|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 686 occurrences of 433 keywords
|
|
|
Results
Found 3063 publication records. Showing 3062 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
114 | T. Maruthi Padmaja, Narendra Dhulipalla, P. Radha Krishna 0001, Raju S. Bapi, Arijit Laha |
An Unbalanced Data Classification Model Using Hybrid Sampling Technique for Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PReMI ![In: Pattern Recognition and Machine Intelligence, Second International Conference, PReMI 2007, Kolkata, India, December 18-22, 2007, Proceedings, pp. 341-348, 2007, Springer, 978-3-540-77045-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Hybrid Sampling and Data Mining, Fraud detection, VDM, SMOTE |
106 | Fletcher Lu |
Uncovering Fraud in Direct Marketing Data with a Fraud Auditing Case Builder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PKDD ![In: Knowledge Discovery in Databases: PKDD 2007, 11th European Conference on Principles and Practice of Knowledge Discovery in Databases, Warsaw, Poland, September 17-21, 2007, Proceedings, pp. 540-547, 2007, Springer, 978-3-540-74975-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Benford’s Law, Reinforcement Learning, Fraud Detection |
92 | Pedro Almeida, Marco Jorge, Luís Cortesão, Filipe Martins, Marco Vieira, Paulo Gomes |
Supporting Fraud Analysis in Mobile Telecommunications Using Case-Based Reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECCBR ![In: Advances in Case-Based Reasoning, 9th European Conference, ECCBR 2008, Trier, Germany, September 1-4, 2008. Proceedings, pp. 562-572, 2008, Springer, 978-3-540-85501-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
telecommunication fraud, case-based reasoning, fraud detection |
88 | Rodger Jamieson, Donald Winchester, Stephen Smith 0001 |
Development of a Conceptual Framework for Managing Identity Fraud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 157, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
88 | Antoinette Leung, Zhuang Yan, Simon Fong 0001 |
On Designing a Flexible E-Payment System with Fraud Detection Capability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 6-9 July 2004, San Diego, CA, USA, pp. 236-243, 2004, IEEE Computer Society, 0-7695-2098-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
82 | Saleh Al-Furiah, Lamia Al-Braheem |
Comprehensive study on methods of fraud prevention in credit card e-payment system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2009 - The Eleventh International Conference on Information Integration and Web-based Applications and Services, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 592-598, 2009, ACM, 978-1-60558-660-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
MTIO, fraud prevention, fraud detection, credit card |
82 | Chris van Aart, Valentina A. M. Tamma |
Agent mediated provision of insurance services: two case studies: fraud and repairs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 10th International Conference on Electronic Commerce 2008, Innsbruck, Austria, August 19-22, 2008, pp. 20:1-20:8, 2008, ACM, 978-1-60558-075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
agent mediated insurance settlement and fraud detection, claim handling, insurance domain, ontology, multi agents, e-business, fraud detection, B2B |
75 | Mohammad Behdad, Luigi Barone, Tim French 0002, Mohammed Bennamoun |
An investigation of real-valued accuracy-based learning classifier systems for electronic fraud detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO 2010, Proceedings, Portland, Oregon, USA, July 7-11, 2010, Companion Material, pp. 1893-1900, 2010, ACM, 978-1-4503-0073-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
XCSR, netw ork intrusion detection, learning classifier systems, fraud detection, genetics-based machine learning |
75 | Thomas C. Ormerod, Nicola J. Morley, Linden J. Ball, Charles Langley, Clive Spenser |
Using ethnography to design a mass detection tool (MDT) for the early discovery of insurance fraud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended abstracts of the 2003 Conference on Human Factors in Computing Systems, CHI 2003, Ft. Lauderdale, Florida, USA, April 5-10, 2003, pp. 650-651, 2003, ACM, 1-58113-637-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
automated knowledge updating, ethnography, bayesian belief networks, fraud detection, insurance |
69 | Luís Torgo |
Resource-Bounded Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EPIA Workshops ![In: Progress in Artificial Intelligence, 13th Portuguese Conference on Aritficial Intelligence, EPIA 2007, Workshops: GAIW, AIASTS, ALEA, AMITA, BAOSW, BI, CMBSB, IROBOT, MASTA, STCS, and TEMA, Guimarães, Portugal, December 3-7, 2007, Proceedings, pp. 449-460, 2007, Springer, 978-3-540-77000-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
