-
1
-
-
77949360833
-
Fraud detection in telecommunications: A historical perspective and lessons learned
-
34, 36, 37
-
Becker, R. A., Volinsky, C., and Wilks, A. R. (2010), "Fraud Detection in Telecommunications: A Historical Perspective and Lessons Learned," Technometrics, 52, 20-33. [34, 36, 37].
-
(2010)
Technometrics
, vol.52
, pp. 20-33
-
-
Becker, R.A.1
Volinsky, C.2
Wilks, A.R.3
-
2
-
-
0041458680
-
Unsupervised profiling methods for fraud detection
-
7, Edinburgh, U.K. September, 37
-
Bolton, R. J., and Hand, D. J. (2001), "Unsupervised Profiling Methods for Fraud Detection," in Conference on Credit Scoring and Credit Control, 7, Edinburgh, U.K., September, 5-7. [37].
-
(2001)
Conference on Credit Scoring and Credit Control
, pp. 5-7
-
-
Bolton, R.J.1
Hand, D.J.2
-
3
-
-
0042421807
-
Statistical fraud detection: A review
-
37
-
(2002)"Statistical Fraud Detection: A Review," Statistical Science, 17, 235-255. [37].
-
(2002)
Statistical Science
, vol.17
, pp. 235-255
-
-
-
4
-
-
77949417260
-
Predicting the amount individuals withdraw at cash machines
-
to appear, 37
-
Brentnall, A., Crowder, M. J., and Hand, D. J. (2009a), "Predicting the Amount Individuals Withdraw at Cash Machines," Statistical Modelling, to appear. [37].
-
(2009)
Statistical Modelling
-
-
Brentnall, A.1
Crowder, M.J.2
Hand, D.J.3
-
5
-
-
77949421034
-
Approximate repeated-measure shrinkage
-
Dept. of Mathematics, London, 37
-
(2009b), "Approximate Repeated-Measure Shrinkage," technical report, Imperial College, Dept. of Mathematics, London. [37].
-
(2009)
Technical Report, Imperial College
-
-
-
6
-
-
33745886270
-
Classifier technology and the illusion of progress
-
(with discussion), 37
-
Hand, D. J. (2006), "Classifier Technology and the Illusion of Progress" (with discussion), Statistical Science, 21, 1-34. [37].
-
(2006)
Statistical Science
, vol.21
, pp. 1-34
-
-
Hand, D.J.1
-
7
-
-
33847359594
-
Deception and dishonesty with data: Fraud in science
-
34
-
(2007)"Deception and Dishonesty With Data: Fraud in Science," Significance, 4 (1), 22-25. [34].
-
(2007)
Significance
, vol.4
, Issue.1
, pp. 22-25
-
-
-
8
-
-
77949394798
-
Estimating the Iceberg: How much fraud is there in the UK?
-
Available at, [35, 36
-
Hand, D. J., and Blunt, G. (2009), "Estimating the Iceberg: How Much Fraud Is There in the UK?" Journal of Financial Transformation, 25, 19-29. Available at http://www.capco.com/?q=content/journal-detail&sid=1094. [35, 36].
-
(2009)
Journal of Financial Transformation
, vol.25
, pp. 19-29
-
-
Hand, D.J.1
Blunt, G.2
-
9
-
-
77949363347
-
Overcoming selectivity bias in evaluating new fraud detection systems for revolving credit operations
-
Dept. of Mathematics, London. [35]
-
Hand, D. J., and Crowder, M. J. (2009), "Overcoming Selectivity Bias in Evaluating New Fraud Detection Systems for Revolving Credit Operations," technical report, Imperial College, Dept. of Mathematics, London. [35].
-
(2009)
Technical Report, Imperial College
-
-
Hand, D.J.1
Crowder, M.J.2
-
10
-
-
44849098361
-
Performance criteria for plastic card fraud detection tools
-
35
-
Hand, D. J., Whitrow, C., Adams, N. M., Juszczak, P., and Weston, D. (2008), "Performance Criteria for Plastic Card Fraud Detection Tools," Journal of the Operational Research Society, 59, 956-962. [35].
-
(2008)
Journal of the Operational Research Society
, vol.59
, pp. 956-962
-
-
Hand, D.J.1
Whitrow, C.2
Adams, N.M.3
Juszczak, P.4
Weston, D.5
-
11
-
-
77949417697
-
Bayesian anomaly detection methods for social networks
-
Dept. of Mathematics, London. 36
-
Heard, N. A., Weston, D. J., Platanioti, K., and Hand, D. J. (2009), "Bayesian Anomaly Detection Methods for Social Networks," technical report, Imperial College, Dept. of Mathematics, London. [36].
-
(2009)
Technical Report, Imperial College
-
-
Heard, N.A.1
Weston, D.J.2
Platanioti, K.3
Hand, D.J.4
-
12
-
-
84972541029
-
A statistical derivation of the significant-digit law
-
37
-
Hill, T. P. (1995), "A Statistical Derivation of the Significant-Digit Law," Statistical Science, 10, 354-363. [37].
