-
2
-
-
27144474379
-
-
Abbass, Hussein A., Bacardit, Jaume, Butz, Martin V., Llor, Xavier, 2004. Online Adaptation in Learning Classifier Systems: Stream Data Mining, 217.
-
(2004)
Online Adaptation in Learning Classifier Systems: Stream Data Mining
, pp. 217
-
-
Abbass, H.A.1
Bacardit, J.2
Butz, M.V.3
Llor, X.4
-
3
-
-
84995878228
-
-
UK's National Fraud and Internet Crime Reporting Centre
-
Action Fraud, 2015. UK's National Fraud and Internet Crime Reporting Centre. 1, pp. 1689-1699. doi: http://dx.doi.org/10.1017/CBO9781107415324.004.
-
(2015)
, vol.1
, pp. 1689-1699
-
-
Action Fraud1
-
5
-
-
77954341530
-
-
August 2014
-
Ai, Jing, Brockett, Patrick L., Golden, Linda L., 2009. Assessing consumer fraud risk in insurance claims: an unsupervised learning technique using discrete and continuous predictor variables. August 2014, pp. 37-41. doi: http://dx.10.1080/10920277.2009.10597568.
-
(2009)
Assessing Consumer Fraud Risk in Insurance Claims: An Unsupervised Learning Technique Using Discrete and Continuous Predictor Variables
, pp. 37-41
-
-
Ai, J.1
Brockett, P.L.2
Golden, L.L.3
-
6
-
-
84887961383
-
Data mining application for cyber credit-card fraud detection system
-
Akhilomen, John, 2013. Data mining application for cyber credit-card fraud detection system. In Lecture Notes in Engineering and Computer Science. pp. 1537-1542.
-
(2013)
Lecture Notes in Engineering and Computer Science
, pp. 1537-1542
-
-
Akhilomen, J.1
-
7
-
-
84962287982
-
Detecting telecommunication fraud using neural networks through data mining
-
Mohammad Iquebal Akhter, and Mohammad Gulam Ahamad Detecting telecommunication fraud using neural networks through data mining Int. J. Sci. Eng. Res. 3 3 2012 1 5
-
(2012)
Int. J. Sci. Eng. Res.
, vol.3
, Issue.3
, pp. 1-5
-
-
Akhter, M.I.1
Ahamad, M.G.2
-
8
-
-
80052792333
-
Internet auction fraud: The evolving nature of online auctions criminality and the mitigating framework to address the threat
-
Azeem Aleem, and Albert Antwi-Boasiako Internet auction fraud: the evolving nature of online auctions criminality and the mitigating framework to address the threat Int. J. Law Crime Justice 39 3 2011 140 160 10.1016/j.ijlcj.2011.05.003
-
(2011)
Int. J. Law Crime Justice
, vol.39
, Issue.3
, pp. 140-160
-
-
Aleem, A.1
Antwi-Boasiako, A.2
-
9
-
-
84964529712
-
-
Alexopoulos, Panos, Kafentzis, Kostas, Benetou, Xanthi, Tagaris, Tassos, 2007. Towards a generic fraud ontology in e-government detection in the e.
-
(2007)
Towards a Generic Fraud Ontology in E-government Detection in the e
-
-
Alexopoulos, P.1
Kafentzis, K.2
Benetou, X.3
Tagaris, T.4
-
10
-
-
84897660042
-
Cloning sim cards usability reduction in mobile networks
-
Mustafa A. Al-Fayoumi, and Nidal F. Shilbayeh Cloning sim cards usability reduction in mobile networks J. Netw. Syst. Manag. 22 2 2013 259 279 10.1007/s10922-013-9299-8
-
(2013)
J. Netw. Syst. Manag.
, vol.22
, Issue.2
, pp. 259-279
-
-
Al-Fayoumi, M.A.1
Shilbayeh, N.F.2
-
13
-
-
84964559237
-
-
Miguel Pironet San-Bento Almeida Dissertation for the obtaining of a Masters Degree in Engenharia Informática e de Computadores Júri
-
Almeida, Miguel Pironet San-bento, 2009. Classification for Fraud Detection with Social Network Analysis (Miguel Pironet San-Bento Almeida Dissertation for the obtaining of a Masters Degree in Engenharia Informática e de Computadores Júri).
-
(2009)
Classification for Fraud Detection with Social Network Analysis
-
-
Almeida, M.P.S.-B.1
-
14
-
-
52149118926
-
-
Almeida, Pedro, Jorge, Marco, Cortesão, Luís, Martins, Filipe, Vieira, Marco, Gomes, Paulo, 2008. Supporting Fraud Analysis in Mobile∗Telecommunications Using Case-Based Reasoning. pp. 562-572.
-
(2008)
Supporting Fraud Analysis in Mobile∗Telecommunications Using Case-Based Reasoning
, pp. 562-572
-
-
Almeida, P.1
Jorge, M.2
Cortesão, L.3
Martins, F.4
Vieira, M.5
Gomes, P.6
-
15
-
-
84884981015
-
Finding the needle: A risk-based ranking of product listings at online auction sites for non-delivery fraud prediction
-
V. Almendra Finding the needle: a risk-based ranking of product listings at online auction sites for non-delivery fraud prediction Expert Syst. Appl. 40 12 2013 4805 4811 10.1016/j.eswa.2013.02.027
-
(2013)
Expert Syst. Appl.
, vol.40
, Issue.12
, pp. 4805-4811
-
-
Almendra, V.1
-
16
-
-
1842607987
-
Detection of automobile insurance fraud with discrete choice models and misclassified claims
-
Manuel Artís, Mercedes Ayuso, and Montserrat Guillén Detection of automobile insurance fraud with discrete choice models and misclassified claims J. Risk Insur. 69 3 2002 325 340 10.2307/1558681
-
(2002)
J. Risk Insur.
, vol.69
, Issue.3
, pp. 325-340
-
-
Artís, M.1
Ayuso, M.2
Guillén, M.3
-
20
-
-
0037408982
-
Building trust in online auction markets through an economic incentive mechanism
-
Sulin Ba, Andrew B. Whinston, and Han Zhang Building trust in online auction markets through an economic incentive mechanism Decis. Support Syst. 35 3 2003 273 286 10.1016/S0167-9236(02)00074-X
-
(2003)
Decis. Support Syst.
, vol.35
, Issue.3
, pp. 273-286
-
-
Ba, S.1
Whinston, A.B.2
Zhang, H.3
-
21
-
-
49749153511
-
Leveraging missing values in call detail record using naïve bayes for fraud analysis
-
January
-
Baharim, Khairul Nizam, Kamaruddin, Mohd. Shafri, Jusof, Faeizah, 2008. Leveraging missing values in call detail record using naïve bayes for fraud analysis. In: Proceedings of the 2008 International Conference on Information Networking. January, pp. 1-5. http://dx.doi.org/10.1109/ICOIN.2008.4472791
-
(2008)
Proceedings of the 2008 International Conference on Information Networking
, pp. 1-5
-
-
Baharim, K.N.1
Kamaruddin Mohd., S.2
Jusof, F.3
-
22
-
-
9744282683
-
User Heterogeneity and Its Impact on Electronic Auction Market Design: An Empirical Exploration
-
Management Information Systems Research Center, University of Minnesota
-
Bapna, Ravi, Paulo Goes, Alok Gupta, Yiwei Jin. 2004. User Heterogeneity and Its Impact on Electronic Auction Market Design: An Empirical Exploration. MIS Quarterly 28 (1). Management Information Systems Research Center, University of Minnesota: 21-43. http://www.jstor.org/stable/25148623.
-
(2004)
MIS Quarterly
, vol.28
, Issue.1
, pp. 21-43
-
-
Bapna, R.1
Paulo, G.2
Alok, G.3
Yiwei, J.4
-
23
-
-
84871822129
-
Nature-inspired techniques in the context of fraud detection
-
Mohammad Behdad, Luigi Barone, Mohammed Bennamoun, and Tim French Nature-inspired techniques in the context of fraud detection IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 42 6 2012 1273 1290 10.1109/TSMCC.2012.2215851
-
(2012)
IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.)
, vol.42
, Issue.6
, pp. 1273-1290
-
-
Behdad, M.1
Barone, L.2
Bennamoun, M.3
French, T.4
-
25
-
-
77954417314
-
Fuzzy darwinian detection of credit card fraud
-
Bentley, Peter J., Kim, Jungwon, Jung, Gil-ho, Choi, Jong-uk, 2000. Fuzzy darwinian detection of credit card fraud. In: Proceedings of the 14th Annual Fall Symposium of the Korean Information Processing Society. 1-4.
-
(2000)
Proceedings of the 14th Annual Fall Symposium of the Korean Information Processing Society
, pp. 1-4
-
-
Bentley, P.J.1
Kim, J.2
Jung, G.-H.3
Choi, J.-U.4
-
26
-
-
41049117204
-
A Bayesian dichotomous model with asymmetric link for fraud in insurance
-
Ll. Bermúdez, J.M. Pérez, M. Ayuso, E. Gómez, and F.J. Vázquez A Bayesian dichotomous model with asymmetric link for fraud in insurance Insur. Math. Econ. 42 2 2008 779 786 10.1016/j.insmatheco.2007.08.002
-
(2008)
Insur. Math. Econ.
, vol.42
, Issue.2
, pp. 779-786
-
-
Bermúdez, Ll.1
Pérez, J.M.2
Ayuso, M.3
Gómez, E.4
Vázquez, F.J.5
-
27
-
-
78651086789
-
Data mining for credit card fraud: A comparative study
-
Siddhartha Bhattacharyya, Sanjeev Jha, Kurian Tharakunnel, and J. Christopher Westland Data mining for credit card fraud: a comparative study Decis. Support Syst. 50 3 2011 602 613 10.1016/j.dss.2010.08.008
-
(2011)
Decis. Support Syst.
, vol.50
, Issue.3
, pp. 602-613
-
-
Bhattacharyya, S.1
Jha, S.2
Tharakunnel, K.3
Westland, J.C.4
-
28
-
-
84861806142
-
Detecting auto insurance fraud by data mining techniques
-
Rekha Bhowmik Detecting auto insurance fraud by data mining techniques J. Emerg. Trends Comput. Inf. Sci. 2 4 2011 156 162
-
(2011)
J. Emerg. Trends Comput. Inf. Sci.
, vol.2
, Issue.4
, pp. 156-162
-
-
Bhowmik, R.1
-
30
-
-
0042421807
-
Statistical fraud detection: A review
-
Richard J. Bolton, and David J. Hand Statistical fraud detection: a review Stat. Sci. 17 3 2002 235 255
-
(2002)
Stat. Sci.
, vol.17
, Issue.3
, pp. 235-255
-
-
Bolton, R.J.1
Hand, D.J.2
-
32
-
-
0036749185
-
Behavior-based intrusion detection in mobile phone systems
-
Azzedine Boukerche, Mirela Sechi, and M. Annoni Notare Behavior-based intrusion detection in mobile phone systems J. Parallel Distrib. Comput. 2002 1476 1490 10.1006/jpdc.2002.1857
-
(2002)
J. Parallel Distrib. Comput.
, pp. 1476-1490
-
-
Boukerche, A.1
Sechi, M.2
Notare, M.A.3
-
33
-
-
2642537707
-
An artificial immune based intrusion detection model for computer and telecommunication systems
-
Azzedine Boukerche, Kathia Regina, Lemos Juc, Bosco Sobral, Mirela Sechi, and Moretti Annoni An artificial immune based intrusion detection model for computer and telecommunication systems Parallel Comput. 30 2004 629 646 10.1016/j.parco.2003.12.008
-
(2004)
Parallel Comput.