69 | Zhaohao Sun, Gavin R. Finnie |
Experience Based Reasoning for Recognising Fraud and Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HIS ![In: 4th International Conference on Hybrid Intelligent Systems (HIS 2004), 5-8 December 2004, Kitakyushu, Japan, pp. 80-85, 2004, IEEE Computer Society, 0-7695-2291-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
69 | Bharat K. Bhargava, Yuhui Zhong, Yunhua Lu |
Fraud Formalization and Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DaWaK ![In: Data Warehousing and Knowledge Discovery, 5th International Conference, DaWaK 2003, Prague, Czech Republic, September 3-5,2003, Proceedings, pp. 330-339, 2003, Springer, 3-540-40807-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
66 | Mohammad Behdad, Tim French 0002, Luigi Barone, Mohammed Bennamoun |
On the problems of using learning classifier systems for fraud detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2010, Proceedings, Portland, Oregon, USA, July 7-11, 2010, pp. 1067-1068, 2010, ACM, 978-1-4503-0072-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
xcsr, learning classifier systems, fraud detection, genetics-based machine learning |
66 | Sankar Virdhagriswaran, Gordon Dakin |
Camouflaged fraud detection in domains with complex relationships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, PA, USA, August 20-23, 2006, pp. 941-947, 2006, ACM, 1-59593-339-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
accounting fraud, on-line intrusion analysis |
66 | Stijn Viaene, Richard A. Derrig, Guido Dedene |
A Case Study of Applying Boosting Naive Bayes to Claim Fraud Diagnosis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 16(5), pp. 612-620, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
claim fraud detection, Data mining, pattern recognition, knowledge discovery, decision support, classifier design and evaluation |
66 | Clifton Phua, Damminda Alahakoon, Vincent C. S. Lee |
Minority report in fraud detection: classification of skewed data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGKDD Explor. ![In: SIGKDD Explor. 6(1), pp. 50-59, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
multiple classifier systems, fraud detection, meta-learning |
64 | C. Corzo, F. Corzo S., Ning Zhang 0001, Andy Carpenter |
Using Automated Banking Certificates to Detect Unauthorised Financial Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers, pp. 36-51, 2006, Springer, 3-540-46255-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
financial fraud, Data integrity, Security architecture, Insider threats |
63 | Rafael Maranzato, Adriano C. M. Pereira, Alair Pereira do Lago, Marden Neubert |
Fraud detection in reputation systems in e-markets using logistic regression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 1454-1455, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
fraud evidence, trust management, logistic regression, reputation systems, fraud detection, e-markets |
61 | Christina LaComb, John Interrante, Kareem S. Aggour |
Monitoring key company events through deliberative learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. E Bus. Manag. ![In: Inf. Syst. E Bus. Manag. 5(4), pp. 295-317, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Deliberative learning, Financial statement fraud, Event detection, Fraud detection, Agent simulation, Financial analysis |
59 | Linfeng Zhang, Yong Guan |
Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 17-20 June 2008, Beijing, China, pp. 77-84, 2008, IEEE Computer Society, 978-0-7695-3172-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
59 | Michael Edward Edge, Pedro Sampaio 0001, Oliver Philpott, Mohammed Choudhary |
A Policy Distribution Service for Proactive Fraud Management over Financial Data Streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC (2) ![In: 2008 IEEE International Conference on Services Computing (SCC 2008), 8-11 July 2008, Honolulu, Hawaii, USA, pp. 31-38, 2008, IEEE Computer Society, 978-0-7695-3283-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
59 | Pallapa Venkataram, B. Sathish Babu, M. K. Naveen, G. H. Samyama Gungal |
A Method of Fraud & Intrusion Detection for E-payment Systems in Mobile e-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 26th IEEE International Performance Computing and Communications Conference, IPCCC 2007, April 11-13, 2007, New Orleans, Louisiana, USA, pp. 395-401, 2007, IEEE Computer Society, 1-4244-1138-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
59 | Pedro Gabriel Ferreira, Ronnie Alves, Orlando Belo, Luís Cortesão |
