메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1673-1680

Combatting financial fraud: A coevolutionary anomaly detection approach

Author keywords

Anomaly detection; Coevolutionary algorithms; Ecology; Financial fraud; Fuzzy logic; Parisian approach; Self nonself space pattern construction

Indexed keywords

FUZZY LOGIC; FUZZY SETS;

EID: 57349199771     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (10)

References (22)
  • 1
    • 0031852781 scopus 로고    scopus 로고
    • Territory size and shape in fire ants: A model based on neighborhood interactions
    • June
    • E. S. Adams. Territory size and shape in fire ants: a model based on neighborhood interactions. Ecology, 79(4):1125-1134, June 1998.
    • (1998) Ecology , vol.79 , Issue.4 , pp. 1125-1134
    • Adams, E.S.1
  • 2
    • 34548835213 scopus 로고    scopus 로고
    • S. Balachandran, D. Dasgupta, F. Nino, and D. Garrett. A general framework for evolving multi-shaped detectors in negative selection. In IEEE Symposium Series on Computational Intelligence, Honolulu, Hawaii, April 2007.
    • S. Balachandran, D. Dasgupta, F. Nino, and D. Garrett. A general framework for evolving multi-shaped detectors in negative selection. In IEEE Symposium Series on Computational Intelligence, Honolulu, Hawaii, April 2007.
  • 3
    • 0008444547 scopus 로고    scopus 로고
    • Polar IFS + parisian genetic programming = effcient IFS inverse problem solving
    • P. Collet, E. Lutton, and F. Raynal. Polar IFS + parisian genetic programming = effcient IFS inverse problem solving. Genetic Programming and Evolvable Machines, 1:339-361, 2000.
    • (2000) Genetic Programming and Evolvable Machines , vol.1 , pp. 339-361
    • Collet, P.1    Lutton, E.2    Raynal, F.3
  • 4
    • 0036613083 scopus 로고    scopus 로고
    • An immunity-based technique to characterize intrusions in computer networks
    • June
    • D. Dasgupta and F. Gonzalez, An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation, 6(3):281-291, June 2002.
    • (2002) IEEE Transactions on Evolutionary Computation , vol.6 , Issue.3 , pp. 281-291
    • Dasgupta, D.1    Gonzalez, F.2
  • 5
    • 24644518623 scopus 로고    scopus 로고
    • Automated photogrammetric network design using the parisian approach
    • Springer Berlin, Heidelberg
    • E. Dunn, G. Olague, and E. Lutton. Automated photogrammetric network design using the parisian approach. In Applications on Evolutionary Computing, pages 356-365. Springer Berlin / Heidelberg, 2005.
    • (2005) Applications on Evolutionary Computing , pp. 356-365
    • Dunn, E.1    Olague, G.2    Lutton, E.3
  • 6
    • 0001351468 scopus 로고
    • Using genetic algorithms to explore pattern recognition in the immune system
    • S. Forrest, B. Javornik, R. E. Smith, and A. S. Perelson. Using genetic algorithms to explore pattern recognition in the immune system. Evolutionary Computation, 1(3):191-211, 1993.
    • (1993) Evolutionary Computation , vol.1 , Issue.3 , pp. 191-211
    • Forrest, S.1    Javornik, B.2    Smith, R.E.3    Perelson, A.S.4
  • 10
    • 3543106606 scopus 로고    scopus 로고
    • Anomaly detection using real-valued negative selection
    • December
    • F. A. Gonzalez and D. Dasgupta. Anomaly detection using real-valued negative selection. Genetic Programming and Evolvable Machines, 4(4):383-403, December 2003.
    • (2003) Genetic Programming and Evolvable Machines , vol.4 , Issue.4 , pp. 383-403
    • Gonzalez, F.A.1    Dasgupta, D.2
  • 15
    • 0012330853 scopus 로고    scopus 로고
    • Negative selection and niching by an artificial immune system for network intrusion detection
    • Orlando, Florida, 13-17 July
    • J. Kim and P. Bentley. Negative selection and niching by an artificial immune system for network intrusion detection, In Genetic and Evolutionary Computation Conference (GECCO '99), pages 149-158, Orlando, Florida, 13-17 July 1999.
    • (1999) Genetic and Evolutionary Computation Conference (GECCO '99) , pp. 149-158
    • Kim, J.1    Bentley, P.2
  • 20
    • 57349098031 scopus 로고    scopus 로고
    • Evolving discrete-valued anomaly detectors for a network intrusion detection system using negative selection
    • S. T. Powers and J. He. Evolving discrete-valued anomaly detectors for a network intrusion detection system using negative selection. In The 6th Annual Workshop on Computational Intelligence (UKCI '06), pages 41-48, 2006.
    • (2006) The 6th Annual Workshop on Computational Intelligence (UKCI '06) , pp. 41-48
    • Powers, S.T.1    He, J.2
  • 22
    • 57349183371 scopus 로고    scopus 로고
    • Theft, fraud cost retailers $8 million a day
    • March 2, Newspaper
    • M. Toneguzzi. Theft, fraud cost retailers $8 million a day. Ottawa Citizen, March 2 2007, Newspaper.
    • (2007) Ottawa Citizen
    • Toneguzzi, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.