, vol.30
, pp. 629-646
-
-
Boukerche, A.1
Regina, K.2
Juc, L.3
Sobral, B.4
Sechi, M.5
Annoni, M.6
-
34
-
-
79959485792
-
-
Brabazon, Anthony, Cahill, Jane, Keenan, Peter, Walsh, Daniel, 2010. Identifying online credit card fraud using artificial immune systems.
-
(2010)
Identifying Online Credit Card Fraud Using Artificial Immune Systems
-
-
Brabazon, A.1
Cahill, J.2
Keenan, P.3
Walsh, D.4
-
35
-
-
0033344304
-
Neural data mining for credit card fraud detection
-
Brause, R., Langsdorf, T., Hepp, M., 1999. Neural data mining for credit card fraud detection. In: Proceedings of the 11th IEEE International Conference on Tools with Artificial Intelligence. pp. 103-106. http://dx.doi.org/10.1109/TAI.1999.809773
-
(1999)
Proceedings of the 11th IEEE International Conference on Tools with Artificial Intelligence
, pp. 103-106
-
-
Brause, R.1
Langsdorf, T.2
Hepp, M.3
-
37
-
-
33748463786
-
A comparison of neural network, statistical methods, and variable choice for life insurers' financial distress prediction
-
Patrick L. Brockett, and Linda L. Golden A comparison of neural network, statistical methods, and variable choice for life insurers' financial distress prediction J. Risk Insur. 73 3 2006 397 419
-
(2006)
J. Risk Insur.
, vol.73
, Issue.3
, pp. 397-419
-
-
Brockett, P.L.1
Golden, L.L.2
-
38
-
-
0001040806
-
Using Kohonen's self-organizing feature map to uncover automobile bodily injury claims fraud
-
Patrick L. Brockett, Xiaohua Xia, and Richard a Derrig Using Kohonen's self-organizing feature map to uncover automobile bodily injury claims fraud J. Risk Insur. 65 2 1998 245 10.2307/253535
-
(1998)
J. Risk Insur.
, vol.65
, Issue.2
, pp. 245
-
-
Brockett, P.L.1
Xia, X.2
Derrig, R.A.3
-
39
-
-
1842503447
-
-
3
-
Brockett, Patrick L., Derrig, Richard A., Golden, Linda L., Alpert, Mark, 2002. Analysis of RIDITs. 69, 3, pp. 341-371.
-
(2002)
Analysis of RIDITs
, vol.69
, pp. 341-371
-
-
Brockett, P.L.1
Derrig, R.A.2
Golden, L.L.3
Alpert, M.4
-
40
-
-
84964559176
-
-
Burge, P., Shawe-Taylor, J., Cooke, C.
-
Burge, P., et al., 1997. Fraud detection and management in mobile telecommunications networks. Burge, P., Shawe-Taylor, J., Cooke, C. 437, pp. 28-30.
-
(1997)
Fraud Detection and Management in Mobile Telecommunications Networks
, vol.437
, pp. 28-30
-
-
Burge, P.1
-
43
-
-
68049121093
-
Anomaly detection: A survey
-
Varun Chandola, Arindam Banerjee, and Vipin Kumar Anomaly detection: a survey ACM Comput. Surv. 41 3 2009 1 58 10.1145/1541880.1541882
-
(2009)
ACM Comput. Surv.
, vol.41
, Issue.3
, pp. 1-58
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
44
-
-
84897914197
-
Analysis of fraudulent behavior strategies in online auctions for detecting latent fraudsters
-
Jau-Shien Chang, and Wen-Hsi Chang Analysis of fraudulent behavior strategies in online auctions for detecting latent fraudsters Electron. Commer. Res. Appl. 13 2 2014 79 97 10.1016/j.elerap.2013.10.004
-
(2014)
Electron. Commer. Res. Appl.
, vol.13
, Issue.2
, pp. 79-97
-
-
Chang, J.-S.1
Chang, W.-H.2
-
45
-
-
79955627427
-
A novel two-stage phased modeling framework for early fraud detection in online auctions
-
Wen Hsi Chang, and Jau Shien Chang A novel two-stage phased modeling framework for early fraud detection in online auctions Expert Syst. Appl. 38 9 2011 11244 11260 10.1016/j.eswa.2011.02.172
-
(2011)
Expert Syst. Appl.
, vol.38
, Issue.9
, pp. 11244-11260
-
-
Chang, W.H.1
Chang, J.S.2
-
46
-
-
84865241568
-
An effective early fraud detection method for online auctions
-
Wen-Hsi Chang, and Jau-Shien Chang An effective early fraud detection method for online auctions Electron. Commer. Res. Appl. 11 4 2012 346 360 10.1016/j.elerap.2012.02.005
-
(2012)
Electron. Commer. Res. Appl.
, vol.11
, Issue.4
, pp. 346-360
-
-
Chang, W.-H.1
Chang, J.-S.2
-
47
-
-
77951292840
-
An Early Fraud Detection Mechanism for Online Auctions Based on Phased Modeling 3
-
Chang, Jau-shien, 2009. An Early Fraud Detection Mechanism for Online Auctions Based on Phased Modeling 3. Phased Modeling Framework for Early. pp. 743-748.
-
(2009)
Phased Modeling Framework for Early
, pp. 743-748
-
-
Chang, J.-S.1
-
51
-
-
33750306345
-
-
Chau, Duen Horng, Pandit, Shashank, Faloutsos, Christos, 2006. Detecting Fraudulent Personalities in Networks of Online Auctioneers. pp. 103-114.
-
(2006)
Detecting Fraudulent Personalities in Networks of Online Auctioneers
, pp. 103-114
-
-
Chau, D.H.1
Pandit, S.2
Faloutsos, C.3
-
52
-
-
84881630706
-
A review of fraud detection techniques: Credit card
-
Khyati Chaudhary, and Jyoti Yadav A review of fraud detection techniques: credit card Int. J. Comput. Appl. 45 1 2012 39 44
-
(2012)
Int. J. Comput. Appl.
, vol.45
, Issue.1
, pp. 39-44
-
-
Chaudhary, K.1
Yadav, J.2
-
54
-
-
33744516996
-
A new binary support vector system for increasing detection rate of credit card fraud
-
Rong-Chang Chen A new binary support vector system for increasing detection rate of credit card fraud Int. J. Pattern Recognit. Artif. Intell. 20 2 2006 227 239
-
(2006)
Int. J. Pattern Recognit. Artif. Intell.
, vol.20
, Issue.2
, pp. 227-239
-
-
Chen, R.-C.1
-
55
-
-
24944580076
-
Detecting credit card fraud by using questionnaire-responded transaction model based on support vector machines
-
Chen, Rong-Chang, Chiu, Ming-Li, Huang, Ya-Li, Chen, Lin-Ti, 2004. Detecting credit card fraud by using questionnaire-responded transaction model based on support vector machines. In: Proceedings of IDEAL. pp. 800-806.
-
(2004)
Proceedings of IDEAL
, pp. 800-806
-
-
Chen, R.-C.1
Chiu, M.-L.2
Huang, Y.-L.3
Chen, L.-T.4
-
56
-
-
33847103122
-
Personalized approach based on SVM and ANN for detecting credit card fraud
-
Beijing, China
-
Chen, Rong-Chang, Luol, Shu-Ting, Lee, Vincent C.S., 2005. Personalized approach based on SVM and ANN for detecting credit card fraud. In: Proceedings of the IEEE International Conference on Neural Networks and Brain. Beijing, China. pp. 810-815.
-
(2005)
Proceedings of the IEEE International Conference on Neural Networks and Brain
, pp. 810-815
-
-
Chen, R.-C.1
Luol, S.-T.2
Lee Vincent, C.S.3
-
57
-
-
84893518994
-
A novel approach to uncover health care frauds through spectral analysis
-
Informatics. September
-
Chen, Song, Gangopadhyay, Aryya, 2013. A novel approach to uncover health care frauds through spectral analysis. In: Proceedings of the 2013 IEEE International Conference on Healthc. Informatics. September, pp. 499-504. http://dx.doi.org/10.1109/ICHI.2013.77.
-
(2013)
Proceedings of the 2013 IEEE International Conference on Healthc
, pp. 499-504
-
-
Chen, S.1
Gangopadhyay, A.2
-
58
-
-
79955600278
-
Internet auction fraud detection using social network analysis and classification tree approaches
-
Chaochang Chiu, Yungchang Ku, Ting Lie, and Yuchi Chen Internet auction fraud detection using social network analysis and classification tree approaches Int. J. Electron. Commer. 15 3 2011 123 147 10.2753/JEC1086-4415150306
-
(2011)
Int. J. Electron. Commer.
, vol.15
, Issue.3
, pp. 123-147
-
-
Chiu, C.1
Ku, Y.2
Lie, T.3
Chen, Y.4
-
59
-
-
7244245467
-
Fighting Internet auction fraud: An assessment and proposal
-
C.E.H. Chua, and J. Wareham Fighting Internet auction fraud: an assessment and proposal Computer 37 10 2004 31 37 10.1109/MC.2004.165
-
(2004)
Computer
, vol.37
, Issue.10
, pp. 31-37
-
-
Chua, C.E.H.1
Wareham, J.2
-
60
-
-
78650367447
-
-
Cortesão, Luis, Martins, Filipe, Rosa, António, Carvalho, Pedro, 2005. Fraud Management Systems in Telecommunications: a practical approach.
-
(2005)
Fraud Management Systems in Telecommunications: a Practical Approach
-
-
Cortesão, L.1
Martins, F.2
Rosa, A.3
Carvalho, P.4
-
62
-
-
0042670058
-
Insurance fraud and optimal claims settlement strategies∗
-
Keith J. Crocker Insurance fraud and optimal claims settlement strategies∗ J. Law Econ. XLV 2002
-
(2002)
J. Law Econ.
, vol.45
-
-
Crocker, K.J.1
-
64
-
-
84896514086
-
Learned lessons in credit card fraud detection from a practitioner perspective
-
Andrea Dal Pozzolo, Olivier Caelen, Yann-A.ël Le Borgne, Serge Waterschoot, and Gianluca Bontempi Learned lessons in credit card fraud detection from a practitioner perspective Expert Syst. Appl. 41 10 2014 4915 4928 10.1016/j.eswa.2014.02.026
-
(2014)
Expert Syst. Appl.
, vol.41
, Issue.10
, pp. 4915-4928
-
-
Dal Pozzolo, A.1
Caelen, O.2
Borgne, Y.-A.E.L.3
Waterschoot, S.4
Bontempi, G.5
-
65
-
-
84892377497
-
Credit card fraud and detection techniques : a review
-
Linda Delamaire, Hussein Abdou, and John Pointon Credit card fraud and detection techniques : a review Banks Bank Syst. 4 2 2009
-
(2009)
Banks Bank Syst.
, vol.4
, Issue.2
-
-
Delamaire, L.1
Abdou, H.2
Pointon, J.3
-
66
-
-
0000808501
-
Fuzzy techniques of pattern recognition in risk and claim classification
-
Richard A. Derrig, and Krzysztof M. Ostaszewski Fuzzy techniques of pattern recognition in risk and claim classification J. Risk Insur. 1995 1995 447 482
-
(1995)
J. Risk Insur.
, vol.1995
, pp. 447-482
-
-
Derrig, R.A.1
Ostaszewski, K.M.2
-
68
-
-
0036270028
-
Replacement cost endorsement and opportunistic fraud in automobile insuranceâ.
-
Georges Dionne Replacement cost endorsement and opportunistic fraud in automobile insuranceâ.- J. Risk Uncertain. 2002
-
(2002)
J. Risk Uncertain.
-
-
Dionne, G.1
-
70
-
-
84964488887
-
-
November
-
Dionne, Georges, Picard, Pierre, Paris, Descartes F., Giuliano, Florence, 2005. Optimal Auditing with Scoring Theory and Application to Insurance Fraud LABORATOIRE D ' ECONOMETRIE Insurance Fraud. November.
