-
2
-
-
37149053967
-
-
Phua, C., Gayler, R., Lee, V., Smith-Miles, K.: A Comprehensive Survey of Data Mining-based Fraud Detection Research (2005)
-
(2005)
A Comprehensive Survey of Data Mining-based Fraud Detection Research
-
-
Phua, C.1
Gayler, R.2
Lee, V.3
Smith-Miles, K.4
-
3
-
-
29144443664
-
Minority Report in Fraud Detection: Classification of Skewed Data
-
Phua, C., Lee, V., Smith-Miles, K., Damminda, A.: Minority Report in Fraud Detection: Classification of Skewed Data. SIGKDD Explorations 6(1), 50-59 (2004)
-
(2004)
SIGKDD Explorations
, vol.6
, Issue.1
, pp. 50-59
-
-
Phua, C.1
Lee, V.2
Smith-Miles, K.3
Damminda, A.4
-
4
-
-
2942674608
-
Survey of Fraud Detection Techniques
-
Taiwan, March 21-23
-
Kou, Y., Lu, C., Sinvongwattana, S., Huang, Y.P.: Survey of Fraud Detection Techniques. In: Proc. of IEEE Networking, Taiwan, March 21-23 (2004)
-
(2004)
Proc. of IEEE Networking
-
-
Kou, Y.1
Lu, C.2
Sinvongwattana, S.3
Huang, Y.P.4
-
5
-
-
15744397281
-
Fraud Detection in Electrical Energy Consumers Using Rough Sets
-
Man and Cybernetics
-
Cabral, J.E., And Gontijo, E.M.: Fraud Detection in Electrical Energy Consumers Using Rough Sets. In: Proc. of IEEE Conf. on Systems, Man and Cybernetics (2004)
-
(2004)
Proc. of IEEE Conf. on Systems
-
-
Cabral, J.E.1
And Gontijo, E.M.2
-
6
-
-
0033705131
-
Multiple algorithms for fraud detection
-
Wheeler, R., Aitken, S.: Multiple algorithms for fraud detection. Knowledge-Based Systems 13, 93-99 (2000)
-
(2000)
Knowledge-Based Systems
, vol.13
, pp. 93-99
-
-
Wheeler, R.1
Aitken, S.2
-
7
-
-
0032309517
-
An Evaluation of High-End Data Mining Tools for Fraud Detection
-
Abbott, D.W., Matkovsky, I.P., Elder IV, J.F.: An Evaluation of High-End Data Mining Tools for Fraud Detection. In: Proc. of IEEE SMC 1998 (1998)
-
(1998)
Proc. of IEEE
, vol.SMC 1998
-
-
Abbott, D.W.1
Matkovsky, I.P.2
Elder3
IV, J.F.4
-
8
-
-
33745586336
-
Using Association Rules for Fraud Detection in Web Advertising Networks
-
Trondheim, Norway
-
Metwally, A., Agrawal, D., Abbadi, A.E.: Using Association Rules for Fraud Detection in Web Advertising Networks. In: Proc. of VLDB, Trondheim, Norway (2005)
-
(2005)
Proc. of VLDB
-
-
Metwally, A.1
Agrawal, D.2
Abbadi, A.E.3
-
9
-
-
24944572367
-
Credit Card Fraud Detection using Bayesian and Neural Networks
-
Maes, S., Tuyls, K., Vanschoenwinkel, B., Manderick, B.: Credit Card Fraud Detection using Bayesian and Neural Networks. In: Proc. of NAISO Congress on Neuro Fuzzy Technologies (2002)
-
(2002)
Proc. of NAISO Congress on Neuro Fuzzy Technologies
-
-
Maes, S.1
Tuyls, K.2
Vanschoenwinkel, B.3
Manderick, B.4
-
12
-
-
65949088930
-
Adaptive Spike Detection for Resilient Data Stream Mining
-
Phua, C., Gayler, R., Lee, V., Smith-Miles, K.: Adaptive Spike Detection for Resilient Data Stream Mining. In: Proc. of 6th Australasian Data Mining Conf. (2007)
-
(2007)
Proc. of 6th Australasian Data Mining Conf
-
-
Phua, C.1
Gayler, R.2
Lee, V.3
Smith-Miles, K.4
-
13
-
-
66049109567
-
Adaptive Communal Detection in Search of Adversarial Identity Crime
-
Phua, C., Gayler, R., Lee, V., Smith-Miles, K.: Adaptive Communal Detection in Search of Adversarial Identity Crime. ACM SIGKDD (2007)
-
(2007)
ACM SIGKDD
-
-
Phua, C.1
Gayler, R.2
Lee, V.3
Smith-Miles, K.4
-
14
-
-
38549095494
-
A Unifying Method for Outlier and Change Detection from Data Streams
-
Zhi, L., Hong, M., Yongdao, Z.: A Unifying Method for Outlier and Change Detection from Data Streams. In: Proc. Computational Intelligence and Security, pp. 580-585 (2006)
