메뉴 건너뛰기




Volumn 24, Issue 3, 2012, Pages 533-546

Resilient identity crime detection

Author keywords

anomaly detection; Data mining based fraud detection; data stream mining; security

Indexed keywords

ADAPTIVITY; ANOMALY DETECTION; BUSINESS RULES; CREDIT APPLICATION; CREDIT APPLICATION FRAUD DETECTION; CRIME DETECTION; DATA STREAM MINING; DATA SUPPORT; DETECTION SYSTEM; FRAUD DETECTION; MULTI-LAYERED; QUALITY DATA; REAL TIME; SECURITY; SOCIAL RELATIONSHIPS; SPIKE DETECTION; TAMPER RESISTANT;

EID: 84856412670     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2010.262     Document Type: Article
Times cited : (49)

References (31)
  • 2
    • 0042421807 scopus 로고    scopus 로고
    • Unsupervised profiling methods for fraud detection
    • R. Bolton and D. Hand, "Unsupervised Profiling Methods for Fraud Detection" Statistical Science, vol. 17, no. 3, pp. 235-255, 2001.
    • (2001) Statistical Science , vol.17 , Issue.3 , pp. 235-255
    • Bolton, R.1    Hand, D.2
  • 3
    • 1842503447 scopus 로고    scopus 로고
    • Fraud classification using principal component analysis of RIDITs
    • DOI 10.1111/1539-6975.00027
    • P. Brockett, R. Derrig, L. Golden, A. Levine, and M. Alpert, "Fraud Classification Using Principal Component Analysis of RIDITs" The J. Risk and Insurance, vol. 69, no. 3, pp. 341-371, 2002, doi: 10.1111/1539-6975.00027. (Pubitemid 40830724)
    • (2002) Journal of Risk and Insurance , vol.69 , Issue.3 , pp. 341-371
    • Brockett, P.L.1    Derrig, R.A.2    Golden, L.L.3    Levine, A.4    Alpert, M.5
  • 5
    • 33846428121 scopus 로고    scopus 로고
    • Quality and complexity measures for data linkage and deduplication
    • F. Guillet and H. Hamilton, eds., Springer, doi: 10.1007/978-3-540-44918- 8
    • P. Christen and K. Goiser, "Quality and Complexity Measures for Data Linkage and Deduplication" Quality Measures in Data Mining, F. Guillet and H. Hamilton, eds., vol. 43, Springer, 2007, doi: 10.1007/978-3-540-44918-8.
    • (2007) Quality Measures in Data Mining , vol.43
    • Christen, P.1    Goiser, K.2
  • 6
    • 0742306282 scopus 로고    scopus 로고
    • Computational methods for dynamic graphs
    • DOI 10.1198/1061860032742, Statistical Analysis of Massive Data Streams
    • C. Cortes, D. Pregibon, and C. Volinsky, "Computational Methods for Dynamic Graphs" J. Computational and Graphical Statistics, vol. 12, no. 4, pp. 950-970, 2003, doi: 10.1198/1061860032742. (Pubitemid 38148598)
    • (2003) Journal of Computational and Graphical Statistics , vol.12 , Issue.4 , pp. 950-970
    • Cortes, C.1    Pregibon, D.2    Volinsky, C.3
  • 8
    • 33646023117 scopus 로고    scopus 로고
    • An introduction to roc analysis
    • doi: 10.1016/j.patrec. 2005.10.010
    • T. Fawcett, "An Introduction to ROC Analysis" Pattern Recognition Letters, vol. 27, pp. 861-874, 2006, doi: 10.1016/j.patrec. 2005.10.010.
    • (2006) Pattern Recognition Letters , vol.27 , pp. 861-874
    • Fawcett, T.1
  • 11
    • 33745886270 scopus 로고    scopus 로고
    • Classifier technology and the illusion of progress
    • DOI 10.1214/088342306000000060