-
(2005)
Optimal Auditing with Scoring Theory and Application to Insurance Fraud LABORATOIRE D ' ECONOMETRIE Insurance Fraud
-
-
Dionne, G.1
Picard, P.2
Paris, D.F.3
Giuliano, F.4
-
71
-
-
70349995772
-
Combating online in-auction fraud: Clues, techniques and challenges
-
Fei Dong, Sol M. Shatz, and Haiping Xu Combating online in-auction fraud: clues, techniques and challenges Comput. Sci. Rev. 3 4 2009 245 258 10.1016/j.cosrev.2009.09.001
-
(2009)
Comput. Sci. Rev.
, vol.3
, Issue.4
, pp. 245-258
-
-
Dong, F.1
Shatz, S.M.2
Xu, H.3
-
72
-
-
84862783158
-
Price comparison: A reliable approach to identifying shill bidding in online auctions?
-
Fei Dong, Sol M. Shatz, Haiping Xu, and Dibyen Majumdar Price comparison: a reliable approach to identifying shill bidding in online auctions? Electron. Commer. Res. Appl. 11 2 2012 171 179 10.1016/j.elerap.2011.12.003
-
(2012)
Electron. Commer. Res. Appl.
, vol.11
, Issue.2
, pp. 171-179
-
-
Dong, F.1
Shatz, S.M.2
Xu, H.3
Majumdar, D.4
-
73
-
-
4444378368
-
A feature extraction method for fraud detection in mobile communication networks
-
Dong, Wang, Quan-yu, Wang, Shou-yi, Zhan, Feng-xia, L.I., Da-zhen, Wang, 2004. A feature extraction method for fraud detection in mobile communication networks. In: Proceedings of Fifth World Congress on Intelligent Control Automation (IEEE Cat. No. 04EX788). 2, pp. 1853-1856. doi: http://dx.doi.org/10.1109/WCICA.2004.1340996.
-
(2004)
Proceedings of Fifth World Congress on Intelligent Control Automation (IEEE Cat. No. 04EX788)
, vol.2
, pp. 1853-1856
-
-
Dong, W.1
Quan-Yu, W.2
Shou-Yi, Z.3
Feng-Xia, L.I.4
Da-Zhen, W.5
-
74
-
-
0031192174
-
Neural fraud detection in credit card operations
-
R. Dorronsoro, Francisco Ginel, S. Carmen, and Carlos Santa Cruz Neural fraud detection in credit card operations IEEE Trans. Neural Netw. 8 4 1997 827 834
-
(1997)
IEEE Trans. Neural Netw.
, vol.8
, Issue.4
, pp. 827-834
-
-
Dorronsoro, R.1
Ginel, F.2
Carmen, S.3
Santa Cruz, C.4
-
75
-
-
79958000912
-
Detecting credit card fraud by genetic algorithm and scatter search
-
Ekrem Duman, and M. Hamdi Ozcelik Detecting credit card fraud by genetic algorithm and scatter search Expert Syst. Appl. 38 10 2011 13057 13063 10.1016/j.eswa.2011.04.110
-
(2011)
Expert Syst. Appl.
, vol.38
, Issue.10
, pp. 13057-13063
-
-
Duman, E.1
Ozcelik, M.H.2
-
76
-
-
84898045165
-
A novel and successful credit card fraud detection system implemented in a Turkish Bank
-
December 2013
-
Duman, Ekrem, Buyukkaya, Ayse, Elikucuk, Ilker, 2013. A novel and successful credit card fraud detection system implemented in a Turkish Bank. In: Proceedings of 2013 IEEE 13th International Conference on Data Mining Workshops. December 2013, pp. 162-171. http://dx.doi.org/10.1109/ICDMW.2013.168.
-
(2013)
Proceedings of 2013 IEEE 13th International Conference on Data Mining Workshops
, pp. 162-171
-
-
Duman, E.1
Buyukkaya, A.2
Elikucuk, I.3
-
77
-
-
33744798606
-
-
99
-
Durtschi, Cindy, Hillison, William, Pacini, Carl, 2004. The Effective Use of Benford' s Law to Assist in Detecting Fraud in Accounting Data. 99, 99, pp. 17-34.
-
(2004)
The Effective Use of Benford' S Law to Assist in Detecting Fraud in Accounting Data
, vol.99
, pp. 17-34
-
-
Durtschi, C.1
Hillison, W.2
Pacini, C.3
-
79
-
-
84874984671
-
Probabilistic credit card fraud detection system in online transactions
-
S.O. Falaki, B.K. Alese, O.S. Adewale, J.O. Ayeni, and G.A. Aderounmu Probabilistic credit card fraud detection system in online transactions Int. J. Softw. Eng. Appl. 6 4 2012 69 78
-
(2012)
Int. J. Softw. Eng. Appl.
, vol.6
, Issue.4
, pp. 69-78
-
-
Falaki, S.O.1
Alese, B.K.2
Adewale, O.S.3
Ayeni, J.O.4
Aderounmu, G.A.5
-
81
-
-
78649651248
-
A data mining framework for detecting subscription fraud in telecommunication
-
Hamid Farvaresh, and Mohammad Mehdi Sepehri A data mining framework for detecting subscription fraud in telecommunication Eng. Appl. Artif. Intell. 24 1 2011 182 194 10.1016/j.engappai.2010.05.009
-
(2011)
Eng. Appl. Artif. Intell.
, vol.24
, Issue.1
, pp. 182-194
-
-
Farvaresh, H.1
Sepehri, M.M.2
-
82
-
-
78649651248
-
A data mining framework for detecting subscription fraud in telecommunication
-
Hamid Farvaresh, and Mohammad Mehdi A data mining framework for detecting subscription fraud in telecommunication Eng. Appl. Artif. Intell. 24 1 2011 182 194 10.1016/j.engappai.2010.05.009
-
(2011)
Eng. Appl. Artif. Intell.
, vol.24
, Issue.1
, pp. 182-194
-
-
Farvaresh, H.1
Mehdi, M.2
-
83
-
-
0013113240
-
Adaptive fraud detection
-
Tom Fawcett, and Foster Provost Adaptive fraud detection Data Min. Knowl. Discov. 1 3 1997 291 316 10.1023/A:1009700419189
-
(1997)
Data Min. Knowl. Discov.
, vol.1
, Issue.3
, pp. 291-316
-
-
Fawcett, T.1
Provost, F.2
-
84
-
-
84898267164
-
Detecting Telecommunications Fraud based on Signature Clustering Analysis
-
Ferreira, P., Alves, Ronnie, Belo, Orlando, Ribeiro, Joel, 2007. Detecting Telecommunications Fraud based on Signature Clustering Analysis. In: Proceedings of Bus. Intell. Work. 13th Port. Conference Artificial Intelligence.
-
(2007)
Proceedings of Bus. Intell. Work. 13th Port. Conference Artificial Intelligence
-
-
Ferreira, P.1
Alves, R.2
Belo, O.3
Ribeiro, J.4
-
85
-
-
84964520154
-
-
PABX Fraud, also known as Toll Fraud, is causing extensive financial loss to organisations each year and is now impacting on Australian businesses. February
-
Fonebox Australia Group, 2011. PABX Fraud Alert - Notice to our customers regarding Toll Fraud Your PABX could expose you to Toll Fraud. PABX Fraud, also known as Toll Fraud, is causing extensive financial loss to organisations each year and is now impacting on Australian businesses. February, pp. 4000-4001.
-
(2011)
PABX Fraud Alert - Notice to Our Customers Regarding Toll Fraud Your PABX Could Expose You to Toll Fraud
, pp. 4000-4001
-
-
-
86
-
-
84877607070
-
A real-time self-adaptive classifier for identifying suspicious bidders in online auctions
-
B.J. Ford, H. Xu, and I. Valova A real-time self-adaptive classifier for identifying suspicious bidders in online auctions Comput. J. 56 5 2012 646 663 10.1093/comjnl/bxs025
-
(2012)
Comput. J.
, vol.56
, Issue.5
, pp. 646-663
-
-
Ford, B.J.1
Xu, H.2
Valova, I.3
-
87
-
-
84861692626
-
Using support vector machines to detect medical fraud and abuse
-
Francis, Charles, Pepper, Noah, Strong, Homer, 2011. Using support vector machines to detect medical fraud and abuse. In: Proceedings of Conference of the IEEE Engineering Medicine Biology Society. pp. 8291-8294.
-
(2011)
Proceedings of Conference of the IEEE Engineering Medicine Biology Society
, pp. 8291-8294
-
-
Francis, C.1
Pepper, N.2
Strong, H.3
-
88
-
-
84855772936
-
Method for selection of motor insurance fraud management system components based on business performance
-
Štefan Furlan, Olegas Vasilecas, and Marko Bajec Method for selection of motor insurance fraud management system components based on business performance Technol. Econ. Dev. Econ. 17 3 2011 535 561 10.3846/20294913.2011.602440
-
(2011)
Technol. Econ. Dev. Econ.
, vol.17
, Issue.3
, pp. 535-561
-
-
Furlan, Š.1
Vasilecas, O.2
Bajec, M.3
-
89
-
-
51049094235
-
Credit card fraud detection with artificial immune system
-
Peter J. Bentley, Doheon Lee, Sungwon Jung, Springer Berlin, Heidelberg
-
Manoel Fernando Alonso Gadi, Xidi Wang, and Alair Pereira do Lago Credit card fraud detection with artificial immune system Peter J. Bentley, Doheon Lee, Sungwon Jung, Artificial Immune Systems SE - 11. Lecture Notes in Computer Science 2008 Springer Berlin, Heidelberg 119 131 10.1007/978-3-540-85072-4-11
-
(2008)
Artificial Immune Systems SE - 11. Lecture Notes in Computer Science
, pp. 119-131
-
-
Gadi, M.F.A.1
Wang, X.2
Lago, A.P.D.3
-
91
-
-
77955455246
-
Telecoms fraud
-
Mahuya Ghosh Telecoms fraud Comput. Fraud Secur. 7 2010 14 17 10.1016/S1361-3723(10)70082-8
-
(2010)
Comput. Fraud Secur.
, vol.7
, pp. 14-17
-
-
Ghosh, M.1
-
94
-
-
79952402460
-
A Multi-State Bayesian Network for Shill Verification in Online Auctions∗
-
SEKE'2010
-
Goel, Ankit, Xu, Haiping, Shatz, Sol M., 2010. A Multi-State Bayesian Network for Shill Verification in Online Auctions∗. In Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering, SEKE'2010. pp. 279-285.
-
(2010)
Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering
, pp. 279-285
-
-
Goel, A.1
Xu, H.2
Shatz, S.M.3
-
95
-
-
79959292611
-
Learning recurring concepts from data streams with a context-aware ensemble
-
SAC'11
-
Gomes, João Bártolo, Menasalvas, Ernestina, Sousa, Pedro A.C., 2011. Learning recurring concepts from data streams with a context-aware ensemble. In: Proceedings of the 2011 ACM Symposium on Applied Computing. SAC'11. p. 994. http://dx.doi.org/10.1145/1982185.1982403
-
(2011)
Proceedings of the 2011 ACM Symposium on Applied Computing
, pp. 994
-
-
Gomes, J.B.1
Menasalvas, E.2
Sousa, P.A.C.3
-
96
-
-
33749853906
-
-
Gossett, Phil, Hyland, Mark, 1999. Classification, Detection and Prosecution of Fraud on Mobile Networks. 1, pp. 2-4.
