Granular Networks for Fast Credit Card Fraud Detection
    • M. Syeda, Y.Q. Zhang, and Y. Pan, "Parallel Granular Networks for Fast Credit Card Fraud Detection," Proc. IEEE Int'l Conf. Fuzzy Systems, pp. 572-577, 2002.
    • (2002) Proc. IEEE Int'l Conf. Fuzzy Systems , pp. 572-577
    • Syeda, M.1    Zhang, Y.Q.2    Pan, Y.3
  • 10
    • 0033336136 scopus 로고    scopus 로고
    • Distributed Data Mining in Credit Card Fraud Detection
    • W. Fan, A.L. Prodromidis, and S.J. Stolfo, "Distributed Data Mining in Credit Card Fraud Detection," IEEE Intelligent Systems, vol. 14, no. 6, pp. 67-74, 1999.
    • (1999) IEEE Intelligent Systems , vol.14 , Issue.6 , pp. 67-74
    • Fan, W.1    Prodromidis, A.L.2    Stolfo, S.J.3
  • 14
    • 4244169431 scopus 로고    scopus 로고
    • Agent-Based Distributed Learning Applied to Fraud Detection,
    • Technical Report CUCS-014-99, Columbia Univ
    • S. Stolfo and A.L. Prodromidis, "Agent-Based Distributed Learning Applied to Fraud Detection," Technical Report CUCS-014-99, Columbia Univ., 1999.
    • (1999)
    • Stolfo, S.1    Prodromidis, A.L.2
  • 15
    • 29144443664 scopus 로고    scopus 로고
    • Minority Report in Fraud Detection: Classification of Skewed Data
    • C. Phua, D. Alahakoon, and V. Lee, "Minority Report in Fraud Detection: Classification of Skewed Data," ACM SIGKDD Explorations Newsletter, vol. 6, no. 1, pp. 50-59, 2004.
    • (2004) ACM SIGKDD Explorations Newsletter , vol.6 , Issue.1 , pp. 50-59
    • Phua, C.1    Alahakoon, D.2    Lee, V.3
  • 17
    • 84928016636 scopus 로고    scopus 로고
    • The Base-Rate Fallacy and the Difficulty of Intrusion Detection
    • S. Axelsson, "The Base-Rate Fallacy and the Difficulty of Intrusion Detection," ACM Trans. Information and System Security, vol. 3, no. 3, pp. 186-205, 2000.
    • (2000) ACM Trans. Information and System Security , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 18
    • 0024610919 scopus 로고
    • A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition
    • L.R. Rabiner, "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition," Proc. IEEE, vol. 77, no. 2, pp. 257-286, 1989.
    • (1989) Proc. IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 19
    • 77953783421 scopus 로고    scopus 로고
    • Investigating Hidden Markov Models Capabilities in Anomaly Detection
    • S.S. Joshi and V.V. Phoha, "Investigating Hidden Markov Models Capabilities in Anomaly Detection," Proc. 43rd ACM Ann. Southeast Regional Conf., vol. 1, pp. 98-103, 2005.
    • (2005) Proc. 43rd ACM Ann. Southeast Regional Conf , vol.1 , pp. 98-103
    • Joshi, S.S.1    Phoha, V.V.2
  • 20
    • 0037282635 scopus 로고    scopus 로고
    • Efficient Anomaly Detection by Modeling Privilege Flows Using Hidden Markov Model
    • S.B. Cho and H.J. Park, "Efficient Anomaly Detection by Modeling Privilege Flows Using Hidden Markov Model," Computer and Security, vol. 22, no. 1, pp. 45-55, 2003.
    • (2003) Computer and Security , vol.22 , Issue.1 , pp. 45-55
    • Cho, S.B.1    Park, H.J.2
  • 22
    • 84890861404 scopus 로고    scopus 로고
    • A Multi-Layer Model for Anomaly Intrusion Detection Using Program Sequences of System Calls
    • X.D. Hoang, J. Hu, and P. Bertok, "A Multi-Layer Model for Anomaly Intrusion Detection Using Program Sequences of System Calls," Proc. 11th IEEE Int'l Conf. Networks, pp. 531-536, 2003.
    • (2003) Proc. 11th IEEE Int'l Conf. Networks , pp. 531-536
    • Hoang, X.D.1    Hu, J.2    Bertok, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.