-
1
-
-
72849145202
-
-
Tech. Rep. 4528.0, Australian Bureau of Statistics, Australian Bureau of Statistics
-
Australian Bureau of Statistics (2008) Personal fraud, 2007. Tech. Rep. 4528.0, Australian Bureau of Statistics.
-
(2008)
Personal fraud, 2007
-
-
-
2
-
-
57049102927
-
Learning classifier systems: Looking back and glimpsing ahead
-
Springer, Berlin
-
Bacardit J, Bernadó-Mansilla E, Butz MV (2008) Learning classifier systems: looking back and glimpsing ahead. In: 10th international workshop on learning classifier systems, Springer, Berlin, pp 1-21.
-
(2008)
10th International Workshop On Learning Classifier Systems
, pp. 1-21
-
-
Bacardit, J.1
Bernadó-Mansilla, E.2
Butz, M.V.3
-
5
-
-
0012816981
-
An algorithmic description of XCS
-
Illinois Genetic Algorithms Laboratory
-
Butz MV, Wilson SW (2000) An algorithmic description of XCS. Tech. Rep. 2000017, Illinois Genetic Algorithms Laboratory.
-
(2000)
Tech. Rep
, pp. 2000017
-
-
Butz, M.V.1
Wilson, S.W.2
-
8
-
-
79958000912
-
Detecting credit card fraud by genetic algorithm and scatter search
-
Duman E, Ozcelik MH (2011) Detecting credit card fraud by genetic algorithm and scatter search. Expert Syst Appl 38(10): 13, 057-13, 063.
-
(2011)
Expert Syst Appl
, vol.38
, Issue.10
, pp. 057-063
-
-
Duman, E.1
Ozcelik, M.H.2
-
9
-
-
77955970556
-
Ai approaches to fraud detection and risk management
-
Fawcett T, Haimowitz I, Provost F, Stolfo S (1998) Ai approaches to fraud detection and risk management. AI Magaz 19(2): 107-108.
-
(1998)
AI Magaz
, vol.19
, Issue.2
, pp. 107-108
-
-
Fawcett, T.1
Haimowitz, I.2
Provost, F.3
Stolfo, S.4
-
10
-
-
37249089471
-
Network anomaly detection based on DSOM and ACO clustering
-
Springer, Berlin
-
Feng Y, Zhong J, Xiong Zy, Ye Cx, Wu Kg (2007) Network anomaly detection based on DSOM and ACO clustering. In: Advances in neural networks-ISNN 2007, lecture notes in computer science, vol 4492, Springer, Berlin pp 947-955.
-
(2007)
Advances In Neural Networks-ISNN 2007, Lecture Notes In Computer Science
, vol.4492
, pp. 947-955
-
-
Feng, Y.1
Zhong, J.2
Zy, X.3
Ye, C.4
Kg, W.5
-
11
-
-
2942674608
-
Survey of fraud detection techniques
-
Kou Y, Lu CT, Sirwongwattana S, Huang YP (2004) Survey of fraud detection techniques. In: Networking, sensing and control, 2004 IEEE international conference on, vol 2, pp 749-754.
-
(2004)
Networking, Sensing and Control, 2004 IEEE International Conference On
, vol.2
, pp. 749-754
-
-
Kou, Y.1
Lu, C.T.2
Sirwongwattana, S.3
Huang, Y.P.4
-
12
-
-
84898030282
-
A study of the effect of different types of noise on the precision of supervised learning techniques
-
Nettleton DF, Orriols-Puig A, Fornells A (2010) A study of the effect of different types of noise on the precision of supervised learning techniques. Artif Intell Rev 33(4): 275-306.
-
(2010)
Artif Intell Rev
, vol.33
, Issue.4
, pp. 275-306
-
-
Nettleton, D.F.1
Orriols-Puig, A.2
Fornells, A.3
-
13
-
-
58349092406
-
Towards adapting xcs for imbalance problems
-
Springer, Berlin
-
Nguyen TH, Foitong S, Srinil P, Pinngern O (2008) Towards adapting xcs for imbalance problems. In: PRICAI '08, Springer, Berlin, pp 1028-1033.
-
(2008)
PRICAI '08
, pp. 1028-1033
-
-
Nguyen, T.H.1
Foitong, S.2
Srinil, P.3
Pinngern, O.4
-
15
-
-
55549116330
-
Evolutionary rule-based systems for imbalanced data sets
-
Orriols-Puig A, Bernadó-Mansilla E (2008) Evolutionary rule-based systems for imbalanced data sets. Soft Comput 13(3): 213-225.
-
(2008)
Soft Comput
, vol.13
, Issue.3
, pp. 213-225
-
-
Orriols-Puig, A.1
Bernadó-Mansilla, E.2
-
16
-
-
70349882155
-
Facetwise analysis of XCS for problems with class imbalances
-
Orriols-Puig A, Bernadó-Mansilla E, Goldberg DE, Sastry K, Lanzi PL (2009) Facetwise analysis of XCS for problems with class imbalances. IEEE Trans Evol Comput, submitted 3(5): 1093-1119.
-
(2009)
IEEE Trans Evol Comput, Submitted
, vol.3
, Issue.5
, pp. 1093-1119
-
-
Orriols-Puig, A.1
Bernadó-Mansilla, E.2
Goldberg, D.E.3
Sastry, K.4
Lanzi, P.L.5
-
17
-
-
37149053967
-
A comprehensive survey of data mining-based fraud detection research
-
Monash University
-
Phua C, Lee V, Smith-Miles K, Gayler R (2005) A comprehensive survey of data mining-based fraud detection research. Tech. rep., Monash University.
