-
1
-
-
70350716642
-
A subjective and objective integrated method for fraud detection in financial system
-
Qian Liu, Tong Li, and Weixu, A subjective and objective integrated method for fraud detection in financial system, In Proceedings of Machine Learning and Cybernetics, (2009), 1339-1345.
-
Proceedings of Machine Learning and Cybernetics, (2009)
, pp. 1339-1345
-
-
Liu, Q.1
Li, T.2
Weixu3
-
2
-
-
50149103477
-
Solutionarchitecture for detecting and preventing fraud in real time
-
Rozsnyai, S, Schiefer, J, and Schatten, A, Solutionarchitecture for detecting and preventing fraud in real time, In proceeding of Digital Informatino Management, ICDIM'07, (2007), 152-158.
-
Proceeding of Digital Informatino Management, ICDIM'07, (2007)
, pp. 152-158
-
-
Rozsnyai, S.1
Schiefer, J.2
Schatten, A.3
-
3
-
-
34250709461
-
Fuzzy Ranking of Financial Statements for Fraud detection
-
Wei Chai, Hoogs, B.K., Verschueren, B.T., Fuzzy Ranking of Financial Statements for Fraud detection, In proceeding of International Conference on Fuzzy System, (2006), 152-158.
-
Proceeding of International Conference on Fuzzy System, (2006)
, pp. 152-158
-
-
Wei, C.1
Hoogs, B.K.2
Verschueren, B.T.3
-
5
-
-
34047208045
-
Tree Based Behaviour Monitoring for Adaptive Fraud Detection
-
Jianyun Xu, Sung, A.H., Qingzhong Liu, Tree Based Behaviour Monitoring for Adaptive Fraud Detection, In proceeding of International Conference on Pattern Recognition, (2006), 1208-1211.
-
Proceeding of International Conference on Pattern Recognition, (2006)
, pp. 1208-1211
-
-
Xu, J.1
Sung, A.H.2
Liu, Q.3
-
7
-
-
38049064047
-
Data mining techniquesfor the detection of fraudulent financial statements
-
E. Kirkos, C. Spathis, and Y. Manolopoulos, Data mining techniquesfor the detection of fraudulent financial statements, Expert Systems with Applications, (2007), 23: 32.
-
(2007)
Expert Systems with Applications
, vol.23
, pp. 32
-
-
Kirkos, E.1
Spathis, C.2
Manolopoulos, Y.3
-
8
-
-
84986016981
-
Detecting false financial statements using published. data: Some evidence from Greece
-
C. Spathis, Detecting false financial statements using published. data: some evidence from Greece, Managerial Auditing Journal, vol. 17, no.4, (2002), 179-191.
-
(2002)
Managerial Auditing Journal
, vol.17
, Issue.4
, pp. 179-191
-
-
Spathis, C.1
-
11
-
-
51049097496
-
Conserved Self Pattern Recognition Algorithm
-
ICARIS
-
Senhua Yu and Dipankar Dasgupta, Conserved Self Pattern Recognition Algorithm, ICARIS, LNCS 5132, (2008) 279-290
-
(2008)
LNCS
, vol.5132
, pp. 279-290
-
-
Yu, S.1
Dasgupta, D.2
-
12
-
-
0003802343
-
-
Monterey, Calif., U.S.A.: Wadsworth, Inc
-
Breiman, L., J. H. Friedman, R. A. Olshen, and C. J. Stone, Classification and regression trees. Monterey, Calif., U.S.A.: Wadsworth, Inc (1984).
-
(1984)
Classification and Regression Trees
-
-
Breiman, L.1
Friedman, J.H.2
Olshen, R.A.3
Stone, C.J.4
-
13
-
-
85031270527
-
-
Also available on
-
CyberSource, Online Fraud Report. Also available on http://forms. cybersource.com/forms/FraudReport2009NACYBSwww020309 (2009)
-
(2009)
Online Fraud Report
-
-
-
14
-
-
84872315768
-
A synthetic fraud data generation methodology
-
Proceedings of the Fourth ICICS 2002, Singapore, December 9-12,( 2002). Springer-Verlag
-
Emilie Lundin, Hakan Kvarnström and Erland Jonsson. A synthetic fraud data generation methodology. In Proceedings of the Fourth ICICS 2002, Singapore, December 9-12,( 2002). Volume 2513 of LNCS, Springer-Verlag.
-
LNCS
, vol.2513
-
-
Lundin, E.1
Kvarnström, H.2
Jonsson, E.3
-
15
-
-
0027327114
-
How the immune system recognizes invaders
-
Janeway, C. A., How the immune system recognizes invaders, Scientific American, vol. 269, no. 3, (1993), 72-79.
-
(1993)
Scientific American
, vol.269
, Issue.3
, pp. 72-79
-
-
Janeway, C.A.1
-
16
-
-
47849089146
-
Licence Plate Character Recognition Using Artificial Immune Technique
-
th ICCS, Krakow, (2008) Springer-Verlag
-
th ICCS, Krakow, (2008) LNCS, 823-832, Springer-Verlag
-
LNCS
, pp. 823-832
-
-
Huang, R.1
Tawfik, H.2
Nagar, A.3
-
17
-
-
35248825128
-
Danger theory: The link between AIS and IDS
-
ICARIS, Springer-Verlag
-
U. Aickelin, P. Bentley, S. Cayzer, J. Kim, and J. McLeod. Danger theory: The link between AIS and IDS. ICARIS, LNCS 2787, pp.147-155. (2003), Springer-Verlag.
-
(2003)
LNCS
, vol.2787
, pp. 147-155
-
-
Aickelin, U.1
Bentley, P.2
Cayzer, S.3
Kim, J.4
McLeod, J.5
-
21
-
-
33751021110
-
Danger Is Ubiquitous: Detecting Malicous Activities in Sensor Networks Using the Dendritic Cell Algorithm
-
ICARIS
-
Jungwon Kim, Peter Bentley, and Christian Wallenta, Danger Is Ubiquitous: Detecting Malicous Activities in Sensor Networks Using the Dendritic Cell Algorithm, ICARIS, LNCS 4163, (2006) 390-403.
-
(2006)
LNCS
, vol.4163
, pp. 390-403
-
-
Kim, J.1
Bentley, P.2
Wallenta, C.3
-
23
-
-
38349072232
-
The application of a dendritic cell algorithm to a robot ic classifier
-
Proc. of the 6th ICARIS
-
R. Oates, J. Greensmith, U. Aickelin, J. Garibaldi, and G. Kendall, The application of a dendritic cell algorithm to a robot ic classifier. In Proc. of the 6th ICARIS, LNCS 4628, (2007) 204-215.
-
(2007)
LNCS
, vol.4628
, pp. 204-215
-
-
Oates, R.1
Greensmith, J.2
Aickelin, U.3
Garibaldi, J.4
Kendall, G.5
-
24
-
-
77949574827
-
Artificial Dendritic Cells Algorithm for Online Break-in Fraud Detection
-
nd International Conference on Developments in eSystems Engineering, Abu Dhabi, UAE, (2009), 181-189.
-
(2009)
nd International Conference on Developments in ESystems Engineering, Abu Dhabi, UAE
, pp. 181-189
-
-
Huang, R.1
Tawfik, H.2
Nagar, A.3
|