Establishing Fraud Detection Patterns Based on Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Advances in Data Mining, Applications in Medicine, Web Mining, Marketing, Image and Signal Mining, 6th Industrial Conference on Data Mining, ICDM 2006, Leipzig, Germany, July 14-15, 2006, Proceedings, pp. 526-538, 2006, Springer, 3-540-36036-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
59 | Lucian Vasiu, Ioana Vasiu |
Dissecting Computer Fraud: From Definitional Issues to a Taxonomy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
56 | Constantinos S. Hilas, John N. Sahalos |
An Application of Decision Trees for Rule Extraction Towards Telecommunications Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part II, pp. 1112-1121, 2007, Springer, 978-3-540-74826-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
feature selection, user profiles, telecommunications, rule extraction, Fraud detection |
56 | John Kingston, Burkhard Schafer 0001, Wim Vandenberghe |
Towards a Financial Fraud Ontology: A Legal Modelling Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Law ![In: Artif. Intell. Law 12(4), pp. 419-446, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
financial fraud, user requirement analysis, World Wide Web, knowledge modeling, evidence, law, legal ontology |
54 | Rua-Huan Tsaih, Wanying Lin, Shin-Ying Huang |
Exploring Fraudulent Financial Reporting with GHSOM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings, pp. 31-41, 2009, Springer, 978-3-642-01392-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Financial Reporting Fraud, Growing Hierarchical Self-Organizing Map, Knowledge Extraction |
52 | Min-Jung Kim, Taek-Soo Kim |
A Neural Classifier with Fraud Density Map for Effective Credit Card Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning - IDEAL 2002, Third International Conference, Manchester, UK, August 12-14, Proceedings, pp. 378-383, 2002, Springer, 3-540-44025-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
51 | Audrey Samson, Francisco Gallardo, FRAUD |
Let Them Eat cake! ![Search on Bibsonomy](Pics/bibsonomy.png) |
Creativity & Cognition ![In: Proceedings of the 2017 ACM SIGCHI Conference on Creativity and Cognition, C&C 2017, Singapore, June 27 - 30, 2017, pp. 428-429, 2017, ACM, 978-1-4503-4403-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
50 | Bin Zhang 0031, Yi Zhou, Christos Faloutsos |
Toward a Comprehensive Model in Internet Auction Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 79, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Jon T. S. Quah, M. Sriganesh |
Real Time Credit Card Fraud Detection using Computational Intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2007, Celebrating 20 years of neural networks, Orlando, Florida, USA, August 12-17, 2007, pp. 863-868, 2007, IEEE, 978-1-4244-1379-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Fletcher Lu, J. Efrim Boritz, H. Dominic Covvey |
Adaptive Fraud Detection Using Benford's Law. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Canadian AI ![In: Advances in Artificial Intelligence, 19th Conference of the Canadian Society for Computational Studies of Intelligence, Canadian AI 2006, Québec City, Québec, Canada, June 7-9, 2006, Proceedings, pp. 347-358, 2006, Springer, 3-540-34628-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Nicole Immorlica, Kamal Jain, Mohammad Mahdian, Kunal Talwar |
Click Fraud Resistant Methods for Learning Click-Through Rates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WINE ![In: Internet and Network Economics, First International Workshop, WINE 2005, Hong Kong, China, December 15-17, 2005, Proceedings, pp. 34-45, 2005, Springer, 3-540-30900-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Jianyong Tuo, Shouju Ren, Wenhuang Liu, Xiu Li 0001, Bing Li, Lei Lin |
Artificial immune system for fraud detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (2) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 1407-1411, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
50 | Emilie Lundin Barse, Håkan Kvarnström, Erland Jonsson |
Synthesizing Test Data for Fraud Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA, pp. 384-394, 2003, IEEE Computer Society, 0-7695-2041-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
48 | Mary McGlohon, Stephen Bay, Markus G. Anderle, David M. Steier, Christos Faloutsos |
SNARE: a link analytic system for graph labeling and risk detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28 - July 1, 2009, pp. 1265-1274, 2009, ACM, 978-1-60558-495-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
social networks, anomaly detection, belief propagation |
48 | Ahmed Metwally 0001, Divyakant Agrawal, Amr El Abbadi, Qi Zheng |
