An Application of Decision Trees for Rule Extraction Towards Telecommunications Fraud Detection
暂无分享,去创建一个
[1] J. Rissanen,et al. Modeling By Shortest Data Description* , 1978, Autom..
[2] Constantinos S. Hilas,et al. Testing the Fraud Detection Ability of Different User Profiles by Means of FF-NN Classifiers , 2006, ICANN.
[3] Wulfram Gerstner,et al. Artificial Neural Networks — ICANN'97 , 1997, Lecture Notes in Computer Science.
[4] David G. Stork,et al. Pattern Classification , 1973 .
[5] Ron Kohavi,et al. A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection , 1995, IJCAI.
[6] Ron Kohavi,et al. Irrelevant Features and the Subset Selection Problem , 1994, ICML.
[7] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[8] Volker Tresp,et al. Fraud detection in communication networks using neural and probabilistic methods , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[9] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques with Java implementations , 2002, SGMD.
[10] David G. Stork,et al. Pattern Classification (2nd ed.) , 1999 .
[11] S. F. Hinde. Call record analysis , 1996 .
[12] Alberto Maria Segre,et al. Programs for Machine Learning , 1994 .
[13] Marc Toussaint,et al. Extracting Motion Primitives from Natural Handwriting Data , 2006, ICANN.
[14] Daniel A. Keim,et al. On Knowledge Discovery and Data Mining , 1997 .
[15] Larry A. Rendell,et al. A Practical Approach to Feature Selection , 1992, ML.
[16] Joos Vandewalle,et al. Detection of Mobile Phone Fraud Using Supervised Neural Networks: A First Prototype , 1997, ICANN.
[17] Peter Hoath. Telecoms fraud, the gory details , 1998 .
[18] Ronnie Alves,et al. Discovering telecom fraud situations through mining anomalous behavior patterns , 2006 .
[19] George H. John. Enhancements to the data mining process , 1997 .
[20] Wang Dong,et al. A feature extraction method for fraud detection in mobile communication networks , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).
[21] Tom Fawcett,et al. Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.
[22] Yizhak Idan,et al. Discovery of fraud rules for telecommunications—challenges and solutions , 1999, KDD '99.