-
(2006)
Proc. Computational Intelligence and Security
, pp. 580-585
-
-
Zhi, L.1
Hong, M.2
Yongdao, Z.3
-
16
-
-
33745793045
-
On the Approximate Communal Fraud Scoring of Credit Applications
-
Phua, C., Gayler, R., Lee, V., Smith-Miles, K.: On the Approximate Communal Fraud Scoring of Credit Applications. In: Proc. of Credit Scoring and Credit Control IX (2005)
-
(2005)
Proc. of Credit Scoring and Credit Control
, vol.9
-
-
Phua, C.1
Gayler, R.2
Lee, V.3
Smith-Miles, K.4
-
18
-
-
66049102840
-
-
Fan, W., Huang, Y., Wang, H., Yu, P.S.: Active Mining of Data Streams. IBM T. J. Watson Research 10532 (2006)
-
Fan, W., Huang, Y., Wang, H., Yu, P.S.: Active Mining of Data Streams. IBM T. J. Watson Research 10532 (2006)
-
-
-
-
19
-
-
33749539634
-
Outlier Detection by Active Learning
-
Abe, N., Zadrozny, B., Langford, J.: Outlier Detection by Active Learning. In: Proc. of the 12th ACM SIGKDD, pp. 504-509 (2006)
-
(2006)
Proc. of the 12th ACM SIGKDD
, pp. 504-509
-
-
Abe, N.1
Zadrozny, B.2
Langford, J.3
-
20
-
-
0042961664
-
-
Stolfo, S.J., Fan, D.W., Lee, W., Prodromidis, A.L.: Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results (1999)
-
(1999)
Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results
-
-
Stolfo, S.J.1
Fan, D.W.2
Lee, W.3
Prodromidis, A.L.4
-
21
-
-
0031192174
-
Neural Fraud Detection in Credit Card Operations
-
Dorronsoro, J., Ginel, F., Sanchez, C., Cruz, C.: Neural Fraud Detection in Credit Card Operations. Proc. of IEEE Transactions on Neural Networks 8(4), 827-834 (1997)
-
(1997)
Proc. of IEEE Transactions on Neural Networks
, vol.8
, Issue.4
, pp. 827-834
-
-
Dorronsoro, J.1
Ginel, F.2
Sanchez, C.3
Cruz, C.4
-
22
-
-
0002395276
-
A Classification-based Methodology for Planning Auditing Strategies in Fraud Detection
-
Bonchi, F., Giannotti, F., Mainetto, G., Pedreschi, D.: A Classification-based Methodology for Planning Auditing Strategies in Fraud Detection. In: Proc. of SIGKDD 1999, pp. 175- 184 (1999)
-
(1999)
Proc. of SIGKDD
, pp. 175-184
-
-
Bonchi, F.1
Giannotti, F.2
Mainetto, G.3
Pedreschi, D.4
-
24
-
-
84898563500
-
Design of an Artificial Immune System as a Novel Anomaly Detector for Combating Financial Fraud in Retail Sector
-
Kim, J., Ong, A., Overill, R.: Design of an Artificial Immune System as a Novel Anomaly Detector for Combating Financial Fraud in Retail Sector. Congress on Evolutionary Computation (2003)
-
(2003)
Congress on Evolutionary Computation
-
-
Kim, J.1
Ong, A.2
Overill, R.3
-
25
-
-
84986149626
-
Fuzzy Neural Network for Assessing the Risk of Fraudulent inancial Reporting
-
Lin, J., Hwang, M., Becker, J.A.: Fuzzy Neural Network for Assessing the Risk of Fraudulent inancial Reporting. Managerial Auditing Journal 18(8), 657-665 (2003)
-
(2003)
Managerial Auditing Journal
, vol.18
, Issue.8
, pp. 657-665
-
-
Lin, J.1
Hwang, M.2
Becker, J.A.3
-
26
-
-
33845242735
-
Evolutionary, my dear Watson: Investigating Committee-based Evolution of Fuzzy Rules for the Detection of Suspicious Insurance Claims
-
Bentley, P.: Evolutionary, my dear Watson: Investigating Committee-based Evolution of Fuzzy Rules for the Detection of Suspicious Insurance Claims. In: Proc. of GECCO (2000)
-
(2000)
Proc. of GECCO
-
-
Bentley, P.1
-
27
-
-
0242709360
-
Collusion in the US Crop Insurance ogram: Applied Data Mining
-
Little, B., Johnston, W., Lovell, A., Rejesus, R., Steed, S.: Collusion in the US Crop Insurance ogram: Applied Data Mining. In: Proc. of SIGKDD 2002, pp. 594-598 (2002)
-
(2002)
Proc. of SIGKDD
