-
1
-
-
67649794232
-
-
Actimize Inc (2008). www.actimize.com/
-
(2008)
-
-
Actimize Inc1
-
2
-
-
0030652931
-
CARDWATCH: A neural network based database mining system for credit card fraud detection
-
Aleskerov E, Freisleben B, Rao B. CARDWATCH: a neural network based database mining system for credit card fraud detection. In: Proceedings of the IEEE/IAFE; 1997. p. 220-226.
-
(1997)
Proceedings of the IEEE/IAFE
, pp. 220-226
-
-
Aleskerov, E.1
Freisleben, B.2
Rao, B.3
-
5
-
-
67649767437
-
-
BBC News
-
(2005). http://news.bbc.co.uk/1/hi/england/kent/4332504.stm BBC News
-
(2005)
-
-
-
6
-
-
67649769668
-
-
BBC News
-
(2006). http://news.bbc.co.uk/1/hi/england/essex/4714164.stm BBC News
-
(2006)
-
-
-
7
-
-
0142183967
-
One-time passwords: security analysis using BAN logic and integrating with smartcard authentication
-
Bicakci K., and Baykal N. One-time passwords: security analysis using BAN logic and integrating with smartcard authentication. ISCIS vol. 2869 (2003) 794-801
-
(2003)
ISCIS
, vol.2869
, pp. 794-801
-
-
Bicakci, K.1
Baykal, N.2
-
8
-
-
23044520423
-
Neural fraud detection in mobile phone operations
-
Boukerche Azzedine, Notare MSMA. Neural fraud detection in mobile phone operations. In: IPDPS Workshops, vol. 1800; 2000. p. 636-644.
-
(2000)
IPDPS Workshops
, vol.1800
, pp. 636-644
-
-
Azzedine, B.1
Notare, M.S.M.A.2
-
9
-
-
0033344304
-
-
BrauseR, Langsdorf T, Hepp M. Neural data mining for credit card fraud detection. In: ICTAI; 1999. p. 103-106.
-
BrauseR, Langsdorf T, Hepp M. Neural data mining for credit card fraud detection. In: ICTAI; 1999. p. 103-106.
-
-
-
-
10
-
-
67649830774
-
-
Detecting fraud in the real world. Technical report, Bell Labs, Lucent Technologies;
-
Cahill M, Lambert D, Pinheiro J, Sun D. Detecting fraud in the real world. Technical report, Bell Labs, Lucent Technologies; 2000.
-
(2000)
-
-
Cahill, M.1
Lambert, D.2
Pinheiro, J.3
Sun, D.4
-
12
-
-
67649798525
-
-
Coral 8 Inc (2008). www.coral8.com/
-
(2008)
-
-
Coral 8 Inc1
-
17
-
-
51749092463
-
Generalized policy model for application and service management
-
Bristol, UK;
-
Dekhil M, Machiraju V, Wurster K, Griss M. Generalized policy model for application and service management. In: Policy Workshop, Bristol, UK; 1999.
-
(1999)
Policy Workshop
-
-
Dekhil, M.1
Machiraju, V.2
Wurster, K.3
Griss, M.4
-
18
-
-
67649794226
-
Expressing signature based policies for proactive fraud management in FFML
-
submitted for publication
-
Edge ME, Sampaio PRF. Expressing signature based policies for proactive fraud management in FFML, submitted for publication.
-
-
-
Edge, M.E.1
Sampaio, P.R.F.2
-
19
-
-
38049067004
-
Towards a proactive fraud management framework for financial data streams
-
Loyola College Graduate Center, Columbia, MD, USA 55-62
-
Edge M.E., Sampaio P.R.F., and Choudhary M. Towards a proactive fraud management framework for financial data streams. The 3rd IEEE international symposium on dependable, autonomic and secure computing (DASC'07) (2007), Loyola College Graduate Center, Columbia, MD, USA 55-62
-
(2007)
The 3rd IEEE international symposium on dependable, autonomic and secure computing (DASC'07)
-
-
Edge, M.E.1
Sampaio, P.R.F.2
Choudhary, M.3
-
20
-
-
51749092209
-
A policy distribution service for proactive fraud management over financial data streams
-
Honolulu, Hawaii, USA;
-
Edge ME, Sampaio PRF, Philpott O, Choudhary M. A policy distribution service for proactive fraud management over financial data streams. In: IEEE international conference on services computing, 2008 (SCC'08), Honolulu, Hawaii, USA; 2008. p. 31-38.