On Hit Inflation Techniques and Detection in Streams of Web Advertising Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), June 25-29, 2007, Toronto, Ontario, Canada, pp. 52, 2007, IEEE Computer Society, 0-7695-2837-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Christopher Whitrow, David J. Hand, Piotr Juszczak, David John Weston, Niall M. Adams |
Transaction aggregation as a strategy for credit card fraud detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Min. Knowl. Discov. ![In: Data Min. Knowl. Discov. 18(1), pp. 30-55, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Preprocessing, Fraud detection, Supervised classification, Credit cards |
47 | Benjamin Edelman |
Deterring Online Advertising Fraud through Optimal Payment in Arrears. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers, pp. 17-31, 2009, Springer. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
contracts, signaling, online advertising, screening, fraud |
47 | Ou Liu, Jian Ma 0008, Pak-Lok Poon, Jun Zhang 0003 |
On an Ant Colony-Based Approach for Business Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Emerging Intelligent Computing Technology and Applications, 5th International Conference on Intelligent Computing, ICIC 2009, Ulsan, South Korea, September 16-19, 2009. Proceedings, pp. 1104-1111, 2009, Springer, 978-3-642-04069-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
artificial neural network, Ant colony optimization, fraud detection |
47 | Vinicius Almendra, Daniel Schwabe |
Fraud Detection by Human Agents: A Pilot Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies, 10th International Conference, EC-Web 2009, Linz, Austria, September 1-4, 2009. Proceedings, pp. 300-311, 2009, Springer, 978-3-642-03963-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
classification, e-commerce, human computation, fraud |
47 | Shashank Pandit, Duen Horng Chau, Samuel Wang, Christos Faloutsos |
Netprobe: a fast and scalable system for fraud detection in online auction networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007, pp. 201-210, 2007, ACM, 978-1-59593-654-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
bipartite cores, markov random fields, belief propagation, fraud detection |
47 | Suvasini Panigrahi, Amlan Kundu 0002, Shamik Sural, Arun K. Majumdar |
Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 446-460, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Dempster-Shafer theory, fraud detection, Bayesian learning, Mobile communication networks |
47 | Ranjit Bose |
Intelligent Technologies for Managing Fraud and Identity Theft. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Third International Conference on Information Technology: New Generations (ITNG 2006), 10-12 April 2006, Las Vegas, Nevada, USA, pp. 446-451, 2006, IEEE Computer Society, 0-7695-2497-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
superimposition fraud management, AIbased systems |
46 | Jia-Wei Chang, Neil Yuwen Yen, Jason C. Hung |
Design of a NLP-empowered finance fraud awareness model: the anti-fraud chatbot for fraud detection and fraud classification as an instance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 13(10), pp. 4663-4679, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
45 | Alexander Widder, Rainer von Ammon, Philippe Schaeffer, Christian Wolff 0001 |
Identification of suspicious, unknown event patterns in an event cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEBS ![In: Proceedings of the 2007 Inaugural International Conference on Distributed Event-Based Systems, DEBS 2007, Toronto, Ontario, Canada, June 20-22, 2007, pp. 164-170, 2007, ACM, 978-1-59593-665-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
service oriented computing, event driven architecture, discriminant analysis, complex event processing, fraud detection, business activity monitoring |
45 | Zakia Ferdousi, Akira Maeda |
Unsupervised Outlier Detection in Time Series Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 22nd International Conference on Data Engineering Workshops, ICDE 2006, 3-7 April 2006, Atlanta, GA, USA, pp. 121, 2006, IEEE Computer Society, 0-7695-2571-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Peer Group Analysis, Data Mining, Outlier Detection, Time Series Data, Fraud Detection |
45 | Sotiris B. Kotsiantis, Euaggelos Koumanakos, Dimitris Tzelepis, Vasilis Tampakas |
Financial Application of Neural Networks: Two Case Studies in Greece. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICANN (2) ![In: Artificial Neural Networks - ICANN 2006, 16th International Conference, Athens, Greece, September 10-14, 2006. Proceedings, Part II, pp. 672-681, 2006, Springer, 3-540-38871-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
fraud detection, bankruptcy prediction |
45 | Ross J. Anderson |