-
(1999)
Classification, Detection and Prosecution of Fraud on Mobile Networks
, vol.1
, pp. 2-4
-
-
Gossett, P.1
Hyland, M.2
-
99
-
-
84904965838
-
A novel model for credit card fraud detection using artificial immune systems
-
Soltani Halvaiee, Neda Akbari, and Mohammad Kazem A novel model for credit card fraud detection using artificial immune systems Appl. Soft Comput. 24 2014 40 49 10.1016/j.asoc.2014.06.042
-
(2014)
Appl. Soft Comput.
, vol.24
, pp. 40-49
-
-
Halvaiee, S.1
Akbari, N.2
Kazem, M.3
-
100
-
-
85013808225
-
Data mining concepts and techniques
-
Jiawei Han Micheline Kamber, Jian Pei, Third ed. Morgan Kaufmann Boston
-
Jiawei Han, Micheline Kamber, and Jian Pei Data mining concepts and techniques Jiawei Han Micheline Kamber, Jian Pei, Data Mining (The Morgan Kaufmann Series in Data Management Systems) Third ed. 2012 Morgan Kaufmann Boston 585 631 10.1016/B978-0-12-381479-1.00013-7
-
(2012)
Data Mining (The Morgan Kaufmann Series in Data Management Systems)
, pp. 585-631
-
-
Han, J.1
Kamber, M.2
Pei, J.3
-
101
-
-
84155173383
-
Overcoming selectivity bias in evaluating new fraud detection systems for revolving credit operations
-
David J. Hand, and Martin J. Crowder Overcoming selectivity bias in evaluating new fraud detection systems for revolving credit operations Int. J. Forecast. 28 1 2012 216 223 10.1016/j.ijforecast.2010.10.005
-
(2012)
Int. J. Forecast.
, vol.28
, Issue.1
, pp. 216-223
-
-
Hand, D.J.1
Crowder, M.J.2
-
102
-
-
0031270196
-
Application of neural networks to detection of medical fraud
-
Hongxing He, Jincheng Wang, Warwick Graco, and Simon Hawkins Application of neural networks to detection of medical fraud Expert Syst. Appl. 13 4 1998 329 336
-
(1998)
Expert Syst. Appl.
, vol.13
, Issue.4
, pp. 329-336
-
-
He, H.1
Wang, J.2
Graco, W.3
Hawkins, S.4
-
103
-
-
84964423653
-
Subscription fraud prevention in telecommunications using fuzzy rules and neural networks
-
Claudio M. Held, Claudio A. Perez, and Pablo A. Estevez Subscription fraud prevention in telecommunications using fuzzy rules and neural networks Expert Syst. Appl. 2001
-
(2001)
Expert Syst. Appl.
-
-
Held, C.M.1
Perez, C.A.2
Estevez, P.A.3
-
104
-
-
38049092517
-
An application of decision trees for rule extraction towards telecommunications fraud detection
-
Bruno Apolloni, RobertJ. Howlett, Lakhmi Jain, Springer Berlin, Heidelberg
-
Constantinos Hilas, and John Sahalos An application of decision trees for rule extraction towards telecommunications fraud detection Bruno Apolloni, RobertJ. Howlett, Lakhmi Jain, Knowledge-Based Intelligent Information and Engineering Systems SE - 139. Lecture Notes in Computer Science 2007 Springer Berlin, Heidelberg 1112 1121 10.1007/978-3-540-74827-4-139
-
(2007)
Knowledge-Based Intelligent Information and Engineering Systems SE - 139. Lecture Notes in Computer Science
, pp. 1112-1121
-
-
Hilas, C.1
Sahalos, J.2
-
105
-
-
67349097789
-
Designing an expert system for fraud detection in private telecommunications networks
-
Constantinos S. Hilas Designing an expert system for fraud detection in private telecommunications networks Expert Syst. Appl. 36 9 2009 11559 11569 10.1016/j.eswa.2009.03.031
-
(2009)
Expert Syst. Appl.
, vol.36
, Issue.9
, pp. 11559-11569
-
-
Hilas, C.S.1
-
106
-
-
51149102669
-
An application of supervised and unsupervised learning approaches to telecommunications fraud detection
-
Constantinos S. Hilas, and Paris As Mastorocostas An application of supervised and unsupervised learning approaches to telecommunications fraud detection Knowl.-Based Syst. 21 7 2008 721 726 10.1016/j.knosys.2008.03.026
-
(2008)
Knowl.-Based Syst.
, vol.21
, Issue.7
, pp. 721-726
-
-
Hilas, C.S.1
Mastorocostas, P.A.2
-
110
-
-
34848891759
-
A classification of online bidders in a private value auction: Evidence from eBay
-
Jianwei Hou, and Cesar Rego A classification of online bidders in a private value auction: evidence from eBay Int. J. Electron. Mark. Retail. 1 4 2007 10.1504/IJEMR.2007.014847
-
(2007)
Int. J. Electron. Mark. Retail.
, vol.1
, Issue.4
-
-
Hou, J.1
Rego, C.2
-
112
-
-
8344248769
-
Design and implementation of a secure multi-agent marketplace
-
Ashutosh Jaiswal, Yongdae Kim, and Maria Gini Design and implementation of a secure multi-agent marketplace Electron. Commer. Res. Appl. 3 4 2004 355 368 10.1016/j.elerap.2004.06.005
-
(2004)
Electron. Commer. Res. Appl.
, vol.3
, Issue.4
, pp. 355-368
-
-
Jaiswal, A.1
Kim, Y.2
Gini, M.3
-
113
-
-
33947404714
-
Cheating in online auction - Towards explaining the popularity of English auction
-
Mamata Jenamani, Yuhui Zhong, and Bharat Bhargava Cheating in online auction - towards explaining the popularity of English auction Electron. Commer. Res. Appl. 6 1 2007 53 62 10.1016/j.elerap.2005.12.002
-
(2007)
Electron. Commer. Res. Appl.
, vol.6
, Issue.1
, pp. 53-62
-
-
Jenamani, M.1
Zhong, Y.2
Bhargava, B.3
-
114
-
-
84864427385
-
Employing transaction aggregation strategy to detect credit card fraud
-
Sanjeev Jha, Montserrat Guillen, and J. Christopher Westland Employing transaction aggregation strategy to detect credit card fraud Expert Syst. Appl. 39 16 2012 12650 12657 10.1016/j.eswa.2012.05.018
-
(2012)
Expert Syst. Appl.
, vol.39
, Issue.16
, pp. 12650-12657
-
-
Jha, S.1
Guillen, M.2
Westland, J.C.3
-
115
-
-
33845902575
-
A statistical process control approach to business activity monitoring
-
Wei Jiang, Tom Au, and Kwok-Leung Tsui A statistical process control approach to business activity monitoring IIE Trans. 39 2007 2007 235 249 10.1080/07408170600743912
-
(2007)
IIE Trans.
, vol.39
, Issue.2007
, pp. 235-249
-
-
Jiang, W.1
Au, T.2
Tsui, K.-L.3
-
117
-
-
79952396582
-
Research on credit card fraud detection model based on class weighted support vector machine
-
Chunhua Ju, and Qibei Lu Research on credit card fraud detection model based on class weighted support vector machine J. Converg. Inf. Technol. 6 1 2011 62 68 10.4156/jcit.vol6.issue1.8
-
(2011)
J. Converg. Inf. Technol.
, vol.6
, Issue.1
, pp. 62-68
-
-
Ju, C.1
Lu, Q.2
-
118
-
-
84861874796
-
A review of anomaly based intrusion detection systems
-
V. Jyothsna, and V.V. Rama Prasad A review of anomaly based intrusion detection systems Int. J. Comput. Appl. 28 7 2011 26 35
-
(2011)
Int. J. Comput. Appl.
, vol.28
, Issue.7
, pp. 26-35
-
-
Jyothsna, V.1
Rama Prasad, V.V.2
-
120
-
-
0142025124
-
Constructing support vector machine ensemble
-
Hyun-Chul Kim, Shaoning Pang, Hong-Mo Je, Daijin Kim, and Sung Yang Bang Constructing support vector machine ensemble Pattern Recognit. 36 12 2003 2757 2767 10.1016/S0031-3203(03)00175-4
-
(2003)
Pattern Recognit.
, vol.36
, Issue.12
, pp. 2757-2767
-
-
Kim, H.-C.1
Pang, S.2
Je, H.-M.3
Kim, D.4
Bang, S.Y.5
-
122
-
-
84925601568
-
A fraud detection approach with data mining in health insurance
-
Melih Kirlidog, and Cuneyt Asuk A fraud detection approach with data mining in health insurance Procedia - Soc. Behav. Sci. 62 2012 989 994 10.1016/j.sbspro.2012.09.168
-
(2012)
Procedia - Soc. Behav. Sci.
, vol.62
, pp. 989-994
-
-
Kirlidog, M.1
Asuk, C.2
-
123
-
-
19844377332
-
Data mining applications in healthcare
-
Hian Chye Koh, and Gerald Tan Data mining applications in healthcare J. Healthc. Inf. Manag. 19 2 2005 64 72
-
(2005)
J. Healthc. Inf. Manag.
, vol.19
, Issue.2
, pp. 64-72
-
-
Koh, H.C.1
Tan, G.2
-
126
-
-
2942674608
-
Survey of fraud detection techniques
-
3
-
Kou, Yufeng, Lu, Chang-tien, Sinvongwattana, Sirirat, 2004. Survey of fraud detection techniques. In: Proceedings of 2004 IEEE International Conference on Networking Sensing and Control. 2, 3, pp. 749-754.
-
(2004)
Proceedings of 2004 IEEE International Conference on Networking Sensing and Control
, vol.2
, pp. 749-754
-
-
Kou, Y.1
Lu, C.-T.2
Sinvongwattana, S.3
-
127
-
-
1942515438
-
-
Sa/ueso D/uezeroski, (Ed.). Springer-Verlag, New York, Inc., New York, NY, USA
-
Kramer, Stefan, Lavrač, Nada, Flach, Peter, 2000. Relational Data Mining. In Sa/ueso D/uezeroski, (Ed.). Springer-Verlag, New York, Inc., New York, NY, USA, pp. 262-286.
-
(2000)
Relational Data Mining
, pp. 262-286
-
-
Kramer, S.1
Lavrač, N.2
Flach, P.3
-
128
-
-
61349161111
-
Bidirectional artificial neural networks for mobile-phone fraud detection
-
Andrej Krenker, Mojca Volk, Urban Sedlar, Janez Bešter, and Andrej Kos Bidirectional artificial neural networks for mobile-phone fraud detection ETRI J. 31 1 2009 92 94 10.4218/etrij.09.0208.0245
-
(2009)
ETRI J.
, vol.31
, Issue.1
, pp. 92-94
-
-
Krenker, A.1
Volk, M.2
Sedlar, U.3
Bešter, J.4
Kos, A.5
-
129
-
-
77951204543
-
A hybrid model for plastic card fraud detection systems
-
M. Krivko A hybrid model for plastic card fraud detection systems Expert Syst. Appl. 37 8 2010 6070 6076 10.1016/j.eswa.2010.02.119
-
(2010)
Expert Syst. Appl.
, vol.37
, Issue.8
, pp. 6070-6076
-
-
Krivko, M.1
-
130
-
-
38049173517
-
-
Ku, Yungchang, Chen, Yuchi, Chiu, Chaochang, 2007. A Proposed Data Mining Approach for Internet Auction Fraud Detection. pp. 238-243.
-
(2007)
A Proposed Data Mining Approach for Internet Auction Fraud Detection
, pp. 238-243
-
-
Ku, Y.1
Chen, Y.2
Chiu, C.3
-
131
-
-
84894637042
-
Credit card fraud detection using Hidden Markov Model - A survey
-
Nitu Kumari, S. Kannan, and A. Muthukumaravel Credit card fraud detection using Hidden Markov Model - a survey Middle-East J. Sci. Res. 20 6 2014 697 699 10.5829/idosi.mejsr.2014.20.06.11387
-
(2014)
Middle-East J. Sci. Res.
