-
2
-
-
51749100084
-
Verified By Visa
-
"Verified By Visa," http://www.visaeurope.com/verifiedbyvisa, 2006.
-
(2006)
-
-
-
3
-
-
51749110270
-
-
"Mastercard SecureCode," http://www.mastercard.com/securecode/, 2006.
-
(2006)
-
-
-
4
-
-
0042421807
-
Statistical fraud detection:A review
-
R. Bolton and D. Hand, "Statistical fraud detection:A review," Statistical Science, vol. 17, pp. 233-255, 2002.
-
(2002)
Statistical Science
, vol.17
, pp. 233-255
-
-
Bolton, R.1
Hand, D.2
-
5
-
-
0033344304
-
Neural Data Mining for Credit Card Fraud Detection
-
R. Brause, T. Langsdorf, and M. Hepp, "Neural Data Mining for Credit Card Fraud Detection," in ICTAI, 1999, pp. 103-106.
-
(1999)
ICTAI
, pp. 103-106
-
-
Brause, R.1
Langsdorf, T.2
Hepp, M.3
-
7
-
-
0027986244
-
Credit Card Fraud Detection with a Neural-Network
-
S. Ghosh and D. L. Reilly, "Credit Card Fraud Detection with a Neural-Network," IEEE Computer Society Press 3, pp. 621-630, 1994.
-
(1994)
IEEE Computer Society Press
, vol.3
, pp. 621-630
-
-
Ghosh, S.1
Reilly, D.L.2
-
8
-
-
2942674608
-
Survey of fraud detection techniques
-
Y. Kou, C.-T. Lu, S. Sirwongwattana, and Y.-P. Huang, "Survey of fraud detection techniques," in IEEE International Conference on Networking, Sensing and Control, 2004, pp. 749-754 Vol.2.
-
(2004)
IEEE International Conference on Networking, Sensing and Control
, vol.2
, pp. 749-754
-
-
Kou, Y.1
Lu, C.-T.2
Sirwongwattana, S.3
Huang, Y.-P.4
-
10
-
-
38049081510
-
SWS for Financial Overdrawn Alerting
-
J. M. L. Cobo, S. Losada, Ó. Corcho, V. R. Benjamins, M. Niño, and J. Contreras, "SWS for Financial Overdrawn Alerting," Semantic Web, 2004.
-
(2004)
Semantic Web
-
-
Cobo, J.M.L.1
Losada, S.2
Corcho, O.3
Benjamins, V.R.4
Niño, M.5
Contreras, J.6
-
11
-
-
51749121394
-
-
StreamSQL
-
"StreamSQL," http://www.streamsql.org/, 2006.
-
(2006)
-
-
-
13
-
-
38049067004
-
Towards a Proactive Fraud Management Framework for Financial Data Streams
-
Loyola College Graduate Center, Columbia, MD, USA
-
M. E. Edge, P. R. F. Sampaio, and M. Choudhary, "Towards a Proactive Fraud Management Framework for Financial Data Streams," in The 3rd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'07), Loyola College Graduate Center, Columbia, MD, USA., 2007, pp. 55-62.
-
(2007)
The 3rd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'07)
, pp. 55-62
-
-
Edge, M.E.1
Sampaio, P.R.F.2
Choudhary, M.3
-
14
-
-
51749084250
-
-
Falcon Fraud Manager, Fair Isaac Corporation
-
"Falcon Fraud Manager - Fair Isaac Corporation," http://www.fairisaac.com, 2006.
-
(2006)
-
-
-
15
-
-
51749099218
-
-
"Entrust TransactionGuard," http://www.entrust.com, 2008.
-
(2008)
-
-
-
16
-
-
23044520423
-
Neural Fraud Detection in Mobile Phone Operations
-
Azzedine Boukerche and M. S. M. A. Notare, "Neural Fraud Detection in Mobile Phone Operations," IPDPS Workshops, vol. 1800, pp. 636-644, 2000.
