메뉴 건너뛰기




Volumn 28, Issue 6, 2009, Pages 381-394

A survey of signature based methods for financial fraud detection

Author keywords

Account signatures; Behaviour scoring; Fraud detection; Fraud management; Identity theft; User profiling

Indexed keywords

ACCOUNT SIGNATURES; BEHAVIOUR SCORING; FRAUD DETECTION; FRAUD MANAGEMENT; IDENTITY THEFT; USER PROFILING;

EID: 67649739099     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2009.02.001     Document Type: Article
Times cited : (52)

References (50)
  • 1
    • 67649794232 scopus 로고    scopus 로고
    • Actimize Inc (2008). www.actimize.com/
    • (2008)
    • Actimize Inc1
  • 2
    • 0030652931 scopus 로고    scopus 로고
    • CARDWATCH: A neural network based database mining system for credit card fraud detection
    • Aleskerov E, Freisleben B, Rao B. CARDWATCH: a neural network based database mining system for credit card fraud detection. In: Proceedings of the IEEE/IAFE; 1997. p. 220-226.
    • (1997) Proceedings of the IEEE/IAFE , pp. 220-226
    • Aleskerov, E.1    Freisleben, B.2    Rao, B.3
  • 5
    • 67649767437 scopus 로고    scopus 로고
    • BBC News
    • (2005). http://news.bbc.co.uk/1/hi/england/kent/4332504.stm BBC News
    • (2005)
  • 6
    • 67649769668 scopus 로고    scopus 로고
    • BBC News
    • (2006). http://news.bbc.co.uk/1/hi/england/essex/4714164.stm BBC News
    • (2006)
  • 7
    • 0142183967 scopus 로고    scopus 로고
    • One-time passwords: security analysis using BAN logic and integrating with smartcard authentication
    • Bicakci K., and Baykal N. One-time passwords: security analysis using BAN logic and integrating with smartcard authentication. ISCIS vol. 2869 (2003) 794-801
    • (2003) ISCIS , vol.2869 , pp. 794-801
    • Bicakci, K.1    Baykal, N.2
  • 8
    • 23044520423 scopus 로고    scopus 로고
    • Neural fraud detection in mobile phone operations
    • Boukerche Azzedine, Notare MSMA. Neural fraud detection in mobile phone operations. In: IPDPS Workshops, vol. 1800; 2000. p. 636-644.
    • (2000) IPDPS Workshops , vol.1800 , pp. 636-644
    • Azzedine, B.1    Notare, M.S.M.A.2
  • 9
    • 0033344304 scopus 로고    scopus 로고
    • BrauseR, Langsdorf T, Hepp M. Neural data mining for credit card fraud detection. In: ICTAI; 1999. p. 103-106.
    • BrauseR, Langsdorf T, Hepp M. Neural data mining for credit card fraud detection. In: ICTAI; 1999. p. 103-106.
  • 10
    • 67649830774 scopus 로고    scopus 로고
    • Detecting fraud in the real world. Technical report, Bell Labs, Lucent Technologies;
    • Cahill M, Lambert D, Pinheiro J, Sun D. Detecting fraud in the real world. Technical report, Bell Labs, Lucent Technologies; 2000.
    • (2000)
    • Cahill, M.1    Lambert, D.2    Pinheiro, J.3    Sun, D.4
  • 12
    • 67649798525 scopus 로고    scopus 로고
    • Coral 8 Inc (2008). www.coral8.com/
    • (2008)
    • Coral 8 Inc1
  • 16
    • 4544253771 scopus 로고    scopus 로고
    • From processes to policies - concepts for large scale policy generation
    • IEEE/IFIP
    • Danciu VA, Kempter B. From processes to policies - concepts for large scale policy generation. In: Network operations and management symposium, 2004. NOMS 2004. IEEE/IFIP, vol. 1; 2004. p. 17-30.
    • (2004) Network operations and management symposium, 2004. NOMS , vol.1 , pp. 17-30
    • Danciu, V.A.1    Kempter, B.2
  • 17
    • 51749092463 scopus 로고    scopus 로고
    • Generalized policy model for application and service management
    • Bristol, UK;
    • Dekhil M, Machiraju V, Wurster K, Griss M. Generalized policy model for application and service management. In: Policy Workshop, Bristol, UK; 1999.
    • (1999) Policy Workshop
    • Dekhil, M.1    Machiraju, V.2    Wurster, K.3    Griss, M.4
  • 18
    • 67649794226 scopus 로고    scopus 로고
    • Expressing signature based policies for proactive fraud management in FFML
    • submitted for publication
    • Edge ME, Sampaio PRF. Expressing signature based policies for proactive fraud management in FFML, submitted for publication.
