-
2
-
-
0042421807
-
Unsupervised profiling methods for fraud detection
-
R. Bolton and D. Hand, "Unsupervised Profiling Methods for Fraud Detection" Statistical Science, vol. 17, no. 3, pp. 235-255, 2001.
-
(2001)
Statistical Science
, vol.17
, Issue.3
, pp. 235-255
-
-
Bolton, R.1
Hand, D.2
-
3
-
-
1842503447
-
Fraud classification using principal component analysis of RIDITs
-
DOI 10.1111/1539-6975.00027
-
P. Brockett, R. Derrig, L. Golden, A. Levine, and M. Alpert, "Fraud Classification Using Principal Component Analysis of RIDITs" The J. Risk and Insurance, vol. 69, no. 3, pp. 341-371, 2002, doi: 10.1111/1539-6975.00027. (Pubitemid 40830724)
-
(2002)
Journal of Risk and Insurance
, vol.69
, Issue.3
, pp. 341-371
-
-
Brockett, P.L.1
Derrig, R.A.2
Golden, L.L.3
Levine, A.4
Alpert, M.5
-
5
-
-
33846428121
-
Quality and complexity measures for data linkage and deduplication
-
F. Guillet and H. Hamilton, eds., Springer, doi: 10.1007/978-3-540-44918- 8
-
P. Christen and K. Goiser, "Quality and Complexity Measures for Data Linkage and Deduplication" Quality Measures in Data Mining, F. Guillet and H. Hamilton, eds., vol. 43, Springer, 2007, doi: 10.1007/978-3-540-44918-8.
-
(2007)
Quality Measures in Data Mining
, vol.43
-
-
Christen, P.1
Goiser, K.2
-
6
-
-
0742306282
-
Computational methods for dynamic graphs
-
DOI 10.1198/1061860032742, Statistical Analysis of Massive Data Streams
-
C. Cortes, D. Pregibon, and C. Volinsky, "Computational Methods for Dynamic Graphs" J. Computational and Graphical Statistics, vol. 12, no. 4, pp. 950-970, 2003, doi: 10.1198/1061860032742. (Pubitemid 38148598)
-
(2003)
Journal of Computational and Graphical Statistics
, vol.12
, Issue.4
, pp. 950-970
-
-
Cortes, C.1
Pregibon, D.2
Volinsky, C.3
-
8
-
-
33646023117
-
An introduction to roc analysis
-
doi: 10.1016/j.patrec. 2005.10.010
-
T. Fawcett, "An Introduction to ROC Analysis" Pattern Recognition Letters, vol. 27, pp. 861-874, 2006, doi: 10.1016/j.patrec. 2005.10.010.
-
(2006)
Pattern Recognition Letters
, vol.27
, pp. 861-874
-
-
Fawcett, T.1
-
9
-
-
0037117586
-
Early statistical detection of anthrax outbreaks by tracking over-the-counter medication sales
-
DOI 10.1073/pnas.042117499
-
A. Goldenberg, G. Shmueli, R. Caruana, and S. Fienberg, "Early Statistical Detection of Anthrax Outbreaks by Tracking Over-the-Counter Medication Sales" Proc. Nat'l Academy of Sciences USA (PNAS '02), vol. 99, no. 8, pp. 5237-5240, 2002. (Pubitemid 34411532)
-
(2002)
Proceedings of the National Academy of Sciences of the United States of America
, vol.99
, Issue.8
, pp. 5237-5240
-
-
Goldenberg, A.1
Shmueli, G.2
Caruana, R.A.3
Fienberg, S.E.4
-
10
-
-
70349274744
-
Identity fraud trends and patterns: Building a data-based foundation for proactive enforcement
-
G. Gordon, D. Rebovich, K. Choo, and J. Gordon, "Identity Fraud Trends and Patterns: Building a Data-Based Foundation for Proactive Enforcement" Center for Identity Management and Information Protection, Utica College, 2007.
-
(2007)
Center for Identity Management and Information Protection, Utica College
-
-
Gordon, G.1
Rebovich, D.2
Choo, K.3
Gordon, J.4
-
11
-
-
33745886270
-
Classifier technology and the illusion of progress
-
DOI 10.1214/088342306000000060
-
D. Hand, "Classifier Technology and the Illusion of Progress" Statistical Science, vol. 21, no. 1, pp. 1-15, 2006, doi: 10.1214/ 088342306000000060. (Pubitemid 44046906)
-
(2006)
Statistical Science
, vol.21
, Issue.1
, pp. 1-14
-
-
Hand, D.J.1
-
12
-
-
84856468662
-
Biometrics gets in the picture
-
Aug.-Sept.
-
B. Head, "Biometrics Gets in the Picture" Information Age, pp. 10-11, Aug.-Sept. 2006.
-
(2006)
Information Age
, pp. 10-11
-
-
Head, B.1
-
13
-
-
0141722717
-
The bioterrorism preparedness and response early aberration reporting system (ears)
-
L. Hutwagner, W. Thompson, G. Seeman, and T. Treadwell, "The Bioterrorism Preparedness and Response Early Aberration Reporting System (EARS)" J. Urban Health, vol. 80, pp. 89-96, 2006.
