Using the RetSim simulator for fraud detection research
暂无分享,去创建一个
[1] Shah Jamal Alam,et al. Networks in Agent-Based Social Simulation , 2011, Agent-Based Models of Geographical Systems.
[2] Bridget Rosewell,et al. Validation and Verification of Agent-Based Models in the Social Sciences , 2009, EPOS.
[3] Rui Xiao,et al. Development of a Synthetic Data Set Generator for Building and Testing Information Discovery Systems , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).
[4] Björn P. Stahmer,et al. SimMarket: Multiagent-Based Customer Simulation and Decision Support for Category Management , 2003, MATES.
[5] Erland Jonsson,et al. A Synthetic Fraud Data Generation Methodology , 2002, ICICS.
[6] Markus Schneider,et al. 3LSPG: Forensic Tool Evaluation by Three Layer Stochastic Process-Based Generation of Data , 2010, ICWF.
[7] Denis Phan,et al. Agent-Based Models and Simulations in Economics and Social Sciences: From Conceptual Exploration to Distinct Ways of Experimenting , 2010, J. Artif. Soc. Soc. Simul..
[8] Stefan Axelsson,et al. RETSIM: A shoe store agent-based simulation for fraud detection , 2013, ANSS 2013.
[9] Kate Smith-Miles,et al. A Comprehensive Survey of Data Mining-based Fraud Detection Research , 2010, ArXiv.
[10] Mathieu Bastian,et al. Gephi: An Open Source Software for Exploring and Manipulating Networks , 2009, ICWSM.
[11] Adriano O. Solis,et al. Analysis of demand-supply interaction and inventory build-up strategies for products with short life cycles , 2013, Int. J. Simul. Process. Model..
[12] Samir Aknine,et al. Multi-agent financial market simulation: evolutionist approach , 2013, Int. J. Simul. Process. Model..
[13] Steven L. Lytinen,et al. Agent-based Simulation Platforms: Review and Development Recommendations , 2006, Simul..
[14] Alexandre V. Evfimievski,et al. Privacy preserving mining of association rules , 2002, Inf. Syst..
[15] Zenon Chaczko,et al. A smart-shop system - multiagent simulation system for monitoring retail activities , 2008 .
[16] Bianca Zadrozny,et al. Outlier detection by active learning , 2006, KDD '06.
[17] Sean Luke,et al. MASON : A Multi-Agent Simulation Environment , 2008 .
[18] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[19] Qi Wang,et al. On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[20] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.