    • D. Hand, "Classifier Technology and the Illusion of Progress" Statistical Science, vol. 21, no. 1, pp. 1-15, 2006, doi: 10.1214/ 088342306000000060. (Pubitemid 44046906)
    • (2006) Statistical Science , vol.21 , Issue.1 , pp. 1-14
    • Hand, D.J.1
  • 12
    • 84856468662 scopus 로고    scopus 로고
    • Biometrics gets in the picture
    • Aug.-Sept.
    • B. Head, "Biometrics Gets in the Picture" Information Age, pp. 10-11, Aug.-Sept. 2006.
    • (2006) Information Age , pp. 10-11
    • Head, B.1
  • 13
    • 0141722717 scopus 로고    scopus 로고
    • The bioterrorism preparedness and response early aberration reporting system (ears)
    • L. Hutwagner, W. Thompson, G. Seeman, and T. Treadwell, "The Bioterrorism Preparedness and Response Early Aberration Reporting System (EARS)" J. Urban Health, vol. 80, pp. 89-96, 2006.
    • (2006) J. Urban Health , vol.80 , pp. 89-96
    • Hutwagner, L.1    Thompson, W.2    Seeman, G.3    Treadwell, T.4
  • 15
    • 33947205080 scopus 로고    scopus 로고
    • A simulation study comparing aberration detection algorithms for syndromic surveillance
    • DOI 10.1186/1472-6947-7-6
    • M. Jackson, A. Baer, I. Painter, and J. Duchin, "A Simulation Study Comparing Aberration Detection Algorithms for Syndromic Surveillance" BMC Medical Informatics and Decision Making, vol. 7, no. 6, 2007, doi: 10.1186/1472-6947-7-6. (Pubitemid 46426295)
    • (2007) BMC Medical Informatics and Decision Making , vol.7 , pp. 6
    • Jackson, M.L.1    Baer, A.2    Painter, I.3    Duchin, J.4
  • 16
    • 84856435466 scopus 로고    scopus 로고
    • Non-obvious relationship awareness (nora)
    • J. Jonas, "Non-Obvious Relationship Awareness (NORA)" Proc. Identity Mashup, 2006.
    • (2006) Proc. Identity Mashup
    • Jonas, J.1
  • 18
    • 34548087674 scopus 로고    scopus 로고
    • Temporal dynamics of on-line information streams
    • M. Garofalakis, J. Gehrke, and R. Rastogi, eds., Springer
    • J. Kleinberg, "Temporal Dynamics of On-Line Information Streams" Data Stream Management: Processing High-Speed Data Streams, M. Garofalakis, J. Gehrke, and R. Rastogi, eds., Springer, 2005.
    • (2005) Data Stream Management: Processing High-Speed Data Streams
    • Kleinberg, J.1
  • 21
    • 56249109568 scopus 로고    scopus 로고
    • Synthetic identity fraud: Unseen identity challenge
    • T. Oscherwitz, "Synthetic Identity Fraud: Unseen Identity Challenge" Bank Security News, vol. 3, p. 7, 2005.
    • (2005) Bank Security News , vol.3 , pp. 7
    • Oscherwitz, T.1
  • 22
    • 84946637626 scopus 로고
    • Control-charts-tests based on geometric moving averages
    • S. Roberts, "Control-Charts-Tests Based on Geometric Moving Averages" Technometrics, vol. 1, pp. 239-250, 1959.
    • (1959) Technometrics , vol.1 , pp. 239-250
    • Roberts, S.1
  • 27
    • 0033705131 scopus 로고    scopus 로고
    • Multiple algorithms for fraud detection
    • doi: 10.1016/S0950-7051(00)00050-2
    • R. Wheeler and S. Aitken, "Multiple Algorithms for Fraud Detection" Knowledge-Based Systems, vol. 13, no. 3, pp. 93-99, 2000, doi: 10.1016/S0950-7051(00)00050-2.
    • (2000) Knowledge-Based Systems , vol.13 , Issue.3 , pp. 93-99
    • Wheeler, R.1    Aitken, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.