메뉴 건너뛰기




Volumn 31, Issue , 2009, Pages 256-267

A taxonomy of frauds and fraud detection techniques

Author keywords

Bagging; Fraud detection; Intrusion detection; Spike detection; Stacking

Indexed keywords

CRIME; DATA MINING; INFORMATION MANAGEMENT; INFORMATION SYSTEMS; TAXONOMIES;

EID: 66049083627     PISSN: 18650929     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-00405-6_28     Document Type: Article
Times cited : (36)

References (57)
  • 3
    • 29144443664 scopus 로고    scopus 로고
    • Minority Report in Fraud Detection: Classification of Skewed Data
    • Phua, C., Lee, V., Smith-Miles, K., Damminda, A.: Minority Report in Fraud Detection: Classification of Skewed Data. SIGKDD Explorations 6(1), 50-59 (2004)
    • (2004) SIGKDD Explorations , vol.6 , Issue.1 , pp. 50-59
    • Phua, C.1    Lee, V.2    Smith-Miles, K.3    Damminda, A.4
  • 5
    • 15744397281 scopus 로고    scopus 로고
    • Fraud Detection in Electrical Energy Consumers Using Rough Sets
    • Man and Cybernetics
    • Cabral, J.E., And Gontijo, E.M.: Fraud Detection in Electrical Energy Consumers Using Rough Sets. In: Proc. of IEEE Conf. on Systems, Man and Cybernetics (2004)
    • (2004) Proc. of IEEE Conf. on Systems
    • Cabral, J.E.1    And Gontijo, E.M.2
  • 6
    • 0033705131 scopus 로고    scopus 로고
    • Multiple algorithms for fraud detection
    • Wheeler, R., Aitken, S.: Multiple algorithms for fraud detection. Knowledge-Based Systems 13, 93-99 (2000)
    • (2000) Knowledge-Based Systems , vol.13 , pp. 93-99
    • Wheeler, R.1    Aitken, S.2
  • 7
    • 0032309517 scopus 로고    scopus 로고
    • An Evaluation of High-End Data Mining Tools for Fraud Detection
    • Abbott, D.W., Matkovsky, I.P., Elder IV, J.F.: An Evaluation of High-End Data Mining Tools for Fraud Detection. In: Proc. of IEEE SMC 1998 (1998)
    • (1998) Proc. of IEEE , vol.SMC 1998
    • Abbott, D.W.1    Matkovsky, I.P.2    Elder3    IV, J.F.4
  • 8
    • 33745586336 scopus 로고    scopus 로고
    • Using Association Rules for Fraud Detection in Web Advertising Networks
    • Trondheim, Norway
    • Metwally, A., Agrawal, D., Abbadi, A.E.: Using Association Rules for Fraud Detection in Web Advertising Networks. In: Proc. of VLDB, Trondheim, Norway (2005)
    • (2005) Proc. of VLDB
    • Metwally, A.1    Agrawal, D.2    Abbadi, A.E.3
  • 13
    • 66049109567 scopus 로고    scopus 로고
    • Adaptive Communal Detection in Search of Adversarial Identity Crime
    • Phua, C., Gayler, R., Lee, V., Smith-Miles, K.: Adaptive Communal Detection in Search of Adversarial Identity Crime. ACM SIGKDD (2007)
    • (2007) ACM SIGKDD
    • Phua, C.1    Gayler, R.2    Lee, V.3    Smith-Miles, K.4
  • 18
    • 66049102840 scopus 로고    scopus 로고
    • Fan, W., Huang, Y., Wang, H., Yu, P.S.: Active Mining of Data Streams. IBM T. J. Watson Research 10532 (2006)
    • Fan, W., Huang, Y., Wang, H., Yu, P.S.: Active Mining of Data Streams. IBM T. J. Watson Research 10532 (2006)
  • 22
    • 0002395276 scopus 로고    scopus 로고
    • A Classification-based Methodology for Planning Auditing Strategies in Fraud Detection
    • Bonchi, F., Giannotti, F., Mainetto, G., Pedreschi, D.: A Classification-based Methodology for Planning Auditing Strategies in Fraud Detection. In: Proc. of SIGKDD 1999, pp. 175- 184 (1999)
    • (1999) Proc. of SIGKDD , pp. 175-184