-
(2006)
J. Urban Health
, vol.80
, pp. 89-96
-
-
Hutwagner, L.1
Thompson, W.2
Seeman, G.3
Treadwell, T.4
-
15
-
-
33947205080
-
A simulation study comparing aberration detection algorithms for syndromic surveillance
-
DOI 10.1186/1472-6947-7-6
-
M. Jackson, A. Baer, I. Painter, and J. Duchin, "A Simulation Study Comparing Aberration Detection Algorithms for Syndromic Surveillance" BMC Medical Informatics and Decision Making, vol. 7, no. 6, 2007, doi: 10.1186/1472-6947-7-6. (Pubitemid 46426295)
-
(2007)
BMC Medical Informatics and Decision Making
, vol.7
, pp. 6
-
-
Jackson, M.L.1
Baer, A.2
Painter, I.3
Duchin, J.4
-
16
-
-
84856435466
-
Non-obvious relationship awareness (nora)
-
J. Jonas, "Non-Obvious Relationship Awareness (NORA)" Proc. Identity Mashup, 2006.
-
(2006)
Proc. Identity Mashup
-
-
Jonas, J.1
-
17
-
-
56749163236
-
A privacy-preserving framework for integrating person-specific databases
-
doi: 10.1007/978-3-540-87471-3-25
-
M. Kantarcioglu, W. Jiang, and B. Malin, "A Privacy-Preserving Framework for Integrating Person-Specific Databases" Proc. UNESCO Chair in Data Privacy Int'l Conf. Privacy in Statistical Databases (PSD '08), pp. 298-314, 2008, doi: 10.1007/978-3-540-87471-3-25.
-
(2008)
Proc. UNESCO Chair in Data Privacy Int'l Conf. Privacy in Statistical Databases (PSD '08)
, pp. 298-314
-
-
Kantarcioglu, M.1
Jiang, W.2
Malin, B.3
-
18
-
-
34548087674
-
Temporal dynamics of on-line information streams
-
M. Garofalakis, J. Gehrke, and R. Rastogi, eds., Springer
-
J. Kleinberg, "Temporal Dynamics of On-Line Information Streams" Data Stream Management: Processing High-Speed Data Streams, M. Garofalakis, J. Gehrke, and R. Rastogi, eds., Springer, 2005.
-
(2005)
Data Stream Management: Processing High-Speed Data Streams
-
-
Kleinberg, J.1
-
19
-
-
33745877918
-
A dictionary-based approach to fast and accurate name matching in large law enforcement databases
-
DOI 10.1007/11760146-7, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings
-
O. Kursun, A. Koufakou, B. Chen, M. Georgiopoulos, K. Reynolds, and R. Eaglin, "A Dictionary-Based Approach to Fast and Accurate Name Matching in Large Law Enforcement Databases" Proc. IEEE Int'l Conf. Intelligence and Security Informatics (ISI '06), pp. 72-82, 2006, doi: 10.1007/11760146. (Pubitemid 44045558)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS 3975
, pp. 72-82
-
-
Kursun, O.1
Koufakou, A.2
Chen, B.3
Georgiopoulos, M.4
Reynolds, K.M.5
Eaglin, R.6
-
20
-
-
32344439564
-
Using relational knowledge discovery to prevent securities fraud
-
DOI 10.1145/1081870.1081922, KDD-2005 - Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
J. Neville, O. Simsek, D. Jensen, J. Komoroske, K. Palmer, and H. Goldberg, "Using Relational Knowledge Discovery to Prevent Securities Fraud" Proc. 11th ACM SIGKDD Int'l Conf. Knowledge Discovery in Data Mining (KDD '05), 2005, doi: 10.1145/1081870.1081922. (Pubitemid 43218307)
-
(2005)
Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 449-458
-
-
Neville, J.1
Simsek, O.2
Jensen, D.3
Komoroske, J.4
Palmer, K.5
Goldberg, H.6
-
21
-
-
56249109568
-
Synthetic identity fraud: Unseen identity challenge
-
T. Oscherwitz, "Synthetic Identity Fraud: Unseen Identity Challenge" Bank Security News, vol. 3, p. 7, 2005.
-
(2005)
Bank Security News
, vol.3
, pp. 7
-
-
Oscherwitz, T.1
-
22
-
-
84946637626
-
Control-charts-tests based on geometric moving averages
-
S. Roberts, "Control-Charts-Tests Based on Geometric Moving Averages" Technometrics, vol. 1, pp. 239-250, 1959.
-
(1959)
Technometrics
, vol.1
, pp. 239-250
-
-
Roberts, S.1
-
26
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
DOI 10.1142/S0218488502001648
-
L. Sweeney, "k-Anonymity: A Model for Protecting Privacy" Int'l J. Uncertainty, vol. 10, no. 5, pp. 557-570, 2002. (Pubitemid 35384857)
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
27
-
-
0033705131
-
Multiple algorithms for fraud detection
-
doi: 10.1016/S0950-7051(00)00050-2
-
R. Wheeler and S. Aitken, "Multiple Algorithms for Fraud Detection" Knowledge-Based Systems, vol. 13, no. 3, pp. 93-99, 2000, doi: 10.1016/S0950-7051(00)00050-2.
-
(2000)
Knowledge-Based Systems
, vol.13
, Issue.3
, pp. 93-99
-
-
Wheeler, R.1
Aitken, S.2
-
31
-
-
1942484473
-
Bayesian network anomaly pattern detection for detecting disease outbreaks
-
W. Wong, A. Moore, G. Cooper, and M. Wagner, "Bayesian Network Anomaly Pattern Detection for Detecting Disease Outbreaks" Proc. 20th Int'l Conf. Machine Learning (ICML '03), pp. 808-815, 2003.
-
(2003)
Proc. 20th Int'l Conf. Machine Learning (ICML '03)
, pp. 808-815
-
-
Wong, W.1
Moore, A.2
Cooper, G.3
Wagner, M.4
|