    • Edge, M.E.1    Sampaio, P.R.F.2
  • 21
    • 67649798520 scopus 로고    scopus 로고
    • Entrust (2008). www.entrust.com
    • (2008)
    • Entrust1
  • 22
    • 67649781137 scopus 로고    scopus 로고
    • The evolving threat of card skimming
    • White Paper
    • The evolving threat of card skimming. Fair Isaac (2005) White Paper
    • (2005) Fair Isaac
  • 26
    • 0027986244 scopus 로고
    • Ghosh S., and Reilly D.L. (Eds), IEEE Computer Society Press
    • In: Ghosh S., and Reilly D.L. (Eds). Credit card fraud detection with a neural-network vol. 3 (1994), IEEE Computer Society Press 621-630
    • (1994) Credit card fraud detection with a neural-network , vol.3 , pp. 621-630
  • 27
    • 33749825000 scopus 로고    scopus 로고
    • Testing the fraud detection ability of different user profiles by means of FF-NN classifiers
    • Athens;
    • Hilas CS, Sahalos JN. Testing the fraud detection ability of different user profiles by means of FF-NN classifiers. In: ICANN, Athens; 2006. pp. 872-883.
    • (2006) ICANN , pp. 872-883
    • Hilas, C.S.1    Sahalos, J.N.2
  • 28
    • 26844514586 scopus 로고    scopus 로고
    • Using a clustering genetic algorithm to support customer segmentation for personalized recommender systems
    • Kim K.-j., and Ahn H. Using a clustering genetic algorithm to support customer segmentation for personalized recommender systems. Artificial Intelligence and Simulation (2005) 409-415
    • (2005) Artificial Intelligence and Simulation , pp. 409-415
    • Kim, K.-j.1    Ahn, H.2
  • 30
    • 33644780887 scopus 로고    scopus 로고
    • Customer segmentation and strategy development based on customer lifetime value: a case study
    • Kim S.-Y., Jung T.-S., Suh E.-H., and Hwang H.-S. Customer segmentation and strategy development based on customer lifetime value: a case study. Expert Systems with Applications 31 (2006) 101-107
    • (2006) Expert Systems with Applications , vol.31 , pp. 101-107
    • Kim, S.-Y.1    Jung, T.-S.2    Suh, E.-H.3    Hwang, H.-S.4
  • 34
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • Lunt T.F. A survey of intrusion detection techniques. Computer Security 12 (1993) 405-418
    • (1993) Computer Security , vol.12 , pp. 405-418
    • Lunt, T.F.1
  • 36
    • 67649794219 scopus 로고    scopus 로고
    • Combating eFraud - a next generation approach
    • White Paper
    • Massey K. Combating eFraud - a next generation approach. Financial Insights (2005) White Paper
    • (2005) Financial Insights
    • Massey, K.1
  • 41
    • 67649826714 scopus 로고    scopus 로고
    • Protecting against phishing by implementing strong two-factor authentication
    • White Paper
    • Protecting against phishing by implementing strong two-factor authentication. RSA Security (2004) White Paper
    • (2004) RSA Security
  • 43
    • 0036863466 scopus 로고    scopus 로고
    • Data mining techniques for customer relationship management
    • Rygielski C., Wang J.-C., and Yen D.C. Data mining techniques for customer relationship management. Technology in Society 24 (2002) 483-502
    • (2002) Technology in Society , vol.24 , pp. 483-502
    • Rygielski, C.1    Wang, J.-C.2    Yen, D.C.3
  • 45
    • 67649783899 scopus 로고    scopus 로고
    • StreamBase (2008). www.streambase.co.uk
    • (2008)
    • StreamBase1
  • 46
    • 67649830750 scopus 로고    scopus 로고
    • University of Cambridge
    • www.cl.cam.ac.uk/research/security/projects/banking/ University of Cambridge, 2007.
    • (2007)
  • 47
    • 24144501096 scopus 로고    scopus 로고
    • Auto claim fraud detection using Bayesian learning neural networks
    • Viaene S., Dedene G., and Derrig R.A. Auto claim fraud detection using Bayesian learning neural networks. Expert Systems with Applications 29 (2005) 653-666
    • (2005) Expert Systems with Applications , vol.29 , pp. 653-666
    • Viaene, S.1    Dedene, G.2    Derrig, R.A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.