, vol.20
, Issue.6
, pp. 697-699
-
-
Kumari, N.1
Kannan, S.2
Muthukumaravel, A.3
-
132
-
-
70450272526
-
BLAST-SSAHA hybridization for credit card fraud detection
-
A. Kundu, S. Panigrahi, S. Sural, and A.K. Majumdar BLAST-SSAHA hybridization for credit card fraud detection IEEE Trans. Dependable Secur. Comput. 6 4 2009 309 315
-
(2009)
IEEE Trans. Dependable Secur. Comput.
, vol.6
, Issue.4
, pp. 309-315
-
-
Kundu, A.1
Panigrahi, S.2
Sural, S.3
Majumdar, A.K.4
-
133
-
-
85017038101
-
-
Kundu, Amlan, Sural, Shamik, Majumdar, A.K., 2006. Two-Stage Credit Card Fraud Detection Using Sequence Alignment. pp. 260-275.
-
(2006)
Two-Stage Credit Card Fraud Detection Using Sequence Alignment
, pp. 260-275
-
-
Kundu, A.1
Sural, S.2
Majumdar, A.K.3
-
135
-
-
84856964446
-
Analysis of preprocessing vs. cost-sensitive learning for imbalanced classification. Open problems on intrinsic data characteristics
-
Victoria López, Alberto Fernández, Jose G. Moreno-Torres, and Francisco Herrera Analysis of preprocessing vs. cost-sensitive learning for imbalanced classification. Open problems on intrinsic data characteristics Expert Syst. Appl. 39 7 2012 6585 6608 10.1016/j.eswa.2011.12.043
-
(2012)
Expert Syst. Appl.
, vol.39
, Issue.7
, pp. 6585-6608
-
-
López, V.1
Fernández, A.2
Moreno-Torres, J.G.3
Herrera, F.4
-
137
-
-
77949731575
-
Temporal sequence learning and data reduction for anomaly detection
-
T. Lane, and C.E. Brodley Temporal sequence learning and data reduction for anomaly detection ACM Trans. Inf. Syst. Secur. 2 3 1999 295 331
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.3
, pp. 295-331
-
-
Lane, T.1
Brodley, C.E.2
-
138
-
-
71549163133
-
Empirical analysis of online auction fraud: Credit card phantom transactions
-
Byungtae Lee, Hyungjun Cho, Myungsin Chae, and Seonyoung Shim Empirical analysis of online auction fraud: credit card phantom transactions Expert Syst. Appl. 37 4 2010 2991 2999 10.1016/j.eswa.2009.09.034
-
(2010)
Expert Syst. Appl.
, vol.37
, Issue.4
, pp. 2991-2999
-
-
Lee, B.1
Cho, H.2
Chae, M.3
Shim, S.4
-
140
-
-
49549089070
-
A survey on statistical methods for health care fraud detection
-
Jing Li, Kuei-Ying Huang, Jionghua Jin, and Jianjun Shi A survey on statistical methods for health care fraud detection Health Care Manag. Sci. 11 3 2008 275 287 10.1007/s10729-007-9045-4
-
(2008)
Health Care Manag. Sci.
, vol.11
, Issue.3
, pp. 275-287
-
-
Li, J.1
Huang, K.-Y.2
Jin, J.3
Shi, J.4
-
141
-
-
33644606618
-
An electronic online bidding auction protocol with both security and efficiency
-
Horng-Twu Liaw, Wen-Shenq Juang, and Chi-Kai Lin An electronic online bidding auction protocol with both security and efficiency Appl. Math. Comput. 174 2 2006 1487 1497 10.1016/j.amc.2005.06.016
-
(2006)
Appl. Math. Comput.
, vol.174
, Issue.2
, pp. 1487-1497
-
-
Liaw, H.-T.1
Juang, W.-S.2
Lin, C.-K.3
-
142
-
-
84862785741
-
Combining ranking concept and social network analysis to detect collusive groups in online auctions
-
Shi-Jen Lin, Yi-Ying Jheng, and Cheng-Hsien Yu Combining ranking concept and social network analysis to detect collusive groups in online auctions Expert Syst. Appl. 39 10 2012 9079 9086 10.1016/j.eswa.2012.02.039
-
(2012)
Expert Syst. Appl.
, vol.39
, Issue.10
, pp. 9079-9086
-
-
Lin, S.-J.1
Jheng, Y.-Y.2
Yu, C.-H.3
-
147
-
-
78649273501
-
Using stereotypes to identify risky transactions in internet auctions
-
August
-
Liu, Xin, Kaszuba, Tomasz, Nielek, Radoslaw, Datta, Anwitaman, Wierzbicki, Adam, 2010. Using stereotypes to identify risky transactions in internet auctions. In: Proceedings of the 2010 IEEE Second International Conference on Social Computing. August, pp. 513-520. DOI:http://dx.doi.org/10.1109/SocialCom.2010.81.
-
(2010)
Proceedings of the 2010 IEEE Second International Conference on Social Computing
, pp. 513-520
-
-
Liu, X.1
Kaszuba, T.2
Nielek, R.3
Datta, A.4
Wierzbicki, A.5
-
150
-
-
33746060889
-
-
Lu, Fletcher, Boritz, J. Efrim, Covvey, Dominic, 2006. Adaptive Fraud Detection Using Benford' s Law. pp. 347-358.
-
(2006)
Adaptive Fraud Detection Using Benford' S Law
, pp. 347-358
-
-
Lu, F.1
Boritz, J.E.2
Covvey, D.3
-
152
-
-
24944572367
-
Credit card fraud detection using Bayesian and neural networks
-
Maes, Sam, Tuyls, Karl, Vanschoenwinkel, Bram, Manderick, Bernard, 2002. Credit card fraud detection using Bayesian and neural networks. In: Proceedings of the 1st international Naiso Congress on Neuro Fuzzy Technologies.
-
(2002)
Proceedings of the 1st International Naiso Congress on Neuro Fuzzy Technologies
-
-
Maes, S.1
Tuyls, K.2
Vanschoenwinkel, B.3
Manderick, B.4
-
153
-
-
84964424738
-
-
Tumaini University Iringa University College. Cyber Crime. Prepared by Asherry Magalla (LL. M-ICT LAW-10919), Supervised by Dr. Puluru (2013)
-
Magalla, Asherry, 2013. Security, Prevention and Detection of Cyber Crimes. Tumaini University Iringa University College. Cyber Crime. Prepared by Asherry Magalla (LL. M-ICT LAW-10919), Supervised by Dr. Puluru (2013).
-
(2013)
Security, Prevention and Detection of Cyber Crimes
-
-
Magalla, A.1
-
154
-
-
75649102422
-
A decision support tool for identifying abuse of controlled substances by forward health medicaid members
-
Allan T. Mailloux, Stephen W. Cummings, and Mrinal Mugdh A decision support tool for identifying abuse of controlled substances by forward health medicaid members J. Hosp. Mark. Public Relat. 2010 37 41 10.1080/15390940903450982
-
(2010)
J. Hosp. Mark. Public Relat.
, pp. 37-41
-
-
Mailloux, A.T.1
Cummings, S.W.2
Mugdh, M.3
-
155
-
-
1842555752
-
EFD: A hybrid knowledge/statistical-based system for the detection of fraud
-
John A. Major, and Dan R. Riedinger EFD: A hybrid knowledge/statistical-based system for the detection of fraud J. Risk Insur. 69 3 2002 309 324
-
(2002)
J. Risk Insur.
, vol.69
, Issue.3
, pp. 309-324
-
-
Major, J.A.1
Riedinger, D.R.2
-
157
-
-
77954702908
-
Fraud detection in reputation systems in e-markets using logistic regression categories and subject descriptors
-
São Paulo
-
Maranzato, Rafael, Pereira, Adriano, 2010. Fraud detection in reputation systems in e-markets using logistic regression categories and subject descriptors. In: Proceedings of the 2010 ACM Symposium on Applied Computing. São Paulo, pp. 1454-1459.
-
(2010)
Proceedings of the 2010 ACM Symposium on Applied Computing
, pp. 1454-1459
-
-
Maranzato, R.1
Pereira, A.2
-
158
-
-
84964541813
-
Proposal of credit card fraudulent use detection by online-type decision tree construction and verification of generality
-
Tatsuya Minegishi, and Ayahiko Niimi Proposal of credit card fraudulent use detection by online-type decision tree construction and verification of generality Int. J. Inf. Secur. Res. 1 4 2011 229 235
-
(2011)
Int. J. Inf. Secur. Res.
, vol.1
, Issue.4
, pp. 229-235
-
-
Minegishi, T.1
Niimi, A.2
-
159
-
-
77649289374
-
Telecommunication fraud prediction using backpropagation neural network
-
Mohamed, Azlinah, Bandi, Ahmad Fuad Mohamed, Tamrin, Abdul Razif, Jaafar, Md Daud, Hasan, Suriah, Jusof, Faeizah, 2009. Telecommunication fraud prediction using backpropagation neural network. In: Proceedings of International Conference on Soft Computing and Pattern Recognition. pp. 259-265. http://dx.doi.org/10.1109/SoCPaR.2009.60.
-
(2009)
Proceedings of International Conference on Soft Computing and Pattern Recognition
, pp. 259-265
-
-
Mohamed, A.1
Bandi, A.F.M.2
Tamrin, A.R.3
Jaafar, Md.D.4
Hasan, S.5
Jusof, F.6
-
161
-
-
84956705634
-
Detection of mobile phone fraud using supervised neural networks : a first prototype
-
Elektrotechniek Esat, and Katholieke Universiteit Leuven
-
Moreau, Yves, Verrelst, Herman, Vandewalle, Joos, 1997. Detection of mobile phone fraud using supervised neural networks: a first prototype. In: Proceedings of the International Conference on Art@cial Neural Networks Proceedings, ICA'97. pp.1065-1070, Elektrotechniek Esat, and Katholieke Universiteit Leuven.
-
(1997)
Proceedings of the International Conference on Art@cial Neural Networks Proceedings, ICA'97
, pp. 1065-1070
-
-
Moreau, Y.1
Verrelst, H.2
Vandewalle, J.3
-
164
-
-
77957833052
-
Two models to investigate medicare fraud within unsupervised databases
-
Rasim Muzaffer Musal Two models to investigate medicare fraud within unsupervised databases Expert Syst. Appl. 37 12 2010 8628 8633 10.1016/j.eswa.2010.06.095
-
(2010)
Expert Syst. Appl.
, vol.37
, Issue.12
, pp. 8628-8633
-
-
Musal, R.M.1
-
165
-
-
79951733735
-
Detecting non-compliant consumers in spatio-temporal health data: A case study from medicare Australia
-
December
-
Ng, K.S., et al., 2010. Detecting non-compliant consumers in spatio-temporal health data: a case study from medicare Australia. In: Proceedings of the 2010 IEEE International Conference on Data Mining Workshop. December, pp. 613-622. http://dx.doi.org/110.1109/ICDMW.2010.146
-
(2010)
Proceedings of the 2010 IEEE International Conference on Data Mining Workshop
, pp. 613-622
-
-
Ng, K.S.1
-
166
-
-
78651084785
-
The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature
-
E.W.T. Ngai, Yong Hu, Y.H. Wong, Yijun Chen, and Xin Sun The application of data mining techniques in financial fraud detection: a classification framework and an academic review of literature Decis. Support Syst. 50 3 2011 559 569 10.1016/j.dss.2010.08.006
-
(2011)
Decis. Support Syst.
