Using the RetSim simulator for fraud detection research

Managing fraud is important for business, retail and financialalike. One method to manage fraud is by \emph{detection}, wheretransactions etc. are monitored and suspicious behaviour is flaggedfor f ...

[1]  Shah Jamal Alam,et al.  Networks in Agent-Based Social Simulation , 2011, Agent-Based Models of Geographical Systems.

[2]  Bridget Rosewell,et al.  Validation and Verification of Agent-Based Models in the Social Sciences , 2009, EPOS.

[3]  Rui Xiao,et al.  Development of a Synthetic Data Set Generator for Building and Testing Information Discovery Systems , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).

[4]  Björn P. Stahmer,et al.  SimMarket: Multiagent-Based Customer Simulation and Decision Support for Category Management , 2003, MATES.

[5]  Erland Jonsson,et al.  A Synthetic Fraud Data Generation Methodology , 2002, ICICS.

[6]  Markus Schneider,et al.  3LSPG: Forensic Tool Evaluation by Three Layer Stochastic Process-Based Generation of Data , 2010, ICWF.

[7]  Denis Phan,et al.  Agent-Based Models and Simulations in Economics and Social Sciences: From Conceptual Exploration to Distinct Ways of Experimenting , 2010, J. Artif. Soc. Soc. Simul..

[8]  Stefan Axelsson,et al.  RETSIM: A shoe store agent-based simulation for fraud detection , 2013, ANSS 2013.

[9]  Kate Smith-Miles,et al.  A Comprehensive Survey of Data Mining-based Fraud Detection Research , 2010, ArXiv.

[10]  Mathieu Bastian,et al.  Gephi: An Open Source Software for Exploring and Manipulating Networks , 2009, ICWSM.

[11]  Adriano O. Solis,et al.  Analysis of demand-supply interaction and inventory build-up strategies for products with short life cycles , 2013, Int. J. Simul. Process. Model..

[12]  Samir Aknine,et al.  Multi-agent financial market simulation: evolutionist approach , 2013, Int. J. Simul. Process. Model..

[13]  Steven L. Lytinen,et al.  Agent-based Simulation Platforms: Review and Development Recommendations , 2006, Simul..

[14]  Alexandre V. Evfimievski,et al.  Privacy preserving mining of association rules , 2002, Inf. Syst..

[15]  Zenon Chaczko,et al.  A smart-shop system - multiagent simulation system for monitoring retail activities , 2008 .

[16]  Bianca Zadrozny,et al.  Outlier detection by active learning , 2006, KDD '06.

[17]  Sean Luke,et al.  MASON : A Multi-Agent Simulation Environment , 2008 .

[18]  Vitaly Shmatikov,et al.  De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[19]  Qi Wang,et al.  On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.

[20]  Charu C. Aggarwal,et al.  On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.