On the Security of Digital Tachographs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings, pp. 111-125, 1998, Springer, 3-540-65004-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
tachographs, smartcard, fraud, tampering |
44 | Yungchang Ku, Yuchi Chen, Chaochang Chiu |
A Proposed Data Mining Approach for Internet Auction Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 238-243, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Internet auction fraud, fraud detection |
42 | John Wilson, Leonard M. Jessup |
A field experiment on GSS anonymity and group member status. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (4) ![In: 28th Annual Hawaii International Conference on System Sciences (HICSS-28), January 3-6, 1995, Kihei, Maui, Hawaii, USA, pp. 212-221, 1995, IEEE Computer Society, 0-8186-6945-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
insurance data processing, group member status, Wausau Insurance Companies, group productivity, insurance fraud, anonymous groups, equal status group members, unequal status group members, groupware, human factors, group support systems, office automation, social aspects of automation, field experiment, fraud |
42 | Mark Cullen, Leon Pintsov, Brian Romansky |
Reading encrypted postal indicia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: Third International Conference on Document Analysis and Recognition, ICDAR 1995, August 14 - 15, 1995, Montreal, Canada. Volume II, pp. 1018-1023, 1995, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
postal services, encrypted postal indicia reading, postal revenue block, postal fraud, digital printing technologies, revenue block information, robustness, encryption, document image processing, fraud, verification process |
40 | David John Weston, David J. Hand, Niall M. Adams, Christopher Whitrow, Piotr Juszczak |
Plastic card fraud detection using peer group analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adv. Data Anal. Classif. ![In: Adv. Data Anal. Classif. 2(1), pp. 45-62, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 62P30, 62H30 |
40 | Markus Jakobsson, Peter Finn, Nathaniel A. Johnson |
Why and How to Perform Fraud Experiments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(2), pp. 66-68, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Manoel Fernando Alonso Gadi, Xidi Wang, Alair Pereira do Lago |
Credit Card Fraud Detection with Artificial Immune System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARIS ![In: Artificial Immune Systems, 7th International Conference, ICARIS 2008, Phuket, Thailand, August 10-13, 2008. Proceedings, pp. 119-131, 2008, Springer, 978-3-540-85071-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Vasilis Aggelis |
Offline Internet Banking Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 904-905, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Fletcher Lu, J. Efrim Boritz |
Detecting Fraud in Health Insurance Data: Learning to Model Incomplete Benford's Law Distributions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECML ![In: Machine Learning: ECML 2005, 16th European Conference on Machine Learning, Porto, Portugal, October 3-7, 2005, Proceedings, pp. 633-640, 2005, Springer, 3-540-29243-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Rong-Chang Chen, Ming-Li Chiu, Ya-Li Huang, Lin-Ti Chen |
Detecting Credit Card Fraud by Using Questionnaire-Responded Transaction Model Based on Support Vector Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning - IDEAL 2004, 5th International Conference, Exeter, UK, August 25-27, 2004, Proceedings, pp. 800-806, 2004, Springer, 3-540-22881-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Stijn Viaene, Dirk Van Gheel, Mercedes Ayuso, Montserrat Guillen |
Cost-Sensitive Design of Claim Fraud Screens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Advances in Data Mining, Applications in Image Mining, Medicine and Biotechnology, Management and Environmental Control, and Telecommunications, 4th Industrial Conference on Data Mining, ICDM 2004, Leipzig, Germany, July 4-7, 2004, Revised Selected Papers, pp. 78-87, 2004, Springer, 3-540-24054-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Chuang-Cheng Chiu, Chieh-Yuan Tsai |
A Web Services-Based Collaborative Scheme for Credit Card Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EEE ![In: 2004 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 04), 29-31 March 2004, Taipei, Taiwan, pp. 177-181, 2004, IEEE Computer Society, 0-7695-2073-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Eric R. Verheul, Henk C. A. van Tilborg |
Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding, pp. 119-133, 1997, Springer, 3-540-62975-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Traceable ElGamal, Key Recovery, Key Escrow, ElGamal |