-
(2005)
Tech. Rep
-
-
Phua, C.1
Lee, V.2
Smith-Miles, K.3
Gayler, R.4
-
19
-
-
36549012987
-
An evaluation of naïve Bayes variants in content-based learning for spam filtering
-
Seewald AK (2007) An evaluation of naïve Bayes variants in content-based learning for spam filtering. Int Data Anal11(5): 497-524.
-
(2007)
Int Data Anal
, vol.11
, Issue.5
, pp. 497-524
-
-
Seewald, A.K.1
-
20
-
-
36749010766
-
Biologically-inspired complex adaptive systems approaches to network intrusion detection
-
Shafi K, Abbass HA (2007) Biologically-inspired complex adaptive systems approaches to network intrusion detection. Inform Secur Tech Rep 12(4): 209-217.
-
(2007)
Inform Secur Tech Rep
, vol.12
, Issue.4
, pp. 209-217
-
-
Shafi, K.1
Abbass, H.A.2
-
21
-
-
60949108490
-
Intrusion detection with evolutionary learning classifier systems
-
Shafi K, Kovacs T, Abbass HA, Zhu W (2009) Intrusion detection with evolutionary learning classifier systems. Nat Comput 8(1): 3-27.
-
(2009)
Nat Comput
, vol.8
, Issue.1
, pp. 3-27
-
-
Shafi, K.1
Kovacs, T.2
Abbass, H.A.3
Zhu, W.4
-
23
-
-
50249160574
-
KDD cup 1999 dataset
-
Stolfo S, et al (1999) KDD cup 1999 dataset. UCI KDD repository. http://kdd. ics. uci. edu.
-
(1999)
UCI KDD repository
-
-
Stolfo, S.1
-
24
-
-
0043284110
-
For real! XCS with continuous-valued inputs
-
Stone C, Bull L (2003) For real! XCS with continuous-valued inputs. Evol Comput 11(3): 299-336.
-
(2003)
Evol Comput
, vol.11
, Issue.3
, pp. 299-336
-
-
Stone, C.1
Bull, L.2
-
25
-
-
58349100775
-
Using self-organizing maps with learning classifier system for intrusion detection
-
Springer, Berlin
-
Tamee K, Rojanavasu P, Udomthanapong S, Pinngern O (2008) Using self-organizing maps with learning classifier system for intrusion detection. In: PRICAI '08, Springer, Berlin, pp 1071-1076.
-
(2008)
PRICAI '08
, pp. 1071-1076
-
-
Tamee, K.1
Rojanavasu, P.2
Udomthanapong, S.3
Pinngern, O.4
-
26
-
-
34447639073
-
A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers
-
Toosi AN, Kahani M (2007) A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Comput Commun 30(10): 2201-2212.
-
(2007)
Comput Commun
, vol.30
, Issue.10
, pp. 2201-2212
-
-
Toosi, A.N.1
Kahani, M.2
-
27
-
-
69249230890
-
Intrusion detection by machine learning: a review
-
Tsai CF, Hsu YF, Lin CY, Lin WY (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10): 11-12.
-
(2009)
Expert Syst Appl
, vol.36
, Issue.10
, pp. 11-12
-
-
Tsai, C.F.1
Hsu, Y.F.2
Lin, C.Y.3
Lin, W.Y.4
-
28
-
-
77955380270
-
Learning classifier systems: a complete introduction, review, and roadmap
-
Urbanowicz RJ, Moore JH (2009) Learning classifier systems: a complete introduction, review, and roadmap. J Artif Evol App 2009: 1-1125.
-
(2009)
J Artif Evol App
, vol.2009
, pp. 1-1125
-
-
Urbanowicz, R.J.1
Moore, J.H.2
-
30
-
-
33646848433
-
A game-theoretic approach to credit card fraud detection
-
Vatsa V, Sural S, Majumdar A (2005) A game-theoretic approach to credit card fraud detection. Lect Notes Comput Sci 3803: 263-276.
-
(2005)
Lect Notes Comput Sci
, vol.3803
, pp. 263-276
-
-
Vatsa, V.1
Sural, S.2
Majumdar, A.3
-
31
-
-
20844458491
-
Mining with rarity: a unifying framework
-
Weiss GM (2004) Mining with rarity: a unifying framework. ACM SIGKDD Explor Newslett 6(1): 7-19.
-
(2004)
ACM SIGKDD Explor Newslett
, vol.6
, Issue.1
, pp. 7-19
-
-
Weiss, G.M.1
-
32
-
-
0001387704
-
Classifier fitness based on accuracy
-
Wilson SW (1995) Classifier fitness based on accuracy. Evol Comput 3(2): 149-175.
-
(1995)
Evol Comput
, vol.3
, Issue.2
, pp. 149-175
-
-
Wilson, S.W.1
-
34
-
-
38049081186
-
A review of data mining-based financial fraud detection research
-
Yue D, Wu X, Wang Y, Li Y, Chu CH (2007) A review of data mining-based financial fraud detection research. In: Wireless communications, networking and mobile computing, pp 5519-5522.
-
(2007)
Wireless communications, networking and mobile computing
, pp. 5519-5522
-
-
Yue, D.1
Wu, X.2
Wang, Y.3
Li, Y.4
Chu, C.H.5
|