-
1
-
-
0032309517
-
An evaluation of high-end data mining tools for fraud detection
-
D.W. Abott, I.P. Matkovsky, and J.F. Elder An evaluation of high-end data mining tools for fraud detection The proc of IEEE international conference on systems, man, and cybernetics, San Diago, CA 1998
-
(1998)
The Proc of IEEE International Conference on Systems, Man, and Cybernetics, San Diago, CA
-
-
Abott, D.W.1
Matkovsky, I.P.2
Elder, J.F.3
-
2
-
-
60349101266
-
A fraud management system architecture for next generation networks
-
FSI
-
M. Bella, J. Eloff, and M. Olivier A fraud management system architecture for next generation networks Forensic science international vol. 5583 2009 FSI
-
(2009)
Forensic Science International
, vol.5583
-
-
Bella, M.1
Eloff, J.2
Olivier, M.3
-
3
-
-
0042421807
-
Statistical fraud detection: A review
-
R.J. Bolton, and D.J. Hand Statistical fraud detection: a review Statistical Science 17 No 3 2002 235 255
-
(2002)
Statistical Science
, vol.17
, Issue.3
, pp. 235-255
-
-
Bolton, R.J.1
Hand, D.J.2
-
7
-
-
67649739099
-
A survey of signature based methods for financial fraud detection
-
M.E. Edge, and P.R. Falcone Sampaio A survey of signature based methods for financial fraud detection Computers and Security Journal 28 2009 381 394
-
(2009)
Computers and Security Journal
, vol.28
, pp. 381-394
-
-
Edge, M.E.1
Falcone Sampaio, P.R.2
-
11
-
-
0031270196
-
Application of neural networks to detection of medical fraud
-
He H, Wang J, Graco W, Hawkins S. Application of neural networks to detection of medical fraud. Expert Systems Applications 13, pp. 329-336.
-
Expert Systems Applications
, vol.13
, pp. 329-336
-
-
He, H.1
Wang, J.2
Graco, W.3
Hawkins, S.4
-
13
-
-
2542626139
-
-
Dissertation for the degree of Doctor of Science in Technology, Department of Computer Science and Engineering, Helsinki University of Technology, December 2000
-
Hollmen J, User Profiling and Classification for Fraud Detection in Mobile Communications Networks, Dissertation for the degree of Doctor of Science in Technology, Department of Computer Science and Engineering, Helsinki University of Technology, December 2000.
-
User Profiling and Classification for Fraud Detection in Mobile Communications Networks
-
-
Hollmen, J.1
-
15
-
-
80052818141
-
Fraud detection using an adaptive neuro-fuzzy inference system in telecommunication networks
-
Utah, USA 18-24, July
-
M. Sanver, and A. Karahoca Fraud detection using an adaptive neuro-fuzzy inference system in telecommunication networks Proceedings of the 10th joint conference on information science, Utah, USA 18-24, July 2007 1440 1446
-
(2007)
Proceedings of the 10th Joint Conference on Information Science
, pp. 1440-1446
-
-
Sanver, M.1
Karahoca, A.2
-
16
-
-
78049358846
-
A look at VoIP vulnerabilities
-
A.D. Keromytis A look at VoIP vulnerabilities The USENIX Magazine 35 no. 1 2010
-
(2010)
The USENIX Magazine
, vol.35
, Issue.1
-
-
Keromytis, A.D.1
-
18
-
-
2942674608
-
Survey of fraud detection techniques
-
Taipei, Taiwan March 21-23
-
Y. Kou, C.T. Lu, S. Sinvongwattana, and Y. Huang Survey of fraud detection techniques Proc of the 2004 IEEE international conference on networking, sensing and 5 control, Taipei, Taiwan March 21-23, 2004
-
(2004)
Proc of the 2004 IEEE International Conference on Networking, Sensing and 5 Control
-
-
Kou, Y.1
Lu, C.T.2
Sinvongwattana, S.3
Huang, Y.4
-
19
-
-
61349161111
-
Bidirectional artificial neural networks for mobile phone fraud detection
-
A. Krenker, M. Volk, U. Sedlar, J. Bester, and A. Kos Bidirectional artificial neural networks for mobile phone fraud detection ETRI Journal 31 No 1 February 2009
-
(2009)
ETRI Journal
, vol.31
, Issue.1
-
-
Krenker, A.1
Volk, M.2
Sedlar, U.3
Bester, J.4
Kos, A.5
-
20
-
-
0035402096
-
Training a neural network based intrusion detector to recognize novel attacks
-
Part A: Systems and Humans
-
S.C. Lee, and D.V. Heinbuch Training a neural network based intrusion detector to recognize novel attacks Proc of IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans vol. 31 No 4 July 2001
-
(2001)
Proc of IEEE Transactions on Systems, Man, and Cybernetics
, vol.31
, Issue.4
-
-
Lee, S.C.1
Heinbuch, D.V.2
-
24
-
-
84857144968
-
-
link
-
Moreau Y, Preneel B, Burge P, Shawe-Taylor J, Stoermann C, Cooke C. "Novel techniques for fraud detection in mobile telecommunication networks", link: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1. 54.5395.
-
Novel Techniques for Fraud Detection in Mobile Telecommunication Networks
-
-
Moreau, Y.1
Preneel, B.2
Burge, P.3
Shawe-Taylor, J.4
Stoermann, C.5
Cooke, C.6
-
25
-
-
84956863580
-
Unsupervised profiling for identifying superimposed fraud
-
Springer Verlag
-
U. Murad, and G. Pinkas Unsupervised profiling for identifying superimposed fraud Proc of PKDD 99 1999 Springer Verlag 251 261
-
(1999)
Proc of PKDD 99
, pp. 251-261
-
-
Murad, U.1
Pinkas, G.2
-
27
-
-
33744584654
-
Introduction to decision trees
-
J.R. Quinlan Introduction to decision trees Mach Learning 1 1 1986 81 106
-
(1986)
Mach Learning
, vol.1
, Issue.1
, pp. 81-106
-
-
Quinlan, J.R.1
-
29
-
-
0002688690
-
Discovery of fraud rules for telecommunications - Challenges and solutions
-
S. Rosset, U. Murad, E. Neumann, Y. Idan, and G. Pinkas Discovery of fraud rules for telecommunications - challenges and solutions International conference on knowledge discovery and data mining proceedings of the fifth ACM SIGKDD international conference on knowledge discovery and data mining, San Diego, California, United States 1999 409 413
-
(1999)
International Conference on Knowledge Discovery and Data Mining Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Diego, California, United States
, pp. 409-413
-
-
Rosset, S.1
Murad, U.2
Neumann, E.3
Idan, Y.4
Pinkas, G.5
-
32
-
-
84961297619
-
Mining the knowledge mine: The hot spots methodology for mining large real world databases
-
G.J. Williams, and Z. Huang Mining the knowledge mine: The hot spots methodology for mining large real world databases Lec Notes Comp Sci 1342 1997 pp 340-348
-
(1997)
Lec Notes Comp Sci
, vol.1342
, pp. 340-348
-
-
Williams, G.J.1
Huang, Z.2
|