38 | Chong Hee Kim, Gildas Avoine |
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 119-133, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
distance bounding protocol, authentication, RFID, relay attack |
37 | Bernard J. Jansen |
Click Fraud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 40(7), pp. 85-86, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
sponsored search, Web technologies, click fraud |
37 | Yi Peng 0001, Gang Kou, Alan Sabatka, Jeff Matza, Zhengxin Chen, Deepak Khazanchi, Yong Shi 0001 |
Application of Classification Methods to Individual Disability Income Insurance Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (3) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part III, pp. 852-858, 2007, Springer, 978-3-540-72587-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Insurance Fraud Detection, Naïve Bayes (NB), decision tree and Multiple Criteria Linear Programming (MCLP), Classification |
37 | Liu Fang, Ming Cai, Hao Fu, Jinxiang Dong |
Ontology-Based Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (3) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part III, pp. 1048-1055, 2007, Springer, 978-3-540-72587-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ontology instance similarity, ontology, personality, behavior, Fraud detection |
37 | Emilie Lundin, Håkan Kvarnström, Erland Jonsson |
A Synthetic Fraud Data Generation Methodology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 265-277, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
synthetic test data, data generation methodology, fraud detection, system simulation, user simulation |
35 | Marion Schulze, Mahmood Hussain Shah |
The Step Method - Battling Identity Theft Using E-Retailers' Websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E ![In: Software Services for e-Business and e-Society, 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009, Nancy, France, September 23-25, 2009. Proceedings, pp. 173-183, 2009, Springer, 978-3-642-04279-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Identity Fraud, Customers’ Behavior, E-retailer, Security, Privacy, Websites, Identity Theft |
35 | Gildas Avoine, Aslan Tchamkerten |
An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 250-261, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
false-acceptance rate, proximity check, mafia fraud, Authentication, RFID, memory, relay attack |
35 | Ahmed Metwally 0001, Divyakant Agrawal, Amr El Abbadi |
Detectives: detecting coalition hit inflation attacks in advertising networks streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007, pp. 241-250, 2007, ACM, 978-1-59593-654-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
approximate set similarity, click spam detection, cliques enumeration, coalition fraud attacks, real data experiments, similarity-sensitive sampling |
35 | Bertis B. Little, Walter L. Johnston, Ashley C. Lovell, Roderick M. Rejesus, Steve A. Steed |
Collusion in the U.S. crop insurance program: applied data mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, July 23-26, 2002, Edmonton, Alberta, Canada, pp. 594-598, 2002, ACM, 1-58113-567-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
doublets, insurance fraud, non-recursive, triplets, collusion, log linear models |
31 | Norton Trevisan Roman, Cristiano D. Ferreira, Luis A. A. Meira, Rodrigo Carvalho Rezende, Luciano A. Digiampietri, Jorge Jambeiro Filho |
Attribute-value specification in customs fraud detection: a human-aided approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
D.GO ![In: Proceedings of the 10th Annual International Conference on Digital Government Research, Partnerships for Public Innovation, DG.O 2009, Puebla, Mexico, May 17-20, 2009, pp. 264-271, 2009, Digital Government Research Center, 978-1-60558-535-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
31 | Bob Mungamuru, Stephen A. Weis |
Competition and Fraud in Online Advertising Markets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 187-191, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Wael William Zakhari Malek, Keith Mayes, Constantinos Markantonakis |
Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings, pp. 118-132, 2008, Springer, 978-3-540-85892-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Paula Thomas, Theodore Tryfonas |
Hard-drive Disposal and Identity Fraud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, pp. 461-466, 2007, Springer, 978-0-387-72366-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Myungsin Chae, Seonyoung Shim, Hyungjun Cho, Byungtae Lee |
An Empirical Analysis of Fraud Detection in Online Auctions: Credit Card Phantom Transaction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 155, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Jau-Hwang Wang, Jiing-Long Jow, You-Lu Liao, Tyan-Muh Tsai, Garfield Hung |