    • Bonchi, F.1    Giannotti, F.2    Mainetto, G.3    Pedreschi, D.4
  • 24
    • 84898563500 scopus 로고    scopus 로고
    • Design of an Artificial Immune System as a Novel Anomaly Detector for Combating Financial Fraud in Retail Sector
    • Kim, J., Ong, A., Overill, R.: Design of an Artificial Immune System as a Novel Anomaly Detector for Combating Financial Fraud in Retail Sector. Congress on Evolutionary Computation (2003)
    • (2003) Congress on Evolutionary Computation
    • Kim, J.1    Ong, A.2    Overill, R.3
  • 25
    • 84986149626 scopus 로고    scopus 로고
    • Fuzzy Neural Network for Assessing the Risk of Fraudulent inancial Reporting
    • Lin, J., Hwang, M., Becker, J.A.: Fuzzy Neural Network for Assessing the Risk of Fraudulent inancial Reporting. Managerial Auditing Journal 18(8), 657-665 (2003)
    • (2003) Managerial Auditing Journal , vol.18 , Issue.8 , pp. 657-665
    • Lin, J.1    Hwang, M.2    Becker, J.A.3
  • 26
    • 33845242735 scopus 로고    scopus 로고
    • Evolutionary, my dear Watson: Investigating Committee-based Evolution of Fuzzy Rules for the Detection of Suspicious Insurance Claims
    • Bentley, P.: Evolutionary, my dear Watson: Investigating Committee-based Evolution of Fuzzy Rules for the Detection of Suspicious Insurance Claims. In: Proc. of GECCO (2000)
    • (2000) Proc. of GECCO
    • Bentley, P.1
  • 27
  • 28
    • 3543125360 scopus 로고    scopus 로고
    • On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms
    • Yamanishi, K., Takeuchi, J., Williams, G., Milne, P.: On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms. Data Mining and Knowledge Discovery 8, 275-300 (2004)
    • (2004) Data Mining and Knowledge Discovery , vol.8 , pp. 275-300
    • Yamanishi, K.1    Takeuchi, J.2    Williams, G.3    Milne, P.4
  • 30
    • 66049119431 scopus 로고    scopus 로고
    • Duplicate Detection in Click Streams
    • World Wide Web Conf, 1999
    • Metwally, A., Agrawal, D., Abbadi, A.E.: Duplicate Detection in Click Streams. In: Proc. of Int'l. World Wide Web Conf. (1999)
    • Proc. of Int'l
    • Metwally, A.1    Agrawal, D.2    Abbadi, A.E.3
  • 33
    • 66049125818 scopus 로고
    • Discovery of Fraud Rules for Telecommunications Challenges and Solutions
    • Rosset, S., Murad, U., Neumann, E., Idan, Y., Pinkas, G.: Discovery of Fraud Rules for Telecommunications Challenges and Solutions. In: Proc. of KDD 1990 (1999)
    • (1990) Proc. of KDD
    • Rosset, S.1    Murad, U.2    Neumann, E.3    Idan, Y.4    Pinkas, G.5
  • 35
    • 2942598504 scopus 로고    scopus 로고
    • Variable Selection in Data Mining: Building a Predictive Model for Bankruptcy
    • Foster, D., Stine, R.: Variable Selection in Data Mining: Building a Predictive Model for Bankruptcy. Journal of American Statistical Association 99, 303-313 (2004)
    • (2004) Journal of American Statistical Association , vol.99 , pp. 303-313
    • Foster, D.1    Stine, R.2
  • 36
    • 84958540312 scopus 로고    scopus 로고
    • Cortes, C., Pregibon, D., Volinsky, C.: Communities of interest. In: Hoffmann, F., Adams, N., Fisher, D., Guimarães, G., Hand, D.J. (eds.) IDA 2001. LNCS, 2189, p. 105. Springer, Heidelberg (2001)
    • Cortes, C., Pregibon, D., Volinsky, C.: Communities of interest. In: Hoffmann, F., Adams, N., Fisher, D., Guimarães, G., Hand, D.J. (eds.) IDA 2001. LNCS, vol. 2189, p. 105. Springer, Heidelberg (2001)