-
(1995)
Statistical Science
, vol.10
, pp. 354-363
-
-
Hill, T.P.1
-
13
-
-
7544223741
-
A survey of outlier detection methodologies
-
37
-
Hodge, V. J., and Austin, J. (2004), "A Survey of Outlier Detection Methodologies," Artificial Intelligence Review, 22, 85-126. [37].
-
(2004)
Artificial Intelligence Review
, vol.22
, pp. 85-126
-
-
Hodge, V.J.1
Austin, J.2
-
14
-
-
43349107881
-
-
London: National Economic Research Associates, 35
-
Jones, S., Lewis, D., and Maggs, P. (2000), The Economic Cost of Fraud: A Report for the Home Office and the Serious Fraud Office, London: National Economic Research Associates. [35].
-
(2000)
The Economic Cost of Fraud: A Report for the Home Office and the Serious Fraud Office
-
-
Jones, S.1
Lewis, D.2
Maggs, P.3
-
15
-
-
42749084385
-
Off-the-peg or bespoke classifiers for fraud detection ?
-
35, 37
-
Juszczak, P., Adams, N. M., Hand, D. J., Whitrow, C., andWeston, D. J. (2008), "Off-the-Peg or Bespoke Classifiers for Fraud Detection?" Computational Statistics and Data Analysis, 52, 4521-4532. [35, 37].
-
(2008)
Computational Statistics and Data Analysis
, vol.52
, pp. 4521-4532
-
-
Juszczak, P.1
Adams, N.M.2
Hand, D.J.3
Whitrow, C.4
Weston, D.J.5
-
16
-
-
82155163583
-
Election forensics: Statistical interventions in election controversies
-
Chicago, August 30-September 2, 34
-
Mebane, W. R. Jr. (2007), "Election Forensics: Statistical Interventions in Election Controversies," in Annual Meeting of the American Political Science Association, Chicago, August 30-September 2. [34].
-
(2007)
Annual Meeting of the American Political Science Association
-
-
Mebane Jr., W.R.1
-
17
-
-
0002802290
-
A taxpayer compliance application of Benford's Law
-
37
-
Nigrini, M. J. (1996), "A Taxpayer Compliance Application of Benford's Law," Journal of the American Taxation Association, 18, 72-91. [37].
-
(1996)
Journal of the American Taxation Association
, vol.18
, pp. 72-91
-
-
Nigrini, M.J.1
-
18
-
-
77949342084
-
Statistical methods for fighting financial crimes
-
34
-
Sudjianto, A., Nair, S., Yuan, M., Zhang, A., Kern, D., and Cela-Díaz, F. (2010), "Statistical Methods for Fighting Financial Crimes," Technometrics, 52, 5-19. [34].
-
(2010)
Technometrics
, vol.52
, pp. 5-19
-
-
Sudjianto, A.1
Nair, S.2
Yuan, M.3
Zhang, A.4
Kern, D.5
Cela-Díaz, F.6
-
19
-
-
77949403155
-
Mining information from plastic card transaction streams
-
ed. P. Brito, Berlin: Physica-Verlag, 35
-
Tasoulis, D., Adams, N. M., Weston, D. J., and Hand, D. J. (2008), "Mining Information From Plastic Card Transaction Streams," in Proceedings in Computational Statistics: 18th Symposium (COMPSTAT 2008), Vol. 2, ed. P. Brito, Berlin: Physica-Verlag, pp. 315-322. [35].
-
(2008)
Proceedings in Computational Statistics: 18th Symposium (COMPSTAT 2008)
, vol.2
, pp. 315-322
-
-
Tasoulis, D.1
Adams, N.M.2
Weston, D.J.3
Hand, D.J.4
-
21
-
-
42149180452
-
Plastic card fraud detection using peer group analysis
-
37
-
Weston, D. J., Hand, D. J., Adams, N.M., Juszczak, P., and Whitrow, C. (2008), "Plastic Card Fraud Detection Using Peer Group Analysis," Advances in Data Analysis and Classification, 2 (1), 45-62. [37].
-
(2008)
Advances in Data Analysis and Classification
, vol.2
, Issue.1
, pp. 45-62
-
-
Weston, D.J.1
Hand, D.J.2
Adams, N.M.3
Juszczak, P.4
Whitrow, C.5
-
22
-
-
57849084755
-
Transaction aggregation as a strategy for credit card fraud detection
-
34, 36
-
Whitrow, C., Hand, D. J., Juszczak, P., Weston, D., and Adams, N. M. (2008), "Transaction Aggregation as a Strategy for Credit Card Fraud Detection," Data Mining and Knowledge Discovery, 18, 30-55. [34, 36].
-
(2008)
Data Mining and Knowledge Discovery
, vol.18
, pp. 30-55
-
-
Whitrow, C.1
Hand, D.J.2
Juszczak, P.3
Weston, D.4
Adams, N.M.5
|