An Overview of Telemarketing Fraud Problems and Countermeasures in Taiwan. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings, pp. 309-310, 2007, Springer, 978-3-540-71548-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Jianyun Xu, Andrew H. Sung, Qingzhong Liu |
Tree Based Behavior Monitoring for Adaptive Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR (1) ![In: 18th International Conference on Pattern Recognition (ICPR 2006), 20-24 August 2006, Hong Kong, China, pp. 1208-1211, 2006, IEEE Computer Society, 0-7695-2521-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Amlan Kundu 0002, Shamik Sural, Arun K. Majumdar |
Two-Stage Credit Card Fraud Detection Using Sequence Alignment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 260-275, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Vishal Vatsa, Shamik Sural, Arun K. Majumdar |
A Game-Theoretic Approach to Credit Card Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 263-276, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Cecil Chua Eng Huang, Jonathan Wareham |
Fighting Internet Auction Fraud: An Assessment and Proposal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 37(10), pp. 31-37, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Gang Zhao 0001, John Kingston, Koen Kerremans, Frederik Coppens, Ruben Verlinden, Rita Temmerman, Robert Meersman |
Engineering an Ontology of Financial Securities Fraud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops ![In: On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, GADA, JTRES, MIOS, WORM, WOSE, PhDS, and INTEROP 2004, Agia Napa, Cyprus, October 25-29, 2004. Proceedings, pp. 605-620, 2004, Springer, 3-540-23664-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | José Edison Cabral, Edgar M. Gontijo |
Fraud detection in electrical energy consumers using rough sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (4) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 3625-3629, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Manas Ranjan Patra, Bipin Bihari Jayasingh |
A Software Agent Based Approach for Fraud Detection in Network Crimes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AACC ![In: Applied Computing, Second Asian Applied Computing Conference, AACC 2004, Kathmandu, Nepal, October 29-31, 2004. Proceedings, pp. 310-316, 2004, Springer, 3-540-23659-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | John Kingston, Burkhard Schafer 0001, Wim Vandenberghe |
No Model Behaviour: Ontologies for Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Law and the Semantic Web ![In: Law and the Semantic Web: Legal Ontologies, Methodologies, Legal Information Retrieval, and Applications, pp. 233-247, 2003, 3-540-25063-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Stijn Viaene, Richard A. Derrig, Guido Dedene |
Boosting Naive Bayes for Claim Fraud Diagnosis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DaWaK ![In: Data Warehousing and Knowledge Discovery, 4th International Conference, DaWaK 2002, Aix-en-Provence, France, September 4-6, 2002, Proceedings, pp. 202-211, 2002, Springer, 3-540-44123-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
31 | Rüdiger W. Brause, Timm Sebastian Langsdorf, Hans-Michael Hepp |
Neural Data Mining for Credit Card Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTAI ![In: 11th IEEE International Conference on Tools with Artificial Intelligence, ICTAI '99, Chicago, Illinois, USA, November 8-10, 1999, pp. 103-106, 1999, IEEE Computer Society, 0-7695-0456-6. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
adaptive hybrid diagnosis, confidence increase, neural networks, rule generalization |
31 | Hongxing He, Warwick Graco, Xin Yao 0001 |
Application of Genetic Algorithm and k-Nearest Neighbour Method in Medical Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEAL ![In: Simulated Evolution and Learning, Second Asia-Pacific Conference on Simulated Evolution and Learning, SEAL'98, Canberra, Australia, November 24-27 1998, Selected Papers, pp. 74-81, 1998, Springer, 3-540-65907-2. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
29 | Hui Peng, Min Ling |
Will Commodity Properties Affect Seller's Creditworthy: Evidence in C2C E-commerce Market in China. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISM ![In: Web Information Systems and Mining, International Conference, WISM 2009, Shanghai, China, November 7-8, 2009. Proceedings, pp. 535-544, 2009, Springer, 978-3-642-05249-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
credit rating, commodity property, credit distribution, credit cluster, rating arbitrage, E-commerce, trustworthy |