, vol.50
, Issue.3
, pp. 559-569
-
-
Ngai, E.W.T.1
Wong, Y.H.Y.H.2
Chen, Y.3
Sun, X.4
-
167
-
-
84947906400
-
A review on a classification framework for supporting decision making in crime prevention
-
N.M.M. Noor, S.Ha Hamid, R. Mohemad, Ma Jalil, and M.S. Hitam A review on a classification framework for supporting decision making in crime prevention J. Artif. Intell. 2015 10.3923/jai.2015.17.34
-
(2015)
J. Artif. Intell.
-
-
Noor, N.M.M.1
Hamid, S.H.2
Mohemad, R.3
Jalil, M.4
Hitam, M.S.5
-
169
-
-
79960342438
-
Data mining application in credit card fraud detection system
-
Francisca Nonyelum Ogwueleka Data mining application in credit card fraud detection system J. Eng. Sci. Technol. 6 3 2011 311 322
-
(2011)
J. Eng. Sci. Technol.
, vol.6
, Issue.3
, pp. 311-322
-
-
Ogwueleka, F.N.1
-
170
-
-
84155186545
-
A probabilistic approach to fraud detection in telecommunications
-
Dominik Olszewski A probabilistic approach to fraud detection in telecommunications Knowl.-Based Syst 26 2012 246 258 10.1016/j.knosys.2011.08.018
-
(2012)
Knowl.-Based Syst
, vol.26
, pp. 246-258
-
-
Olszewski, D.1
-
171
-
-
70350229997
-
Credit card transactions, fraud detection, and machine learning: Modelling time with LSTM recurrent neural networks
-
Omlin, Christian, Bénard, Wiese, 2009. Credit card transactions, fraud detection, and machine learning: modelling time with LSTM recurrent neural networks. Innovations in Neural Information Paradigms and Applications. pp. 231-268.
-
(2009)
Innovations in Neural Information Paradigms and Applications
, pp. 231-268
-
-
Omlin, C.1
Bénard, W.2
-
173
-
-
0031140709
-
Internet security: Firewalls and beyond
-
Rolf Oppliger Internet security: firewalls and beyond Commun. ACM 40 5 1997 92 102 10.1145/253769.253802
-
(1997)
Commun. ACM
, vol.40
, Issue.5
, pp. 92-102
-
-
Oppliger, R.1
-
176
-
-
27244447720
-
-
Pérez, Jesús M., Muguerza, Javier, Arbelaitz, Olatz, Gurrutxaga, Ibai, Martín, José I., 2005. Consolidated Tree Classifier Learning in a Car Insurance Fraud Detection Domain with Class Imbalance. pp. 381-389.
-
(2005)
Consolidated Tree Classifier Learning in a Car Insurance Fraud Detection Domain with Class Imbalance
, pp. 381-389
-
-
Pérez, J.M.1
Muguerza, J.2
Arbelaitz, O.3
Gurrutxaga, I.4
Martín, J.I.5
-
178
-
-
21744453381
-
A fuzzy-based algorithm for auditors to detect elements of fraud in settled insurance claims
-
Jagdish Pathak, Navneet Vidyarthi, and Scott L. Summers A fuzzy-based algorithm for auditors to detect elements of fraud in settled insurance claims Manag. Audit. J. 20 6 2005 632 644 10.1108/02686900510606119
-
(2005)
Manag. Audit. J.
, vol.20
, Issue.6
, pp. 632-644
-
-
Pathak, J.1
Vidyarthi, N.2
Summers, S.L.3
-
179
-
-
84964449917
-
Credit card fraud detection using neural network
-
13-14
-
Raghavendra Patidar, and Lokesh Sharma Credit card fraud detection using neural network Int. J. Soft. Comput. Eng. 2011 13-14
-
(2011)
Int. J. Soft. Comput. Eng.
-
-
Patidar, R.1
Sharma, L.2
-
180
-
-
77950933669
-
Invited paper: Profiling intelligent systems applications in fraud detection and prevention: Survey of research articles
-
IEEE
-
Pejic-Bach, Mirjana, 2010. Invited paper: profiling intelligent systems applications in fraud detection and prevention: survey of research articles. In: Proceedings of the 2010 International Conference on Intelligent Systems, Modelling and Simulation. IEEE, pp. 80-85. http://dx.doi.org/10.1109/ISMS.2010.26
-
(2010)
Proceedings of the 2010 International Conference on Intelligent Systems, Modelling and Simulation
, pp. 80-85
-
-
Pejic-Bach, M.1
-
181
-
-
84897441955
-
Credit card fraud detection based on behavior mining
-
Nimisha Philip, and K.K. Sherly Credit card fraud detection based on behavior mining TIST Int. J. Sci. Technol. 2012 7 12
-
(2012)
TIST Int. J. Sci. Technol.
, pp. 7-12
-
-
Philip, N.1
Sherly, K.K.2
-
182
-
-
33750951681
-
A comprehensive survey of data mining-based fraud detection research
-
Clifton Phua, Vincent Lee, Kate Smith, and Ross Gayler A comprehensive survey of data mining-based fraud detection research Artif. Intell. Rev. 2005
-
(2005)
Artif. Intell. Rev.
-
-
Phua, C.1
Lee, V.2
Smith, K.3
Gayler, R.4
-
183
-
-
84856412670
-
Resilient identity crime detection
-
Clifton Phua, Kate Smith-Miles, Vincent Lee, and Ross Gayler Resilient identity crime detection IEEE Trans. Knowl. Data Eng. 24 3 2012 533 546 10.1109/TKDE.2010.262
-
(2012)
IEEE Trans. Knowl. Data Eng.
, vol.24
, Issue.3
, pp. 533-546
-
-
Phua, C.1
Smith-Miles, K.2
Lee, V.3
Gayler, R.4
-
184
-
-
34249051346
-
Selection bias and auditing policies for insurance claims
-
Jean Pinquet Selection bias and auditing policies for insurance claims J. Risk Insur. 74 2 2007 425 440
-
(2007)
J. Risk Insur.
, vol.74
, Issue.2
, pp. 425-440
-
-
Pinquet, J.1
-
185
-
-
84938911983
-
-
University of Manchester (A dissertation submitted to the University of Manchester Giannis Potamitis School of Computer Science Table of Contents)
-
Giannis Potamitis Design and Implementation of a Fraud Detection Expert System Using Ontology - Based Techniques 2013 University of Manchester (A dissertation submitted to the University of Manchester Giannis Potamitis School of Computer Science Table of Contents)
-
(2013)
Design and Implementation of a Fraud Detection Expert System Using Ontology - Based Techniques
-
-
Potamitis, G.1
-
186
-
-
84890882574
-
-
Pozzolo, Andrea Dal, Caelen, Olivier, Waterschoot, Serge, Bontempi, Gianluca, 2013. Racing for Unbalanced Methods Selection. pp. 24-31.
-
(2013)
Racing for Unbalanced Methods Selection
, pp. 24-31
-
-
Pozzolo, A.D.1
Caelen, O.2
Waterschoot, S.3
Bontempi, G.4
-
187
-
-
78650525011
-
Fraudulent call detection for mobile networks
-
June
-
Qayyum, Sameer, Mansoor, Shaheer, Khalid, Adeel, Halim, Zahid, Baig, A. Rau, 2010. Fraudulent call detection for mobile networks. In: Proceedings of 2010 International Conference on Information and Emerging Technologies. June, pp. 1-5. http://dx.doi.org/10.1109/ICIET.2010.5625718.
-
(2010)
Proceedings of 2010 International Conference on Information and Emerging Technologies
, pp. 1-5
-
-
Qayyum, S.1
Mansoor, S.2
Khalid, A.3
Halim, Z.4
Baig, A.R.5
-
188
-
-
84964551386
-
Fraud detection in telecommunication: A rough fuzzy set based approach. Information Technology
-
Kunming, 12-15 July 2008, Hong Kong
-
Qian, Yu-hua, 2008. Fraud detection in telecommunication: a rough fuzzy set based approach. Information Technology, In: Proceedings of the Seventh International Conference on Machine Learning and Cybernetics, Kunming, 12-15 July 2008, Hong Kong, pp. 12-15.
-
(2008)
Proceedings of the Seventh International Conference on Machine Learning and Cybernetics
, pp. 12-15
-
-
Qian, Y.-H.1
-
189
-
-
48749094245
-
Real-time credit card fraud detection using computational intelligence
-
Jon T.S. Quah, and M. Sriganesh Real-time credit card fraud detection using computational intelligence Expert Syst. Appl. 35 4 2008 1721 1732 10.1016/j.eswa.2007.08.093
-
(2008)
Expert Syst. Appl.
, vol.35
, Issue.4
, pp. 1721-1732
-
-
Quah, J.T.S.1
Sriganesh, M.2
-
190
-
-
79957490698
-
Analysis on Credit Card Fraud Detection Methods
-
18th & 19th March, 2011
-
Raj, S. Benson Edwin, Portia, A. Annie, 2011. Analysis on Credit Card Fraud Detection Methods. International Conference on Computer, Communication and Electrical Technology - ICCCET2011, 18th & 19th March, 2011
-
(2011)
International Conference on Computer, Communication and Electrical Technology - ICCCET2011
-
-
Raj, S.B.E.1
Portia, A.A.2
-
191
-
-
80052787167
-
A survey on fraud and service misuse in voice over IP (VoIP) networks
-
Yacine Rebahi, Mohamed Nassar, Thomas Magedanz, and Olivier Festor A survey on fraud and service misuse in voice over IP (VoIP) networks Inf. Secur. Tech. Rep. 16 1 2011 12 19 10.1016/j.istr.2010.10.012
-
(2011)
Inf. Secur. Tech. Rep.
, vol.16
, Issue.1
, pp. 12-19
-
-
Rebahi, Y.1
Nassar, M.2
Magedanz, T.3
Festor, O.4
-
192
-
-
0002101577
-
Reputation systems: Facilitating trust in internet interactions
-
Paul Resnick, Richard Zeckhauser, Eric Friedman, and Ko Kuwabara Reputation systems: facilitating trust in internet interactions Commun. ACM 43 12 2000 45 48 10.1145/355112.355122
-
(2000)
Commun. ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Zeckhauser, R.2
Friedman, E.3
Kuwabara, K.4
-
195
-
-
81255213868
-
Exponentially weighted moving average charts for detecting concept drift
-
Gordon J. Ross, Niall M. Adams, Dimitris K. Tasoulis, and David J. Hand Exponentially weighted moving average charts for detecting concept drift Pattern Recognit. Lett. 33 2 2012 191 198 10.1016/j.patrec.2011.08.019
-
(2012)
Pattern Recognit. Lett.
, vol.33
, Issue.2
, pp. 191-198
-
-
Ross, G.J.1
Adams, N.M.2
Tasoulis, D.K.3
Hand, D.J.4
-
196
-
-
0002688690
-
-
Rosset, Saharon, Murad, Uzi, Neumann, Einat, Idan, Yizhak, Pinkas, Gadi, Amdocs Israel Ld, 1999. Discovery of Fraud Rules for Telecommunications Challenges and Solutions. pp. 409-413.
-
(1999)
Discovery of Fraud Rules for Telecommunications Challenges and Solutions
, pp. 409-413
-
-
Rosset, S.1
Murad, U.2
Neumann, E.3
Idan, Y.4
Pinkas, G.5
Amdocs, I.Ld.6
-
198
-
-
38449087399
-
-
Sánchez-Maroño, N., Alonso-Betanzos, A., Tombilla-Snaromán, M., 2007. Filter methods for feature selection - a comparative study... Data Eng..... pp. 178-187.
-
(2007)
Filter Methods for Feature Selection - a Comparative Study ... Data Eng. ....
