-
2
-
-
0036648676
-
Mining For Fraud
-
Jul/Aug
-
Weatherford, M., "Mining For Fraud", IEEE Intelligent Systems, vol.17, Issue 4, pp. 4-6, Jul/Aug 2002.
-
(2002)
IEEE Intelligent Systems
, vol.17
, Issue.4
, pp. 4-6
-
-
Weatherford, M.1
-
3
-
-
49749087973
-
Revenue Assurance, Fraud & Security in 3G Telecom Services
-
Oct
-
Mark Johnson, "Revenue Assurance, Fraud & Security in 3G Telecom Services", Journal of Economic Crime Management, Oct 2002.
-
(2002)
Journal of Economic Crime Management
-
-
Johnson, M.1
-
5
-
-
2942674608
-
Survey of Fraud Detection Techniques
-
Yufeng Kou; Chang-Tien Lu; Sirwongwattana, S.; Yo-Ping Huang, "Survey of Fraud Detection Techniques", Proc. of IEEE International Conference on Networking, Sensing and Control, pp. 749-754 vol.2, 2004.
-
(2004)
Proc. of IEEE International Conference on Networking, Sensing and Control
, vol.2
, pp. 749-754
-
-
Kou, Y.1
Tien Lu, C.2
Sirwongwattana, S.3
Ping Huang, Y.4
-
6
-
-
49749108588
-
-
Communications Fraud Control Association CFCA
-
Communications Fraud Control Association (CFCA), http://www.cfcu.org
-
-
-
-
7
-
-
49749138547
-
Multiple Additive Regression Trees - A Methodology for Predictive Data Mining For Fraud Detection
-
Master's thesis, Naval Postgraduate School, Monterey, California, Sept
-
DA Silva Monteiro, Antonio J. F., "Multiple Additive Regression Trees - A Methodology for Predictive Data Mining For Fraud Detection", Master's thesis, Naval Postgraduate School, Monterey, California, Sept 2002.
-
(2002)
-
-
Silva Monteiro, D.A.1
Antonio, J.F.2
-
9
-
-
67349152033
-
Call Record Analysis, Making Life Easier -Network Design and Management Tools
-
8/4, Oct
-
Hinde, S.F., "Call Record Analysis, Making Life Easier -Network Design and Management Tools", IEE Colloquium, pp. 8/1-8/4, Oct 1996.
-
(1996)
IEE Colloquium
, pp. 8-1
-
-
Hinde, S.F.1
-
11
-
-
29144443664
-
Minority Report in Fraud Detection: Classification of Skewed Data
-
Clifton Phua, Damminda Alahakoon, Vincent Lee, "Minority Report in Fraud Detection: Classification of Skewed Data", ACM SIGKDD Explorations, vol.6, pp. 50-69, Issue 1, 2004.
-
(2004)
ACM SIGKDD Explorations
, vol.6
, Issue.1
, pp. 50-69
-
-
Phua, C.1
Alahakoon, D.2
Lee, V.3
-
12
-
-
3042636507
-
A case study of applying boosting naive Bayes to claim fraud diagnosis
-
May
-
Viaene, S.; Derrig, R.A.; Dedene, G., "A case study of applying boosting naive Bayes to claim fraud diagnosis", IEEE Transactions on Knowledge and Data Engineering, Volume 16, Issue 5, pp 612-620, May 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.5
, pp. 612-620
-
-
Viaene, S.1
Derrig, R.A.2
Dedene, G.3
-
13
-
-
84892142402
-
-
Michiaki Taniguchi, Michael haft, Jaako Hollmen, Volker Tresp, Fraud Detection in Communication Networks using Neural and Probabilistic Methods, Proc. IEEE International Conference on Acoustic, Speech and Signal Processing, ICASSP'98, 2, pp. 1241-1244, 1998.