  • 37
  • 41
    • 66049142053 scopus 로고    scopus 로고
    • Kumar, S., Spafford, E.H.: An application of pattern matching in intrusion detection. The COAST Project, Department of Computer Sciences, Purdue University, West Lafayette, IN, USA, Technical Report CSD-TR-94-013, June 17 (1994)
    • Kumar, S., Spafford, E.H.: An application of pattern matching in intrusion detection. The COAST Project, Department of Computer Sciences, Purdue University, West Lafayette, IN, USA, Technical Report CSD-TR-94-013, June 17 (1994)
  • 42
    • 66049110012 scopus 로고    scopus 로고
    • Phua, C., Gayler, R., Lee, V., Smith-Miles, K.: On the Communal Analysis Suspicion Scoring for Identity Crime in Streaming Credit Applications. European J. of Operational Research (2006)
    • Phua, C., Gayler, R., Lee, V., Smith-Miles, K.: On the Communal Analysis Suspicion Scoring for Identity Crime in Streaming Credit Applications. European J. of Operational Research (2006)
  • 49
    • 0002656796 scopus 로고    scopus 로고
    • Activity Monitoring: Noticing Interesting Changes in Behaviour
    • Fawcett, T., Provost, F.: Activity Monitoring: Noticing Interesting Changes in Behaviour. In: Proc. of SIGKDD 1999, pp. 53-62 (1999)
    • (1999) Proc. of SIGKDD , pp. 53-62
    • Fawcett, T.1    Provost, F.2
  • 51
    • 0242540464 scopus 로고    scopus 로고
    • Bursty and Hierarchical Structure in Streams
    • Kleinberg, J.: Bursty and Hierarchical Structure in Streams. In: Proc. of SIGKDD 2002, pp. 91-101 (2002)
    • (2002) Proc. of SIGKDD , pp. 91-101
    • Kleinberg, J.1
  • 52
    • 34548087674 scopus 로고    scopus 로고
    • Temporal Dynamics of On-Line Information Streams
    • Garofalakis, M, Gehrke, J, Rastogi, R, eds, Springer, Heidelberg
    • Kleinberg, J.: Temporal Dynamics of On-Line Information Streams. In: Garofalakis, M., Gehrke, J., Rastogi, R. (eds.) Data Stream Management: Processing High-Speed Data Streams. Springer, Heidelberg (2005)
    • (2005) Data Stream Management: Processing High-Speed Data Streams
    • Kleinberg, J.1
  • 54
    • 77954436325 scopus 로고    scopus 로고
    • STREAM: The Stanford Stream Data Manager Demonstration Description-Short Overview of System Status and Plans
    • Arasu, A., et al.: STREAM: The Stanford Stream Data Manager Demonstration Description-Short Overview of System Status and Plans. In: Proc. of SIGMOD 2003 (2003)
    • (2003) Proc. of SIGMOD
    • Arasu, A.1
  • 55
    • 10644281455 scopus 로고    scopus 로고
    • Retrospective on Aurora
    • Balakrishnan, H., et al.: Retrospective on Aurora. VLDB Journal 13(4), 370-383 (2004)
    • (2004) VLDB Journal , vol.13 , Issue.4 , pp. 370-383
    • Balakrishnan, H.1
  • 56
    • 33745803865 scopus 로고    scopus 로고
    • Phua, C., Gayler, R., Lee, V., Smith, K.: Temporal representation in spike detection of sparse personal identity streams. In: Chen, H., Wang, F.-Y., Yang, C.C., Zeng, D., Chau, M., Chang, K. (eds.) WISI 2006. LNCS, 3917, pp. 115-126. Springer, Heidelberg (2006)
    • Phua, C., Gayler, R., Lee, V., Smith, K.: Temporal representation in spike detection of sparse personal identity streams. In: Chen, H., Wang, F.-Y., Yang, C.C., Zeng, D., Chau, M., Chang, K. (eds.) WISI 2006. LNCS, vol. 3917, pp. 115-126. Springer, Heidelberg (2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.