메뉴 건너뛰기




Volumn 1, Issue 1, 2010, Pages 2733-2742

A novel hybrid artificial immune inspired approach for online break-in fraud detection

Author keywords

Artificial immune system; Dendritic cells algorithm; Fraud detection

Indexed keywords

CELLS; CLUSTERING ALGORITHMS; COMPUTATION THEORY; CRIME; DATA MINING; IMMUNE SYSTEM; INFORMATION MANAGEMENT; PATTERN RECOGNITION; RISK MANAGEMENT; VIDEO ON DEMAND;

EID: 78650257269     PISSN: None     EISSN: 18770509     Source Type: Conference Proceeding    
DOI: 10.1016/j.procs.2010.04.307     Document Type: Conference Paper
Times cited : (10)

References (24)
  • 1
    • 70350716642 scopus 로고    scopus 로고
    • A subjective and objective integrated method for fraud detection in financial system
    • Qian Liu, Tong Li, and Weixu, A subjective and objective integrated method for fraud detection in financial system, In Proceedings of Machine Learning and Cybernetics, (2009), 1339-1345.
    • Proceedings of Machine Learning and Cybernetics, (2009) , pp. 1339-1345
    • Liu, Q.1    Li, T.2    Weixu3
  • 7
    • 38049064047 scopus 로고    scopus 로고
    • Data mining techniquesfor the detection of fraudulent financial statements
    • E. Kirkos, C. Spathis, and Y. Manolopoulos, Data mining techniquesfor the detection of fraudulent financial statements, Expert Systems with Applications, (2007), 23: 32.
    • (2007) Expert Systems with Applications , vol.23 , pp. 32
    • Kirkos, E.1    Spathis, C.2    Manolopoulos, Y.3
  • 8
    • 84986016981 scopus 로고    scopus 로고
    • Detecting false financial statements using published. data: Some evidence from Greece
    • C. Spathis, Detecting false financial statements using published. data: some evidence from Greece, Managerial Auditing Journal, vol. 17, no.4, (2002), 179-191.
    • (2002) Managerial Auditing Journal , vol.17 , Issue.4 , pp. 179-191
    • Spathis, C.1
  • 11
    • 51049097496 scopus 로고    scopus 로고
    • Conserved Self Pattern Recognition Algorithm
    • ICARIS
    • Senhua Yu and Dipankar Dasgupta, Conserved Self Pattern Recognition Algorithm, ICARIS, LNCS 5132, (2008) 279-290
    • (2008) LNCS , vol.5132 , pp. 279-290
    • Yu, S.1    Dasgupta, D.2
  • 13
    • 85031270527 scopus 로고    scopus 로고
    • Also available on
    • CyberSource, Online Fraud Report. Also available on http://forms. cybersource.com/forms/FraudReport2009NACYBSwww020309 (2009)
    • (2009) Online Fraud Report
  • 14
    • 84872315768 scopus 로고    scopus 로고
    • A synthetic fraud data generation methodology
    • Proceedings of the Fourth ICICS 2002, Singapore, December 9-12,( 2002). Springer-Verlag
    • Emilie Lundin, Hakan Kvarnström and Erland Jonsson. A synthetic fraud data generation methodology. In Proceedings of the Fourth ICICS 2002, Singapore, December 9-12,( 2002). Volume 2513 of LNCS, Springer-Verlag.
    • LNCS , vol.2513
    • Lundin, E.1    Kvarnström, H.2    Jonsson, E.3
  • 15
    • 0027327114 scopus 로고
    • How the immune system recognizes invaders
    • Janeway, C. A., How the immune system recognizes invaders, Scientific American, vol. 269, no. 3, (1993), 72-79.
    • (1993) Scientific American , vol.269 , Issue.3 , pp. 72-79
    • Janeway, C.A.1
  • 16
    • 47849089146 scopus 로고    scopus 로고
    • Licence Plate Character Recognition Using Artificial Immune Technique
    • th ICCS, Krakow, (2008) Springer-Verlag
    • th ICCS, Krakow, (2008) LNCS, 823-832, Springer-Verlag
    • LNCS , pp. 823-832
    • Huang, R.1    Tawfik, H.2    Nagar, A.3
  • 17
    • 35248825128 scopus 로고    scopus 로고
    • Danger theory: The link between AIS and IDS
    • ICARIS, Springer-Verlag
    • U. Aickelin, P. Bentley, S. Cayzer, J. Kim, and J. McLeod. Danger theory: The link between AIS and IDS. ICARIS, LNCS 2787, pp.147-155. (2003), Springer-Verlag.
    • (2003) LNCS , vol.2787 , pp. 147-155
    • Aickelin, U.1    Bentley, P.2    Cayzer, S.3    Kim, J.4    McLeod, J.5
  • 21
    • 33751021110 scopus 로고    scopus 로고
    • Danger Is Ubiquitous: Detecting Malicous Activities in Sensor Networks Using the Dendritic Cell Algorithm
    • ICARIS
    • Jungwon Kim, Peter Bentley, and Christian Wallenta, Danger Is Ubiquitous: Detecting Malicous Activities in Sensor Networks Using the Dendritic Cell Algorithm, ICARIS, LNCS 4163, (2006) 390-403.
    • (2006) LNCS , vol.4163 , pp. 390-403
    • Kim, J.1    Bentley, P.2    Wallenta, C.3
  • 23
    • 38349072232 scopus 로고    scopus 로고
    • The application of a dendritic cell algorithm to a robot ic classifier
    • Proc. of the 6th ICARIS
    • R. Oates, J. Greensmith, U. Aickelin, J. Garibaldi, and G. Kendall, The application of a dendritic cell algorithm to a robot ic classifier. In Proc. of the 6th ICARIS, LNCS 4628, (2007) 204-215.
    • (2007) LNCS , vol.4628 , pp. 204-215
    • Oates, R.1    Greensmith, J.2    Aickelin, U.3    Garibaldi, J.4    Kendall, G.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.