-
(2000)
IPDPS Workshops
, vol.1800
, pp. 636-644
-
-
Boukerche, A.1
Notare, M.S.M.A.2
-
17
-
-
0010852727
-
An Unsupervised Neural Network Approach to Profiling the Behaviour of Mobile Phone Users for Use in Fraud Detection
-
P. Burge, "An Unsupervised Neural Network Approach to Profiling the Behaviour of Mobile Phone Users for Use in Fraud Detection," Journal of parallel and distributed computing, vol. 61, p. 915, 2001.
-
(2001)
Journal of parallel and distributed computing
, vol.61
, pp. 915
-
-
Burge, P.1
-
18
-
-
38049062032
-
Data Mining Prototype for Detecting E-Commerce Fraud [Research in Progress]
-
Bled, Slovenia
-
M. Lek, B. Anandarajah, N. Cerpa, and R. Jamieson, "Data Mining Prototype for Detecting E-Commerce Fraud [Research in Progress]," in Global Co-operation in the New Millennium - The 9th European Conference on Information Systems, Bled, Slovenia, 2001.
-
(2001)
Global Co-operation in the New Millennium - The 9th European Conference on Information Systems
-
-
Lek, M.1
Anandarajah, B.2
Cerpa, N.3
Jamieson, R.4
-
20
-
-
51749095322
-
A medical claim fraud/abuse detection system based on data mining: A case study in Chile
-
Las Vegas, Nevada, USA
-
P. Ortega, C. Figueroa, and G. Ruz, "A medical claim fraud/abuse detection system based on data mining: A case study in Chile," in DMIN'06, Las Vegas, Nevada, USA, 2006.
-
(2006)
DMIN'06
-
-
Ortega, P.1
Figueroa, C.2
Ruz, G.3
-
21
-
-
24944475336
-
Learning of Neural Networks for Fraud Detection Based on a Partial Area Under Curve
-
L.-J. Park, "Learning of Neural Networks for Fraud Detection Based on a Partial Area Under Curve," ISNN, pp. 922-927, 2005.
-
(2005)
ISNN
, pp. 922-927
-
-
Park, L.-J.1
-
22
-
-
24144501096
-
Auto claim fraud detection using Bayesian learning neural networks
-
S. Viaene, G. Dedene, and R. A. Derrig, "Auto claim fraud detection using Bayesian learning neural networks," Expert Systems with Applications, vol. 29, pp. 653-666, 2005.
-
(2005)
Expert Systems with Applications
, vol.29
, pp. 653-666
-
-
Viaene, S.1
Dedene, G.2
Derrig, R.A.3
-
23
-
-
51749113381
-
-
"StreamBase," http://www.streambase.co.uk, 2006.
-
(2006)
-
-
-
25
-
-
51749123162
-
-
Actimize Inc
-
"Actimize Inc," http://www.actimize.com/, 2006.
-
(2006)
-
-
-
26
-
-
51749090462
-
-
"Fortent," http://www.fortent.com, 2008.
-
(2008)
-
-
-
28
-
-
33746486787
-
Architectures for streaming data processing in sensor networks
-
C. H. Kim, K. Park, J. Fu, and R. Elmasri, "Architectures for streaming data processing in sensor networks," in Computer Systems and Applications, 2005. The 3rd ACS/IEEE International Conference on, 2005, p. 59.
-
(2005)
Computer Systems and Applications, 2005. The 3rd ACS/IEEE International Conference on
, pp. 59
-
-
Kim, C.H.1
Park, K.2
Fu, J.3
Elmasri, R.4
-
29
-
-
38049039891
-
Complex Events in Business Processes
-
A. Barros, G. Decker, and A. Grosskopf, "Complex Events in Business Processes," in Business Information Systems, 2007, pp. 29-40.
