-
1
-
-
0002704048
-
User profiling in personalization applications through rule discovery and validation
-
San Diego, CA, USA, pp
-
Adomavicius, G., & Tuzhilin, A. (1999). User profiling in personalization applications through rule discovery and validation. ACM KDD-99, San Diego, CA, USA, pp. 377-381.
-
(1999)
ACM KDD-99
, pp. 377-381
-
-
Adomavicius, G.1
Tuzhilin, A.2
-
2
-
-
85053540967
-
Discovering telecom fraud situations through mining anomalous behavior patterns
-
Philadelphia, USA
-
Alves, R. et al. (2006). Discovering telecom fraud situations through mining anomalous behavior patterns. In KDD 2006 workshop on data mining for business applications, Philadelphia, USA.
-
(2006)
KDD 2006 workshop on data mining for business applications
-
-
Alves, R.1
-
5
-
-
33646142056
-
Subscription fraud prevention in telecommunications using fuzzy rules and neural networks
-
Estevez P.A., Held C.M., and Perez C.A. Subscription fraud prevention in telecommunications using fuzzy rules and neural networks. Expert Systems with Applications 31 (2006) 337-344
-
(2006)
Expert Systems with Applications
, vol.31
, pp. 337-344
-
-
Estevez, P.A.1
Held, C.M.2
Perez, C.A.3
-
7
-
-
33749853906
-
Classification detection and prosecution of fraud in mobile networks
-
Sorrento, Italy
-
Gosset, P., & Hyland, M. (1999). Classification detection and prosecution of fraud in mobile networks. In Proceedings of ACTS mobile summit, Sorrento, Italy.
-
(1999)
Proceedings of ACTS mobile summit
-
-
Gosset, P.1
Hyland, M.2
-
8
-
-
67349218108
-
-
Greek Law 2472/1997. Protection of individuals with regard to the processing of personal data. Hellenic Data Protection Authority site [Accessed on 25.5.2008].
-
Greek Law 2472/1997. Protection of individuals with regard to the processing of personal data. Hellenic Data Protection Authority site [Accessed on 25.5.2008].
-
-
-
-
10
-
-
33646534830
-
Seasonal decomposition and forecasting of telecommunication data: A comparative case study
-
Hilas C.S., Goudos S.K., and Sahalos J.N. Seasonal decomposition and forecasting of telecommunication data: A comparative case study. Technological Forecasting and Social Change 73 5 (2006) 495-509
-
(2006)
Technological Forecasting and Social Change
, vol.73
, Issue.5
, pp. 495-509
-
-
Hilas, C.S.1
Goudos, S.K.2
Sahalos, J.N.3
-
11
-
-
33749825000
-
Testing the fraud detection ability of different user profiles by means of FF-NN classifiers
-
Kollias S., et al. (Ed), Springer-Verlag, Berlin, Heidelberg
-
Hilas C.S., and Sahalos J. Testing the fraud detection ability of different user profiles by means of FF-NN classifiers. In: Kollias S., et al. (Ed). ICANN 2006, Part II, NCS 4132 (2006), Springer-Verlag, Berlin, Heidelberg 872-883
-
(2006)
ICANN 2006, Part II, NCS 4132
, pp. 872-883
-
-
Hilas, C.S.1
Sahalos, J.2
-
12
-
-
38049092517
-
An application of decision trees for rule extraction towards telecommunications fraud detection
-
B. Apolloni et al, Eds, KES 2007/ WIRN 2007, Part II, pp, Berlin, Heidelberg: Springer-Verlag
-
Hilas, C. S., & Sahalos, J. N. (2007). An application of decision trees for rule extraction towards telecommunications fraud detection. In B. Apolloni et al. (Eds.), KES 2007/ WIRN 2007, Lecture Notes in Artificial Intelligence (Vol. 4693(Part II), pp. 1112-1121). Berlin, Heidelberg: Springer-Verlag.
-
(2007)
Lecture Notes in Artificial Intelligence
, vol.4693
, pp. 1112-1121
-
-
Hilas, C.S.1
Sahalos, J.N.2
-
13
-
-
67349152033
-
Call Record Analysis. Making Life Easier - Network Design and Management Tools (Digest No: 1996/217)
-
Hinde, S. F. (1996). Call Record Analysis. Making Life Easier - Network Design and Management Tools (Digest No: 1996/217), IEE Colloquium on, 8/1-8/4.