-
Michiaki Taniguchi, Michael haft, Jaako Hollmen, Volker Tresp, "Fraud Detection in Communication Networks using Neural and Probabilistic Methods", Proc. IEEE International Conference on Acoustic, Speech and Signal Processing, ICASSP'98, vol.2, pp. 1241-1244, 1998.
-
-
-
-
14
-
-
0002688690
-
Discovery of Fraud Rules for Telecommunications Challenges and Solutions
-
California, pp
-
Saharon Rosset, Uzi Murad, Einat Neumann, Yizhak Idan, Gadi Pinkasm, "Discovery of Fraud Rules for Telecommunications Challenges and Solutions", Proc. ACM SIGKDD international Conference on Knowledge Discovery and Data Mining, California, pp. 409-413, 1999.
-
(1999)
Proc. ACM SIGKDD international Conference on Knowledge Discovery and Data Mining
, pp. 409-413
-
-
Rosset, S.1
Murad, U.2
Neumann, E.3
Idan, Y.4
Pinkasm, G.5
-
15
-
-
0031362016
-
Fraud Detection and Management in Mobile Telecommunications Networks
-
April
-
nd European Conference on Security and Detection, vol.437, pp. 91-96, April 1997.
-
(1997)
nd European Conference on Security and Detection
, vol.437
, pp. 91-96
-
-
Burge, P.1
Shawe-Taylor, J.2
Cooke, C.3
Moreau, Y.4
Preneel, B.5
Stoermann, C.6
-
16
-
-
38949194197
-
Clustering-based Missing Value Imputation for Data Preprocessing
-
Aug
-
Chengqi Zhang, Yongsong Qin, Xiaofeng Zhu, Jilian Zhan, Shichao Zhang, "Clustering-based Missing Value Imputation for Data Preprocessing", Proc. IEEE International Conference on Industrial Informatics, pp. 1081 -1086, Aug 2006.
-
(2006)
Proc. IEEE International Conference on Industrial Informatics
, pp. 1081-1086
-
-
Zhang, C.1
Qin, Y.2
Zhu, X.3
Zhan, J.4
Zhang, S.5
-
17
-
-
30344485118
-
Missing is Useful: Missing Values in Cost-Sensitive Decision Trees
-
Dec
-
Shichao Zhang, Zhenxing Qin, Charles X. Ling, Shengli Sheng, "Missing is Useful: Missing Values in Cost-Sensitive Decision Trees", IEEE Transactions on Knowledge and Data Engineering, vol.17, No. 12, pp. 1689-1693, Dec 2005.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.12
, pp. 1689-1693
-
-
Zhang, S.1
Qin, Z.2
Ling, C.X.3
Sheng, S.4
-
18
-
-
33746346719
-
Robust Rule-Based Prediction
-
Aug
-
Jiuyong Li, "Robust Rule-Based Prediction", IEEE Transactions on Knowledge and Data Engineering, vol.18, No.8, pp. 1043-1054, Aug 2006.
-
(2006)
IEEE Transactions on Knowledge and Data Engineering
, vol.18
, Issue.8
, pp. 1043-1054
-
-
Li, J.1
-
19
-
-
0043198674
-
Robust Learning with Missing Data
-
Nov
-
Marco Ramoni, Paola Sebastiani, "Robust Learning with Missing Data", ACM Machine Learning, vol.45, Issue 2, pp. 147-170, Nov 2001.
-
(2001)
ACM Machine Learning
, vol.45
, Issue.2
, pp. 147-170
-
-
Ramoni, M.1
Sebastiani, P.2
-
21
-
-
0009304541
-
A Bayesian Approach to Filtering Junk Email
-
Mehran Sahami, Susan Dumais, David Heckerman, Eric Horvitz, "A Bayesian Approach to Filtering Junk Email", Learning for Text Categorization: Papers from the 1998 Workshop, 1998.
-
(1998)
Learning for Text Categorization: Papers from the 1998 Workshop
-
-
Sahami, M.1
Dumais, S.2
Heckerman, D.3
Horvitz, E.4
|