-
(2007)
Business Information Systems
, pp. 29-40
-
-
Barros, A.1
Decker, G.2
Grosskopf, A.3
-
30
-
-
51749123390
-
-
Y. D. Cai, D. Clutter, G. Pape, J. Han, M. Welge, and L. Auvil, "MAIDS: Mining Alarming Incidents from Data Streams."
-
MAIDS: Mining Alarming Incidents from Data Streams
-
-
Cai, Y.D.1
Clutter, D.2
Pape, G.3
Han, J.4
Welge, M.5
Auvil, L.6
-
31
-
-
33744821364
-
On Securing RTP-Based Streaming Content with Firewalls
-
L. Lu, R. Safavi-Naini, J. Horton, and W. Susilo, "On Securing RTP-Based Streaming Content with Firewalls," in Cryptology and Network Security, 2005, pp. 304-319.
-
(2005)
Cryptology and Network Security
, pp. 304-319
-
-
Lu, L.1
Safavi-Naini, R.2
Horton, J.3
Susilo, W.4
-
32
-
-
24144443826
-
Processing Frequent Items over Distributed Data Streams
-
D. Zhang, J. Li, W. Wang, L. Guo, and C. Ai, "Processing Frequent Items over Distributed Data Streams," in Web Technologies Research and Development - APWeb, 2005, pp. 523-529.
-
(2005)
Web Technologies Research and Development - APWeb
, pp. 523-529
-
-
Zhang, D.1
Li, J.2
Wang, W.3
Guo, L.4
Ai, C.5
-
33
-
-
1142291592
-
Adaptive filters for continuous queries over distributed data streams
-
San Diego, California: ACM Press
-
C. Olston, J. Jiang, and J. Widom, "Adaptive filters for continuous queries over distributed data streams," in Proceedings of the 2003 ACM SIGMOD international conference on Management of data San Diego, California: ACM Press, 2003, pp. 563-574.
-
(2003)
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
, pp. 563-574
-
-
Olston, C.1
Jiang, J.2
Widom, J.3
-
34
-
-
33745289988
-
The CQL continuous query language: Semantic foundations and query execution
-
A. Arasu, S. Babu, and J. Widom, "The CQL continuous query language: semantic foundations and query execution," The VLDB Journal, vol. 15, pp. 121-142, 2006.
-
(2006)
The VLDB Journal
, vol.15
, pp. 121-142
-
-
Arasu, A.1
Babu, S.2
Widom, J.3
-
35
-
-
0345206134
-
TelegraphCQ: Continuous Dataflow Processing for an Uncertain World
-
S. Chandrasekaran, "TelegraphCQ: Continuous Dataflow Processing for an Uncertain World," in CIDR 2003.
-
(2003)
CIDR
-
-
Chandrasekaran, S.1
-
36
-
-
51749113612
-
-
The Insurance Fraud Bureau
-
"The Insurance Fraud Bureau," http://www.insurancefraudbureau. org/, 2008.
-
(2008)
-
-
-
37
-
-
51749116754
-
-
"Experian," http://www.experian.co.uk, 2008.
-
(2008)
-
-
-
38
-
-
51749117195
-
-
CIFAS
-
"CIFAS," http://www.cifas.org.uk/, 2008.
-
(2008)
-
-
-
39
-
-
3242757869
-
-
World Scientific Publishing Company
-
P. J. G. Lisboa, B. Edisbury, and A. Vellido, "Business Applications of Neural Networks: The State-Of-The-Art of Real-World Applications," World Scientific Publishing Company, 2000, pp. 141-157.
-
(2000)
Business Applications of Neural Networks: The State-Of-The-Art of Real-World Applications
, pp. 141-157
-
-
Lisboa, P.J.G.1
Edisbury, B.2
Vellido, A.3
-
40
-
-
51749087313
-
-
"Ethoca," http://www.ethoca.com, 2008.
-
(2008)
-
-
-
41
-
-
51749103789
-
-
SAS Business Intelligence and Analytics Software
-
"SAS Business Intelligence and Analytics Software," http://www.sas.com/, 2007.