, pp. 594-598
-
-
Little, B.1
Johnston, W.2
Lovell, A.3
Rejesus, R.4
Steed, S.5
-
28
-
-
3543125360
-
On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms
-
Yamanishi, K., Takeuchi, J., Williams, G., Milne, P.: On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms. Data Mining and Knowledge Discovery 8, 275-300 (2004)
-
(2004)
Data Mining and Knowledge Discovery
, vol.8
, pp. 275-300
-
-
Yamanishi, K.1
Takeuchi, J.2
Williams, G.3
Milne, P.4
-
29
-
-
0042755750
-
Detecting Hit-Shaving in Click-Through Payment Schemes
-
Reiter, M., Anupam, V., Mayer, A.: Detecting Hit-Shaving in Click-Through Payment Schemes. In: Proc. of USENIX Workshop on Electronic Commerce, pp. 155-166 (1998)
-
(1998)
Proc. of USENIX Workshop on Electronic Commerce
, pp. 155-166
-
-
Reiter, M.1
Anupam, V.2
Mayer, A.3
-
31
-
-
0033294694
-
On the Security of Pay-Per-Click and Other Web Advertising Schemes
-
Anupam, V., Mayer, A., Nissim, K., Pinkas, B., Reiter, M.: On the Security of Pay-Per-Click and Other Web Advertising Schemes. In: Proc. of the 8th WWW Int'l. World Wide Web Conf., pp. 1091-1100 (1999)
-
(1999)
Proc. of the 8th WWW Int'l. World Wide Web Conf
, pp. 1091-1100
-
-
Anupam, V.1
Mayer, A.2
Nissim, K.3
Pinkas, B.4
Reiter, M.5
-
33
-
-
66049125818
-
Discovery of Fraud Rules for Telecommunications Challenges and Solutions
-
Rosset, S., Murad, U., Neumann, E., Idan, Y., Pinkas, G.: Discovery of Fraud Rules for Telecommunications Challenges and Solutions. In: Proc. of KDD 1990 (1999)
-
(1990)
Proc. of KDD
-
-
Rosset, S.1
Murad, U.2
Neumann, E.3
Idan, Y.4
Pinkas, G.5
-
34
-
-
9444278338
-
Rough Sets in Knowledge Discovery
-
Physica-Verlag
-
Polkowski, L., Kacprzyk, J., Skowron, A.: Rough Sets in Knowledge Discovery. Applications, Case Studies and Sofmare Systems, vol. 2. Physica-Verlag (1998)
-
(1998)
Applications, Case Studies and Sofmare Systems
, vol.2
-
-
Polkowski, L.1
Kacprzyk, J.2
Skowron, A.3
-
35
-
-
2942598504
-
Variable Selection in Data Mining: Building a Predictive Model for Bankruptcy
-
Foster, D., Stine, R.: Variable Selection in Data Mining: Building a Predictive Model for Bankruptcy. Journal of American Statistical Association 99, 303-313 (2004)
-
(2004)
Journal of American Statistical Association
, vol.99
, pp. 303-313
-
-
Foster, D.1
Stine, R.2
-
36
-
-
84958540312
-
-
Cortes, C., Pregibon, D., Volinsky, C.: Communities of interest. In: Hoffmann, F., Adams, N., Fisher, D., Guimarães, G., Hand, D.J. (eds.) IDA 2001. LNCS, 2189, p. 105. Springer, Heidelberg (2001)
-
Cortes, C., Pregibon, D., Volinsky, C.: Communities of interest. In: Hoffmann, F., Adams, N., Fisher, D., Guimarães, G., Hand, D.J. (eds.) IDA 2001. LNCS, vol. 2189, p. 105. Springer, Heidelberg (2001)
-
-
-
-
40
-
-
0033336136
-
Distributed Data Mining in Credit Card Fraud Detection
-
Chan, P., Fan, W., Prodromidis, A., Stolfo, S.: Distributed Data Mining in Credit Card Fraud Detection. In: Proc. of IEEE Intelligent Systems, pp. 67-74 (1999)
-
(1999)
Proc. of IEEE Intelligent Systems
, pp. 67-74
-
-
Chan, P.1
Fan, W.2
Prodromidis, A.3
Stolfo, S.4
-
41
-
-
66049142053
-
-
Kumar, S., Spafford, E.H.: An application of pattern matching in intrusion detection. The COAST Project, Department of Computer Sciences, Purdue University, West Lafayette, IN, USA, Technical Report CSD-TR-94-013, June 17 (1994)
-
Kumar, S., Spafford, E.H.: An application of pattern matching in intrusion detection. The COAST Project, Department of Computer Sciences, Purdue University, West Lafayette, IN, USA, Technical Report CSD-TR-94-013, June 17 (1994)