, pp. 178-187
-
-
Sánchez-Maroño, N.1
Alonso-Betanzos, A.2
Tombilla-Snaromán, M.3
-
199
-
-
84878939025
-
A cost-sensitive decision tree approach for fraud detection
-
Yusuf Sahin, Serol Bulkan, and Ekrem Duman A cost-sensitive decision tree approach for fraud detection Expert Syst. Appl. 40 15 2013 5916 5923 10.1016/j.eswa.2013.05.021
-
(2013)
Expert Syst. Appl.
, vol.40
, Issue.15
, pp. 5916-5923
-
-
Sahin, Y.1
Bulkan, S.2
Duman, E.3
-
202
-
-
84904396148
-
-
11
-
Saravanan, P., Subramaniyaswamy, V., Sivaramakrishnan, N., Arun Prakash, M., Arunkumar, T., 2014. Data Mining Approach For Subscription-Fraud Detection in Telecommunication Sector. 7, 11, pp. 515-522.
-
(2014)
Data Mining Approach for Subscription-Fraud Detection in Telecommunication Sector
, vol.7
, pp. 515-522
-
-
Saravanan, P.1
Subramaniyaswamy, V.2
Sivaramakrishnan, N.3
Arun Prakash, M.4
Arunkumar, T.5
-
203
-
-
84964487278
-
A defense mechanism for credit card fraud detection
-
M. Sasirekha A defense mechanism for credit card fraud detection Int. J. Cryptogr. Inf. Secur. 2 3 2012 89 100 10.5121/ijcis.2012.2308
-
(2012)
Int. J. Cryptogr. Inf. Secur.
, vol.2
, Issue.3
, pp. 89-100
-
-
Sasirekha, M.1
-
204
-
-
84868306754
-
-
Sasirekha, M., Thaseen, I. Sumaiya, Banu, J. Saira, 2012. An Integrated Intrusion Detection System for Credit Card Fraud Detection. pp. 55-60.
-
(2012)
An Integrated Intrusion Detection System for Credit Card Fraud Detection
, pp. 55-60
-
-
Sasirekha, M.1
Thaseen, I.S.2
Banu, J.S.3
-
205
-
-
84929941906
-
FraudMiner: A novel credit card fraud detection model based on frequent itemset mining
-
K.R. Seeja, and Masoumeh Zareapoor FraudMiner: a novel credit card fraud detection model based on frequent itemset mining Sci. World J. 2014 2014
-
(2014)
Sci. World J.
, pp. 2014
-
-
Seeja, K.R.1
Zareapoor, M.2
-
206
-
-
84939561099
-
-
4
-
Sethi, Neha, Gera, Anju, 2014. A Revived Survey of Various Credit Card Fraud Detection Techniques. 3, 4, pp. 780-791.
-
(2014)
A Revived Survey of Various Credit Card Fraud Detection Techniques
, vol.3
, pp. 780-791
-
-
Sethi, N.1
Gera, A.2
-
207
-
-
23144461964
-
-
Shah, Harshit S., Joshi, Neeraj R., Sureka, Ashish, Wurman, Peter R., 2003. Mining eBay: Bidding Strategies and Shill Detection. pp. 17-34.
-
(2003)
Mining EBay : Bidding Strategies and Shill Detection
, pp. 17-34
-
-
Shah, H.S.1
Joshi, N.R.2
Sureka, A.3
Wurman, P.R.4
-
208
-
-
84964424390
-
-
Shan, Yin, Jeacocke, David Murray, D. Wayne, Sutinen, Alison, 2008. Mining Medical Specialist Billing Patterns for Health Service Management.
-
(2008)
Mining Medical Specialist Billing Patterns for Health Service Management
-
-
Shan, Y.1
Jeacocke, D.2
Murray, D.W.3
Sutinen, A.4
-
209
-
-
0036921036
-
-
Shao, Hua, Zhao, Hong, Chang, Gui-Ran, 2002. Applying data mining to detect fraud behavior in customs declaration. pp. 1241-1244.
-
(2002)
Applying Data Mining to Detect Fraud Behavior in Customs Declaration
, pp. 1241-1244
-
-
Shao, H.1
Zhao, H.2
Chang, G.-R.3
-
210
-
-
0011876772
-
Detection of fraud in mobile telecommunications
-
John Shawe-Taylor, and Keith Howkev Detection of fraud in mobile telecommunications Inf. Secur. Tech. Rep. 4 1 1999 16 28
-
(1999)
Inf. Secur. Tech. Rep.
, vol.4
, Issue.1
, pp. 16-28
-
-
Shawe-Taylor, J.1
Howkev, K.2
-
212
-
-
84964424405
-
A survey on hidden markov model for credit card fraud detection
-
Anshul Singh, and Devesh Narayan A survey on hidden markov model for credit card fraud detection Int. J. Eng. Adv. Technol. 3 2012 49 52
-
(2012)
Int. J. Eng. Adv. Technol.
, vol.3
, pp. 49-52
-
-
Singh, A.1
Narayan, D.2
-
214
-
-
39049142137
-
Credit card fraud detection using hidden markov model
-
Abhinav Srivastava, Amlan Kundu, Shamik Sural, and Senior Member Credit card fraud detection using hidden markov model IEEE Trans. Dependable Secur. Comput. 5 1 2008 37 48
-
(2008)
IEEE Trans. Dependable Secur. Comput.
, vol.5
, Issue.1
, pp. 37-48
-
-
Srivastava, A.1
Kundu, A.2
Sural, S.3
Member, S.4
-
215
-
-
0042961664
-
-
Stolfo, Salvatore J., Fan, David W. Lee, Wenke, Prodromidis, Andreas L., Chan, Philip K., 1997. Credit Card Fraud Detection Using Meta-learning : Issues and Initial Results. 1.
-
(1997)
Credit Card Fraud Detection Using Meta-learning : Issues and Initial Results
, pp. 1
-
-
Stolfo, S.J.1
Fan, D.W.2
Lee, W.3
Prodromidis, A.L.4
Chan, P.K.5
-
216
-
-
77956610365
-
An expert system for detecting automobile insurance fraud using social network analysis
-
Lovro Šubelj, Štefan Furlan, and Marko Bajec An expert system for detecting automobile insurance fraud using social network analysis Expert Syst. Appl. 38 2011 2011 1039 1052 10.1016/j.eswa.2010.07.143
-
(2011)
Expert Syst. Appl.
, vol.38
, Issue.2011
, pp. 1039-1052
-
-
Šubelj, L.1
Furlan, Š.2
Bajec, M.3
-
218
-
-
33746368048
-
Enhancing security using mobility-based anomaly detection in cellular mobile networks
-
Bo Sun, Fei Yu, Kui Wu, Yang Xiao, Senior Member, and Victor C.M. Leung Enhancing security using mobility-based anomaly detection in cellular mobile networks IEEE Trans. Veh. Technol. 55 4 2006 1385 1396
-
(2006)
IEEE Trans. Veh. Technol.
, vol.55
, Issue.4
, pp. 1385-1396
-
-
Sun, B.1
Yu, F.2
Wu, K.3
Xiao, Y.4
Member, S.5
Leung, V.C.M.6
-
219
-
-
0036454177
-
Parallel granular neural networks for fast credit card fraud detection
-
Syeda, Mubeena, Zbang, Yan-qing, Pan, Yi, 2002. Parallel granular neural networks for fast credit card fraud detection. In: Proceedings of the IEEE International Conference on Fuzzy Systems. pp. 572-577.
-
(2002)
Proceedings of the IEEE International Conference on Fuzzy Systems
, pp. 572-577
-
-
Syeda, M.1
Zbang, Y.-Q.2
Pan, Y.3
-
220
-
-
84870563744
-
-
Tang, Mingjian, Mendis, B. Sumudu U., Murray, D. Wayne, Hu, Yingsong, Sutinen, Alison, 2011. Unsupervised Fraud Detection in Medicare Australia. pp. 103-110.
-
(2011)
Unsupervised Fraud Detection in Medicare Australia
, pp. 103-110
-
-
Tang, M.1
Mendis, B.2
Sumudu, U.3
Murray, D.W.4
Hu, Y.5
Sutinen, A.6
-
221
-
-
84892142402
-
-
Taniguchi, Michiaki, Haft, Michael, Hollmkn, Jaakko, Tresp, Volker, 1998. Fraud Detection in Communication Networks Using Neural and. pp. 1241-1244.
-
(1998)
Fraud Detection in Communication Networks Using Neural and
, pp. 1241-1244
-
-
Taniguchi, M.1
Haft, M.2
Hollmkn, J.3
Tresp, V.4
-
222
-
-
84870734647
-
Insurance fraud identification research based on fuzzy support vector machine with dual membership
-
October
-
Tao, Han, Zhixin, Liu, Xiaodong, Song, 2012. Insurance fraud identification research based on fuzzy support vector machine with dual membership. In: Proceedings of the 2012 International Conference on Information Management Innovation Management and Industrial Enginerring. October, pp. 457-460. http://dx.doi.org/10.1109/ICIII.2012.6340016.
-
(2012)
Proceedings of the 2012 International Conference on Information Management Innovation Management and Industrial Enginerring
, pp. 457-460
-
-
Tao, H.1
Zhixin, L.2
Xiaodong, S.3
-
224
-
-
1842451171
-
Claims auditing in automobile insurance: Fraud detection and deterrence objectives
-
Sharon Tennyson, and Pau Forn Claims auditing in automobile insurance: fraud detection and deterrence objectives J. Risk Insur. 69 3 2002 289 308
-
(2002)
J. Risk Insur.
, vol.69
, Issue.3
, pp. 289-308
-
-
Tennyson, S.1
Forn, P.2
-
226
-
-
84902342885
-
Predicting healthcare fraud in medicaid: A multidimensional data model and analysis techniques for fraud detection
-
Dallas Thornton, Roland M. Mueller, Paulus Schoutsen, and Jos van Hillegersberg Predicting healthcare fraud in medicaid: a multidimensional data model and analysis techniques for fraud detection Procedia Technol. 9 2013 1252 1264 10.1016/j.protcy.2013.12.140
-
(2013)
Procedia Technol.
, vol.9
, pp. 1252-1264
-
-
Thornton, D.1
Mueller, R.M.2
Schoutsen, P.3
Van Hillegersberg, J.4
-
229
-
-
84903977673
-
Using CommonKADS method to build prototype system in medical insurance fraud detection
-
Yao-hsu Tsai, Chieh-heng Ko, and Kuo-chung Lin Using CommonKADS method to build prototype system in medical insurance fraud detection J. Netw. 9 7 2014 1798 1802 10.4304/jnw.9.7.1798-1802
-
(2014)
J. Netw.
, vol.9
, Issue.7
, pp. 1798-1802
-
-
Tsai, Y.-H.1
Ko, C.-H.2
Lin, K.-C.3
-
230
-
-
84890555064
-
Detecting online auction shilling frauds using supervised learning
-
Sidney Tsang, Yun Sing Koh, Gillian Dobbie, and Shafiq Alam Detecting online auction shilling frauds using supervised learning Expert Syst. Appl. 41 6 2014 3027 3040 10.1016/j.eswa.2013.10.033
-
(2014)
Expert Syst. Appl.
, vol.41
, Issue.6
, pp. 3027-3040
-
-
Tsang, S.1
Koh, Y.S.2
Dobbie, G.3
Alam, S.4
-
231
-
-
84873162384
-
Evaluating fraud detection algorithms using an auction data generator
-
IEEE
-
Tsang, Sidney, Dobbie, Gillian, Koh, Yun Sing, 2012. Evaluating fraud detection algorithms using an auction data generator. In: Proceedings of the 2012 IEEE 12th International Conference on Data Mining Workshops. IEEE, pp. 332-339. http://dx.doi.org/10.1109/ICDMW.2012.34.