29 | Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil R. Adam, Evimaria Terzi, Tyrone Grandison |
Efficient Privacy-Preserving Link Discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKDD ![In: Advances in Knowledge Discovery and Data Mining, 13th Pacific-Asia Conference, PAKDD 2009, Bangkok, Thailand, April 27-30, 2009, Proceedings, pp. 16-27, 2009, Springer, 978-3-642-01306-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy, Efficiency, Link Discovery |
29 | Xiaoyun He, Basit Shafiq, Jaideep Vaidya, Nabil R. Adam |
Privacy-preserving link discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 909-915, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, link discovery |
29 | Seung-Jin Ryu, Hae-Yeoun Lee, Il-Weon Cho, Heung-Kyu Lee |
Document Forgery Detection with SVM Classifier and Image Quality Measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM ![In: Advances in Multimedia Information Processing - PCM 2008, 9th Pacific Rim Conference on Multimedia, Tainan, Taiwan, December 9-13, 2008. Proceedings, pp. 486-495, 2008, Springer, 978-3-540-89795-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
printer identification, Digital forensics, SVM classifier, forgery detection, image quality measures |
29 | Jason Reid, Juan Manuel González Nieto, Tee Tang, Bouchra Senadji |
Detecting relay attacks with timing-based protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 204-213, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Andrew W. Senior, Lisa M. Brown, Arun Hampapur, Chiao-Fe Shu, Yun Zhai, Rogério Schmidt Feris, Ying-li Tian, Sergio Borger, Christopher R. Carlson |
Video analytics for retail. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVSS ![In: Fourth IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2007, 5-7 September, 2007, Queen Mary, University of London, London, United Kingdom, pp. 423-428, 2007, IEEE Computer Society, 978-1-4244-1695-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Bezalel Gavish |
Trust and Swindling on the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 44, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Xiu-chuan Wu, Li-jie Sha, Dong Guo 0002, Lan-fang Lou, Liang Hu 0001 |
GT-Based Performance Improving for Resource Management of Computational Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30 - December 3, 2005, Proceedings, pp. 1072-1077, 2005, Springer, 3-540-30510-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Clare Chambers, Umut Turksen |
E-Banking and e-Fraud: A Comparison Investigation in Jamaica and the UK. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: The Fourth International Conference on Digital Society, ICDS 2010, 10.16 February 2010, St. Maarten, Netherlands Antilles, pp. 345-352, 2010, IEEE Computer Society, 978-0-7695-3953-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
E-fraud, E-commerce, E-banking, Cyber crime |
28 | Jonathan M. Blackledge, Eugene Coyle |
e-Fraud Prevention Based on the Self-Authentication of e-Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: The Fourth International Conference on Digital Society, ICDS 2010, 10.16 February 2010, St. Maarten, Netherlands Antilles, pp. 329-338, 2010, IEEE Computer Society, 978-0-7695-3953-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Covert encryption, e-Fraud, Authentication, Steganography, Information hiding |
28 | Md Delwar Hussain Mahdi, Karim Mohammed Rezaul, Muhammad Azizur Rahman |
Credit Fraud Detection in the Banking Sector in UK: A Focus on E-Business. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: The Fourth International Conference on Digital Society, ICDS 2010, 10.16 February 2010, St. Maarten, Netherlands Antilles, pp. 232-237, 2010, IEEE Computer Society, 978-0-7695-3953-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Credit Fraud, On-line banking, Internet, E-Business |
28 | Wen-Fang Yu, Na Wang |
Research on Credit Card Fraud Detection Model Based on Distance Sum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCAI ![In: First IITA International Joint Conference on Artificial Intelligence, Hainan Island, China, 25-26 April 2009, pp. 353-356, 2009, IEEE Computer Society, 978-0-7695-3615-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
distance sum, outlier, fraud detection, credit card |
28 | Shelly Xiaonan Wu, Wolfgang Banzhaf |
Combatting financial fraud: a coevolutionary anomaly detection approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008, pp. 1673-1680, 2008, ACM, 978-1-60558-130-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
financial fraud, parisian approach, self-nonself space pattern construction, fuzzy logic, anomaly detection, ecology, coevolutionary algorithms |
Displaying result #1 - #100 of 3062 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|