-
(2007)
-
-
-
42
-
-
51749097159
-
-
SuperSearch from The 3rd Man Ltd
-
"SuperSearch from The 3rd Man Ltd," http://www.the3rdman.co.uk/ supersearch.php, 2008.
-
(2008)
-
-
-
43
-
-
51749090052
-
-
"Early Warning," http://www.early-warning.org, 2008.
-
(2008)
-
-
-
44
-
-
84944048132
-
The Ponder Policy Specification Language
-
Springer-Verlag
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman, "The Ponder Policy Specification Language " in Proceedings of the International Workshop on Policies for Distributed Systems and Networks Springer-Verlag, 2001 pp. 18-38
-
(2001)
Proceedings of the International Workshop on Policies for Distributed Systems and Networks
, pp. 18-38
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
45
-
-
33746680490
-
Design and Implementation of Policy Decision Point in Policy-Based Network
-
G. Kim, J. Kim, and J. Na, "Design and Implementation of Policy Decision Point in Policy-Based Network," in icis, 2005, p. 534.
-
(2005)
icis
, pp. 534
-
-
Kim, G.1
Kim, J.2
Na, J.3
-
46
-
-
4544253771
-
From processes to policies - concepts for large scale policy generation
-
V. A. Danciu and B. Kempter, "From processes to policies - concepts for large scale policy generation," in Network Operations and Management Symposium, 2004. NOMS 2004. IEEE/IFIP, 2004, pp. 17-30 Vol.1.
-
(2004)
Network Operations and Management Symposium, 2004. NOMS 2004. IEEE/IFIP
, vol.1
, pp. 17-30
-
-
Danciu, V.A.1
Kempter, B.2
-
47
-
-
33845389969
-
Cauldron: A policy-based design tool
-
pp
-
L. Ramshaw, A. Sahai, J. Saxe, and S. Singhal, "Cauldron: a policy-based design tool," in Policies for Distributed Systems and Networks, 2006. Policy 2006. Seventh IEEE International Workshop on, 2006, p. 10 pp.
-
(2006)
Policies for Distributed Systems and Networks, 2006. Policy 2006. Seventh IEEE International Workshop on
, pp. 10
-
-
Ramshaw, L.1
Sahai, A.2
Saxe, J.3
Singhal, S.4
-
48
-
-
0032596611
-
-
J. Lobo, R. Bhatia, and S. A. Naqvi, A Policy Description Language, in {Aaai}/{Iaai}, 1999, pp. 291-298.
-
J. Lobo, R. Bhatia, and S. A. Naqvi, "A Policy Description Language," in {Aaai}/{Iaai}, 1999, pp. 291-298.
-
-
-
-
49
-
-
51749092463
-
Generalized Policy Model for Application and Service Management
-
Bristol, UK
-
M. Dekhil, V. Machiraju, K. Wurster, and M. Griss., "Generalized Policy Model for Application and Service Management," in Policy Workshop, Bristol, UK, 1999.
-
(1999)
Policy Workshop
-
-
Dekhil, M.1
Machiraju, V.2
Wurster, K.3
Griss, M.4
-
50
-
-
35248893332
-
A Network Management Architecture Using XML-Based Policy Information Base
-
K. Youn and C. Hong, "A Network Management Architecture Using XML-Based Policy Information Base," in Information Networking, 2003, pp. 876-885.
-
(2003)
Information Networking
, pp. 876-885
-
-
Youn, K.1
Hong, C.2
-
51
-
-
10644249870
-
XML distributed security policy for clusters
-
A. Apvrille and M. Pourzandi, "XML distributed security policy for clusters," Computers & Security, vol. 23, pp. 649-658, 2004.
-
(2004)
Computers & Security
, vol.23
, pp. 649-658
-
-
Apvrille, A.1
Pourzandi, M.2
|