-
(1996)
IEE Colloquium on, 8/1-8/4
-
-
Hinde, S.F.1
-
15
-
-
0039952569
-
An expert system application for network intrusion detection
-
National Institute of Standards and Technology/National Computer Security Center, Washington, DC
-
Jackson K.A., DuBois D.H., and Stallings C.A. An expert system application for network intrusion detection. 14th National computer security conference (1991), National Institute of Standards and Technology/National Computer Security Center, Washington, DC 215-225
-
(1991)
14th National computer security conference
, pp. 215-225
-
-
Jackson, K.A.1
DuBois, D.H.2
Stallings, C.A.3
-
16
-
-
0031383168
-
On atypical database transactions: Identification of probable frauds using machine learning for user profiling
-
Kokinnaki, A. I. (1997). On atypical database transactions: Identification of probable frauds using machine learning for user profiling. In Proceedings of the IEEE knowledge and data engineering exchange workshop, KDEX, pp. 107-113.
-
(1997)
Proceedings of the IEEE knowledge and data engineering exchange workshop, KDEX
, pp. 107-113
-
-
Kokinnaki, A.I.1
-
17
-
-
9244222193
-
Expert system methodologies and applications - A decade review from 1995 to 2004
-
Liao S.H. Expert system methodologies and applications - A decade review from 1995 to 2004. Expert Systems with Applications 28 (2005) 93-103
-
(2005)
Expert Systems with Applications
, vol.28
, pp. 93-103
-
-
Liao, S.H.1
-
19
-
-
0002688690
-
Discovery of fraud rules in telecommunications - Challenges and solutions
-
S. Chaudhuri, D. Madigan Eds, San Diego, CA, USA
-
Rosset, S., Murad, U., Neumann, E., Idan, Y., & Pinkas, G. (1999). Discovery of fraud rules in telecommunications - Challenges and solutions. In S. Chaudhuri, D. Madigan (Eds.), Proceedings of fifth ACM SIGKDD international conference on knowledge discovery and data mining (pp. 409-413). San Diego, CA, USA.
-
(1999)
Proceedings of fifth ACM SIGKDD international conference on knowledge discovery and data mining
, pp. 409-413
-
-
Rosset, S.1
Murad, U.2
Neumann, E.3
Idan, Y.4
Pinkas, G.5
-
20
-
-
2942645420
-
Expert systems in intrusion detection: A case study
-
National Institute of Standards and Technology/National Computer Security Center, Baltimore, MD
-
Sebring M.M., Shellhouse E., Hanna M.E., and Whitehurst R.A. Expert systems in intrusion detection: A case study. 11th National computer security conference (1988), National Institute of Standards and Technology/National Computer Security Center, Baltimore, MD 74-81
-
(1988)
11th National computer security conference
, pp. 74-81
-
-
Sebring, M.M.1
Shellhouse, E.2
Hanna, M.E.3
Whitehurst, R.A.4
-
22
-
-
84892142402
-
Fraud detection in communication networks using neural and probabilistic methods
-
Taniguchi, M., Haft, M., Hollmen, J., & Tresp, V. (1998). Fraud detection in communication networks using neural and probabilistic methods. In Proceedings of the 1998 IEEE international conference in acoustics, speech and signal processing - ICASSP'98, (Vol. II, pp. 1241-1244).
-
(1998)
Proceedings of the 1998 IEEE international conference in acoustics, speech and signal processing - ICASSP'98
, vol.2
, pp. 1241-1244
-
-
Taniguchi, M.1
Haft, M.2
Hollmen, J.3
Tresp, V.4
-
23
-
-
0036696364
-
Turning telecommunications call details to churn prediction: A data mining approach
-
Wei C.-P., and Chiu I.-T. Turning telecommunications call details to churn prediction: A data mining approach. Expert Systems with Applications 23 (2002) 103-112
-
(2002)
Expert Systems with Applications
, vol.23
, pp. 103-112
-
-
Wei, C.-P.1
Chiu, I.-T.2
|