-
(2008)
IEEE international conference on services computing, 2008 (SCC'08)
, pp. 31-38
-
-
Edge, M.E.1
Sampaio, P.R.F.2
Philpott, O.3
Choudhary, M.4
-
21
-
-
67649798520
-
-
Entrust (2008). www.entrust.com
-
(2008)
-
-
Entrust1
-
22
-
-
67649781137
-
The evolving threat of card skimming
-
White Paper
-
The evolving threat of card skimming. Fair Isaac (2005) White Paper
-
(2005)
Fair Isaac
-
-
-
25
-
-
33746450385
-
Establishing fraud detection patterns based on signatures
-
Leipzig, Germany;
-
Ferreira P, Alves R, Belo O, Cortesao L. Establishing fraud detection patterns based on signatures. In: Industrial conference on data mining, Leipzig, Germany; 2006. p. 526-538.
-
(2006)
Industrial conference on data mining
, pp. 526-538
-
-
Ferreira, P.1
Alves, R.2
Belo, O.3
Cortesao, L.4
-
26
-
-
0027986244
-
-
Ghosh S., and Reilly D.L. (Eds), IEEE Computer Society Press
-
In: Ghosh S., and Reilly D.L. (Eds). Credit card fraud detection with a neural-network vol. 3 (1994), IEEE Computer Society Press 621-630
-
(1994)
Credit card fraud detection with a neural-network
, vol.3
, pp. 621-630
-
-
-
27
-
-
33749825000
-
Testing the fraud detection ability of different user profiles by means of FF-NN classifiers
-
Athens;
-
Hilas CS, Sahalos JN. Testing the fraud detection ability of different user profiles by means of FF-NN classifiers. In: ICANN, Athens; 2006. pp. 872-883.
-
(2006)
ICANN
, pp. 872-883
-
-
Hilas, C.S.1
Sahalos, J.N.2
-
28
-
-
26844514586
-
Using a clustering genetic algorithm to support customer segmentation for personalized recommender systems
-
Kim K.-j., and Ahn H. Using a clustering genetic algorithm to support customer segmentation for personalized recommender systems. Artificial Intelligence and Simulation (2005) 409-415
-
(2005)
Artificial Intelligence and Simulation
, pp. 409-415
-
-
Kim, K.-j.1
Ahn, H.2
-
30
-
-
33644780887
-
Customer segmentation and strategy development based on customer lifetime value: a case study
-
Kim S.-Y., Jung T.-S., Suh E.-H., and Hwang H.-S. Customer segmentation and strategy development based on customer lifetime value: a case study. Expert Systems with Applications 31 (2006) 101-107
-
(2006)
Expert Systems with Applications
, vol.31
, pp. 101-107
-
-
Kim, S.-Y.1
Jung, T.-S.2
Suh, E.-H.3
Hwang, H.-S.4
-
31
-
-
2942674608
-
Survey of fraud detection techniques
-
Kou Y, Lu C-T, Sirwongwattana S, Huang Y-P. Survey of fraud detection techniques. In: IEEE International Conference on Networking, Sensing and Control, vol. 2; 2004. p. 749-754.
-
(2004)
IEEE International Conference on Networking, Sensing and Control
, vol.2
, pp. 749-754
-
-
Kou, Y.1
Lu, C.-T.2
Sirwongwattana, S.3
Huang, Y.-P.4
-
34
-
-
0027609384
-
A survey of intrusion detection techniques
-
Lunt T.F. A survey of intrusion detection techniques. Computer Security 12 (1993) 405-418
-
(1993)
Computer Security
, vol.12
, pp. 405-418
-
-
Lunt, T.F.1
-
36
-
-
67649794219
-
Combating eFraud - a next generation approach
-
White Paper
-
Massey K. Combating eFraud - a next generation approach. Financial Insights (2005) White Paper
-
(2005)
Financial Insights
-
-
Massey, K.1
-
41
-
-
67649826714
-
Protecting against phishing by implementing strong two-factor authentication
-
White Paper
-
Protecting against phishing by implementing strong two-factor authentication. RSA Security (2004) White Paper
-
(2004)
RSA Security
-
-
-
43
-
-
0036863466
-
Data mining techniques for customer relationship management
-
Rygielski C., Wang J.-C., and Yen D.C. Data mining techniques for customer relationship management. Technology in Society 24 (2002) 483-502
-
(2002)
Technology in Society
, vol.24
, pp. 483-502
-
-
Rygielski, C.1
Wang, J.-C.2
Yen, D.C.3
-
45
-
-
67649783899
-
-
StreamBase (2008). www.streambase.co.uk
-
(2008)
-
-
StreamBase1
-
46
-
-
67649830750
-
-
University of Cambridge
-
www.cl.cam.ac.uk/research/security/projects/banking/ University of Cambridge, 2007.
-
(2007)
-
-
-
47
-
-
24144501096
-
Auto claim fraud detection using Bayesian learning neural networks
-
Viaene S., Dedene G., and Derrig R.A. Auto claim fraud detection using Bayesian learning neural networks. Expert Systems with Applications 29 (2005) 653-666
-
(2005)
Expert Systems with Applications
, vol.29
, pp. 653-666
-
-
Viaene, S.1
Dedene, G.2
Derrig, R.A.3
|