-
(2012)
Proceedings of the 2012 IEEE 12th International Conference on Data Mining Workshops
, pp. 332-339
-
-
Tsang, S.1
Dobbie, G.2
Koh, Y.S.3
-
232
-
-
33947665534
-
Applying manufacturing batch techniques to fraud detection with incomplete customer information
-
Fugee Tsung, Zhihong Zhou, and Wei Jiang Applying manufacturing batch techniques to fraud detection with incomplete customer information IIE Trans. 39 6 2007 671 680 10.1080/07408170600897510
-
(2007)
IIE Trans.
, vol.39
, Issue.6
, pp. 671-680
-
-
Tsung, F.1
Zhou, Z.2
Jiang, W.3
-
234
-
-
3042636507
-
A case study of applying boosting naive bayes to claim fraud diagnosis
-
S. Viaene, R.A. Derrig, and G. Dedene A case study of applying boosting naive bayes to claim fraud diagnosis IEEE Trans. Knowl. Data Eng. 16 5 2004 612 620 10.1109/TKDE.2004.1277822
-
(2004)
IEEE Trans. Knowl. Data Eng.
, vol.16
, Issue.5
, pp. 612-620
-
-
Viaene, S.1
Derrig, R.A.2
Dedene, G.3
-
235
-
-
24144501096
-
Auto claim fraud detection using Bayesian learning neural networks
-
S. Viaene, G. Dedene, and R. Derrig Auto claim fraud detection using Bayesian learning neural networks Expert Syst. Appl. 29 3 2005 653 666 10.1016/j.eswa.2005.04.030
-
(2005)
Expert Syst. Appl.
, vol.29
, Issue.3
, pp. 653-666
-
-
Viaene, S.1
Dedene, G.2
Derrig, R.3
-
236
-
-
33749177736
-
Strategies for detecting fraudulent claims in the automobile insurance industry
-
Stijn Viaene, Mercedes Ayuso, Montserrat Guillen, Dirk Van Gheel, and Guido Dedene Strategies for detecting fraudulent claims in the automobile insurance industry Eur. J. Oper. Res. 176 1 2007 565 583 10.1016/j.ejor.2005.08.005
-
(2007)
Eur. J. Oper. Res.
, vol.176
, Issue.1
, pp. 565-583
-
-
Viaene, S.1
Ayuso, M.2
Guillen, M.3
Gheel, D.V.4
Dedene, G.5
-
238
-
-
3342889024
-
PumaMart: A parallel and autonomous agents based internet marketplace
-
Yan Wang, Kian-Lee Tan, and Jian Ren PumaMart: a parallel and autonomous agents based internet marketplace Electron. Commer. Res. Appl. 3 3 2004 294 310 10.1016/j.elerap.2004.01.003
-
(2004)
Electron. Commer. Res. Appl.
, vol.3
, Issue.3
, pp. 294-310
-
-
Wang, Y.1
Tan, K.-L.2
Ren, J.3
-
239
-
-
77952415079
-
-
Wang, Haixun, Fan, Wei, Yu, Philip S., Han, Jiawei, 2003. Mining Concept-Drifting Data Streams Using Ensemble Classifiers. pp. 226-235.
-
(2003)
Mining Concept-Drifting Data Streams Using Ensemble Classifiers
, pp. 226-235
-
-
Wang, H.1
Fan, W.2
Yu, P.S.3
Han, J.4
-
241
-
-
84878915608
-
Effective detection of sophisticated online banking fraud on extremely imbalanced data
-
Wei Wei, Jinjiu Li, Longbing Cao, Yuming Ou, and Jiahang Chen Effective detection of sophisticated online banking fraud on extremely imbalanced data World Wide Web 16 4 2012 449 475 10.1007/s11280-012-0178-0
-
(2012)
World Wide Web
, vol.16
, Issue.4
, pp. 449-475
-
-
Wei, W.1
Li, J.2
Cao, L.3
Ou, Y.4
Chen, J.5
-
242
-
-
1842555740
-
Quantitative methods for detecting fraudulent automobile bodily injury claims
-
HerbertI. Weisberg, and Derrig Richard A. Quantitative methods for detecting fraudulent automobile bodily injury claims Risques 35 1998 75 101
-
(1998)
Risques
, vol.35
, pp. 75-101
-
-
Weisberg HerbertI.1
Richard, A.D.2
-
243
-
-
77951866173
-
Discrete choice modeling for bundled automobile insurance policies
-
Chieh-Hua Wen, and Ming-Jyh Wang Discrete choice modeling for bundled automobile insurance policies J. East. Asia Soc. Transp. Stud. 6 2005 1914 1928
-
(2005)
J. East. Asia Soc. Transp. Stud.
, vol.6
, pp. 1914-1928
-
-
Wen, C.-H.1
Wang, M.-J.2
-
244
-
-
57849084755
-
Transaction aggregation as a strategy for credit card fraud detection
-
C. Whitrow, D.J. Hand, P. Juszczak, D. Weston, and N.M. Adams Transaction aggregation as a strategy for credit card fraud detection Data Min. Knowl. Discov. 18 1 2008 30 55 10.1007/s10618-008-0116-z
-
(2008)
Data Min. Knowl. Discov.
, vol.18
, Issue.1
, pp. 30-55
-
-
Whitrow, C.1
Hand, D.J.2
Juszczak, P.3
Weston, D.4
Adams, N.M.5
-
245
-
-
84855220790
-
Artificial immune systems for the detection of credit card fraud: An architecture, prototype and preliminary results
-
Nicholas Wong, Pradeep Ray, Greg Stephens, and Lundy Lewis Artificial immune systems for the detection of credit card fraud: an architecture, prototype and preliminary results Inf. Syst. J. 22 1 2012 53 76 10.1111/j.1365-2575.2011.00369.x
-
(2012)
Inf. Syst. J.
, vol.22
, Issue.1
, pp. 53-76
-
-
Wong, N.1
Ray, P.2
Stephens, G.3
Lewis, L.4
-
246
-
-
33751068050
-
A real-valued genetic algorithm to optimize the parameters of support vector machine for predicting bankruptcy
-
Chih-Hung Wu, Gwo-Hshiung Tzeng, Yeong-Jia Goo, and Wen-Chang Fang A real-valued genetic algorithm to optimize the parameters of support vector machine for predicting bankruptcy Expert Syst. Appl. 32 2 2007 397 408 10.1016/j.eswa.2005.12.008
-
(2007)
Expert Syst. Appl.
, vol.32
, Issue.2
, pp. 397-408
-
-
Wu, C.-H.1
Tzeng, G.-H.2
Goo, Y.-J.3
Fang, W.-C.4
-
247
-
-
70349978217
-
-
Xu, Haiping, Bates, Christopher K., Shatz, Sol M., 2009. Real-Time Model Checking for Shill Detection in Live Online Auctions∗. pp. 134-140.
-
(2009)
Real-Time Model Checking for Shill Detection in Live Online Auctions∗
, pp. 134-140
-
-
Xu, H.1
Bates, C.K.2
Shatz, S.M.3
-
248
-
-
80052009149
-
Random Rough Subspace Based Neural Network Ensemble for Insurance Fraud Detection
-
IEEE
-
Xu, Wei, Wang, Shengnan, Zhang, Dailing, Yang, Bo, 2011. Random Rough Subspace Based Neural Network Ensemble for Insurance Fraud Detection. In: Proceedings of the 2011 Fourth International Joint Conference on Computational Sciences and Optimization. IEEE, pp. 1276-1280. http://dx.doi.org/10.1109/CSO.2011.213.
-
(2011)
Proceedings of the 2011 Fourth International Joint Conference on Computational Sciences and Optimization
, pp. 1276-1280
-
-
Xu, W.1
Wang, S.2
Zhang, D.3
Yang, B.4
-
249
-
-
3543125360
-
On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms
-
Kenji Yamanishi, Jun-ichi Takeuchi, Graham Williams, and Peter Milne On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms Data Min. Knowl. Discov. 8 3 2004 275 300 10.1023/B:DAMI.0000023676.72185.7c
-
(2004)
Data Min. Knowl. Discov.
, vol.8
, Issue.3
, pp. 275-300
-
-
Yamanishi, K.1
Takeuchi, J.-I.2
Williams, G.3
Milne, P.4
-
250
-
-
33644780888
-
A process-mining framework for the detection of healthcare fraud and abuse
-
Wan-Shiou Yang, and San-Yih Hwang A process-mining framework for the detection of healthcare fraud and abuse Expert Syst. Appl. 31 1 2006 56 68 10.1016/j.eswa.2005.09.003
-
(2006)
Expert Syst. Appl.
, vol.31
, Issue.1
, pp. 56-68
-
-
Yang, W.-S.1
Hwang, S.-Y.2
-
252
-
-
0347031344
-
The effect of false-name bids in combinatorial auctions: New fraud in internet auctions
-
Makoto Yokoo, Yuko Sakurai, and Shigeo Matsubara The effect of false-name bids in combinatorial auctions: new fraud in internet auctions Games Econ. Behav. 46 1 2004 174 188 10.1016/S0899-8256(03)00045-9
-
(2004)
Games Econ. Behav.
, vol.46
, Issue.1
, pp. 174-188
-
-
Yokoo, M.1
Sakurai, Y.2
Matsubara, S.3
-
253
-
-
84897885608
-
Fraud detection in telecommunication industry using Gaussian mixed model
-
November
-
Yusoff, Mohd Izhan Mohd, Mohamed, Ibrahim, Bakar, Mohd. Rizam Abu, 2013. Fraud detection in telecommunication industry using Gaussian mixed model. In: Proceedings of the 2013 International Conference on Research and Innovation Information Systems. November, pp. 27-32. http://dx.doi.org/10.1109/ICRIIS.2013.6716681.
-
(2013)
Proceedings of the 2013 International Conference on Research and Innovation Information Systems
, pp. 27-32
-
-
Yusoff, M.I.M.1
Mohamed, I.2
Bakar Mohd., R.A.3
-
254
-
-
33749245586
-
Cost-sensitive learning by cost-proportionate example weighting
-
Zadrozny, Bianca, Langford, John, Abe, Naoki, 2003. Cost-sensitive learning by cost-proportionate example weighting. In: Proceedings of the 3rd IEEE International Conference on Data Mining, ICDM'03.
-
(2003)
Proceedings of the 3rd IEEE International Conference on Data Mining, ICDM'03
-
-
Zadrozny, B.1
Langford, J.2
Abe, N.3
-
255
-
-
84938917564
-
Analysis of credit card fraud detection techniques : based on certain design criteria
-
Masoumeh Zareapoor, and M. Afshar Alam Analysis of credit card fraud detection techniques : based on certain design criteria Int. J. Comput. Appl. 52 3 2012 35 42
-
(2012)
Int. J. Comput. Appl.
, vol.52
, Issue.3
, pp. 35-42
-
-
Zareapoor, M.1
Alam, M.A.2
-
256
-
-
48749095565
-
Credit card fraud detection using self-organizing maps
-
Vladimir Zaslavsky, and Anna Strizhak Credit card fraud detection using self-organizing maps Inf. Secur 18 2006 2006 48 63
-
(2006)
Inf. Secur
, vol.18
, Issue.2006
, pp. 48-63
-
-
Zaslavsky, V.1
Strizhak, A.2
-
257
-
-
80054038546
-
Health care fraud detection using nonnegative matrix factorization
-
IEEE
-
Zhu, Shunzhi, Wang, Yan, Wu, Yun, 2011. Health care fraud detection using nonnegative matrix factorization. In: Proceedings of the 2011 6th International Conference on Computer Science & Education, ICCSE. IEEE, pp. 499-503. DOI:http://dx.doi.org/10.1109/ICCSE.2011.6028688.
-
(2011)
Proceedings of the 2011 6th International Conference on Computer Science & Education, ICCSE
, pp. 499-503
-
-
Zhu, S.1
Wang, Y.2
Wu, Y.3
|