메뉴 건너뛰기




Volumn 36, Issue 9, 2009, Pages 11559-11569

Designing an expert system for fraud detection in private telecommunications networks

Author keywords

Data mining applications; Expert systems; Fraud detection; Telecommunications; User modeling

Indexed keywords

DATA MINING APPLICATIONS; DATA MINING TECHNIQUES; EXPERT KNOWLEDGE; FRAUD DETECTION; FRAUDSTER; LARGE ORGANIZATIONS; LEGITIMATE USERS; NETWORK ADMINISTRATOR; REAL WORLD DATA; TELECOM; TELECOM PROVIDERS; USER MODELING;

EID: 67349097789     PISSN: 09574174     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.eswa.2009.03.031     Document Type: Article
Times cited : (58)

References (24)
  • 1
    • 0002704048 scopus 로고    scopus 로고
    • User profiling in personalization applications through rule discovery and validation
    • San Diego, CA, USA, pp
    • Adomavicius, G., & Tuzhilin, A. (1999). User profiling in personalization applications through rule discovery and validation. ACM KDD-99, San Diego, CA, USA, pp. 377-381.
    • (1999) ACM KDD-99 , pp. 377-381
    • Adomavicius, G.1    Tuzhilin, A.2
  • 2
    • 85053540967 scopus 로고    scopus 로고
    • Discovering telecom fraud situations through mining anomalous behavior patterns
    • Philadelphia, USA
    • Alves, R. et al. (2006). Discovering telecom fraud situations through mining anomalous behavior patterns. In KDD 2006 workshop on data mining for business applications, Philadelphia, USA.
    • (2006) KDD 2006 workshop on data mining for business applications
    • Alves, R.1
  • 5
    • 33646142056 scopus 로고    scopus 로고
    • Subscription fraud prevention in telecommunications using fuzzy rules and neural networks
    • Estevez P.A., Held C.M., and Perez C.A. Subscription fraud prevention in telecommunications using fuzzy rules and neural networks. Expert Systems with Applications 31 (2006) 337-344
    • (2006) Expert Systems with Applications , vol.31 , pp. 337-344
    • Estevez, P.A.1    Held, C.M.2    Perez, C.A.3
  • 7
    • 33749853906 scopus 로고    scopus 로고
    • Classification detection and prosecution of fraud in mobile networks
    • Sorrento, Italy
    • Gosset, P., & Hyland, M. (1999). Classification detection and prosecution of fraud in mobile networks. In Proceedings of ACTS mobile summit, Sorrento, Italy.
    • (1999) Proceedings of ACTS mobile summit
    • Gosset, P.1    Hyland, M.2
  • 8
    • 67349218108 scopus 로고    scopus 로고
    • Greek Law 2472/1997. Protection of individuals with regard to the processing of personal data. Hellenic Data Protection Authority site [Accessed on 25.5.2008].
    • Greek Law 2472/1997. Protection of individuals with regard to the processing of personal data. Hellenic Data Protection Authority site [Accessed on 25.5.2008].
  • 10
    • 33646534830 scopus 로고    scopus 로고
    • Seasonal decomposition and forecasting of telecommunication data: A comparative case study
    • Hilas C.S., Goudos S.K., and Sahalos J.N. Seasonal decomposition and forecasting of telecommunication data: A comparative case study. Technological Forecasting and Social Change 73 5 (2006) 495-509
    • (2006) Technological Forecasting and Social Change , vol.73 , Issue.5 , pp. 495-509
    • Hilas, C.S.1    Goudos, S.K.2    Sahalos, J.N.3
  • 11
    • 33749825000 scopus 로고    scopus 로고
    • Testing the fraud detection ability of different user profiles by means of FF-NN classifiers
    • Kollias S., et al. (Ed), Springer-Verlag, Berlin, Heidelberg
    • Hilas C.S., and Sahalos J. Testing the fraud detection ability of different user profiles by means of FF-NN classifiers. In: Kollias S., et al. (Ed). ICANN 2006, Part II, NCS 4132 (2006), Springer-Verlag, Berlin, Heidelberg 872-883
    • (2006) ICANN 2006, Part II, NCS 4132 , pp. 872-883
    • Hilas, C.S.1    Sahalos, J.2
  • 12
    • 38049092517 scopus 로고    scopus 로고
    • An application of decision trees for rule extraction towards telecommunications fraud detection
    • B. Apolloni et al, Eds, KES 2007/ WIRN 2007, Part II, pp, Berlin, Heidelberg: Springer-Verlag
    • Hilas, C. S., & Sahalos, J. N. (2007). An application of decision trees for rule extraction towards telecommunications fraud detection. In B. Apolloni et al. (Eds.), KES 2007/ WIRN 2007, Lecture Notes in Artificial Intelligence (Vol. 4693(Part II), pp. 1112-1121). Berlin, Heidelberg: Springer-Verlag.
    • (2007) Lecture Notes in Artificial Intelligence , vol.4693 , pp. 1112-1121
    • Hilas, C.S.1    Sahalos, J.N.2
  • 13
    • 67349152033 scopus 로고    scopus 로고
    • Call Record Analysis. Making Life Easier - Network Design and Management Tools (Digest No: 1996/217)
    • Hinde, S. F. (1996). Call Record Analysis. Making Life Easier - Network Design and Management Tools (Digest No: 1996/217), IEE Colloquium on, 8/1-8/4.
    • (1996) IEE Colloquium on, 8/1-8/4
    • Hinde, S.F.1
  • 15
    • 0039952569 scopus 로고
    • An expert system application for network intrusion detection
    • National Institute of Standards and Technology/National Computer Security Center, Washington, DC
    • Jackson K.A., DuBois D.H., and Stallings C.A. An expert system application for network intrusion detection. 14th National computer security conference (1991), National Institute of Standards and Technology/National Computer Security Center, Washington, DC 215-225
    • (1991) 14th National computer security conference , pp. 215-225
    • Jackson, K.A.1    DuBois, D.H.2    Stallings, C.A.3
  • 16
  • 17
    • 9244222193 scopus 로고    scopus 로고
    • Expert system methodologies and applications - A decade review from 1995 to 2004
    • Liao S.H. Expert system methodologies and applications - A decade review from 1995 to 2004. Expert Systems with Applications 28 (2005) 93-103
    • (2005) Expert Systems with Applications , vol.28 , pp. 93-103
    • Liao, S.H.1
  • 20
    • 2942645420 scopus 로고
    • Expert systems in intrusion detection: A case study
    • National Institute of Standards and Technology/National Computer Security Center, Baltimore, MD
    • Sebring M.M., Shellhouse E., Hanna M.E., and Whitehurst R.A. Expert systems in intrusion detection: A case study. 11th National computer security conference (1988), National Institute of Standards and Technology/National Computer Security Center, Baltimore, MD 74-81
    • (1988) 11th National computer security conference , pp. 74-81
    • Sebring, M.M.1    Shellhouse, E.2    Hanna, M.E.3    Whitehurst, R.A.4
  • 23
    • 0036696364 scopus 로고    scopus 로고
    • Turning telecommunications call details to churn prediction: A data mining approach
    • Wei C.-P., and Chiu I.-T. Turning telecommunications call details to churn prediction: A data mining approach. Expert Systems with Applications 23 (2002) 103-112
    • (2002) Expert Systems with Applications , vol.23 , pp. 103-112
    • Wei, C.-P.1    Chiu, I.-T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.