-
-
-
-
42
-
-
66049110012
-
-
Phua, C., Gayler, R., Lee, V., Smith-Miles, K.: On the Communal Analysis Suspicion Scoring for Identity Crime in Streaming Credit Applications. European J. of Operational Research (2006)
-
Phua, C., Gayler, R., Lee, V., Smith-Miles, K.: On the Communal Analysis Suspicion Scoring for Identity Crime in Streaming Credit Applications. European J. of Operational Research (2006)
-
-
-
-
43
-
-
78449289044
-
Communal detection of implicit personal identity streams
-
Phua, C., Gayler, R., Lee, V., Smith-Miles, K.: Communal detection of implicit personal identity streams. In: Proc. of IEEE ICDM 2006 on Mining Streaming Data (2006)
-
(2006)
Proc. of IEEE ICDM 2006 on Mining Streaming Data
-
-
Phua, C.1
Gayler, R.2
Lee, V.3
Smith-Miles, K.4
-
45
-
-
44649106473
-
-
ACM, New York
-
Pandit, S., Chau, D.H., Wang, S., Faloutsos, C.: A Fast and Scalable System for Fraud Detection in Online Auction Networks. ACM, New York (2007)
-
(2007)
A Fast and Scalable System for Fraud Detection in Online Auction Networks
-
-
Pandit, S.1
Chau, D.H.2
Wang, S.3
Faloutsos, C.4
-
47
-
-
0742306282
-
Computational Methods for Dynamic Graphs
-
Cortes, C., Pregibon, D., Volinsky, C.: Computational Methods for Dynamic Graphs. J. of Computational and Graphical Statistics 12, 950-970 (2003)
-
(2003)
J. of Computational and Graphical Statistics
, vol.12
, pp. 950-970
-
-
Cortes, C.1
Pregibon, D.2
Volinsky, C.3
-
49
-
-
0002656796
-
Activity Monitoring: Noticing Interesting Changes in Behaviour
-
Fawcett, T., Provost, F.: Activity Monitoring: Noticing Interesting Changes in Behaviour. In: Proc. of SIGKDD 1999, pp. 53-62 (1999)
-
(1999)
Proc. of SIGKDD
, pp. 53-62
-
-
Fawcett, T.1
Provost, F.2
-
51
-
-
0242540464
-
Bursty and Hierarchical Structure in Streams
-
Kleinberg, J.: Bursty and Hierarchical Structure in Streams. In: Proc. of SIGKDD 2002, pp. 91-101 (2002)
-
(2002)
Proc. of SIGKDD
, pp. 91-101
-
-
Kleinberg, J.1
-
52
-
-
34548087674
-
Temporal Dynamics of On-Line Information Streams
-
Garofalakis, M, Gehrke, J, Rastogi, R, eds, Springer, Heidelberg
-
Kleinberg, J.: Temporal Dynamics of On-Line Information Streams. In: Garofalakis, M., Gehrke, J., Rastogi, R. (eds.) Data Stream Management: Processing High-Speed Data Streams. Springer, Heidelberg (2005)
-
(2005)
Data Stream Management: Processing High-Speed Data Streams
-
-
Kleinberg, J.1
-
54
-
-
77954436325
-
STREAM: The Stanford Stream Data Manager Demonstration Description-Short Overview of System Status and Plans
-
Arasu, A., et al.: STREAM: The Stanford Stream Data Manager Demonstration Description-Short Overview of System Status and Plans. In: Proc. of SIGMOD 2003 (2003)
-
(2003)
Proc. of SIGMOD
-
-
Arasu, A.1
-
55
-
-
10644281455
-
Retrospective on Aurora
-
Balakrishnan, H., et al.: Retrospective on Aurora. VLDB Journal 13(4), 370-383 (2004)
-
(2004)
VLDB Journal
, vol.13
, Issue.4
, pp. 370-383
-
-
Balakrishnan, H.1
-
56
-
-
33745803865
-
-
Phua, C., Gayler, R., Lee, V., Smith, K.: Temporal representation in spike detection of sparse personal identity streams. In: Chen, H., Wang, F.-Y., Yang, C.C., Zeng, D., Chau, M., Chang, K. (eds.) WISI 2006. LNCS, 3917, pp. 115-126. Springer, Heidelberg (2006)
-
Phua, C., Gayler, R., Lee, V., Smith, K.: Temporal representation in spike detection of sparse personal identity streams. In: Chen, H., Wang, F.-Y., Yang, C.C., Zeng, D., Chau, M., Chang, K. (eds.) WISI 2006. LNCS, vol. 3917, pp. 115-126. Springer, Heidelberg (2006)
-
-
-
|