The design of FFML: A rule-based policy modelling language for proactive fraud management in financial data streams
暂无分享,去创建一个
[1] Diane Lambert,et al. Detecting fraud in the real world , 2002 .
[2] Azzedine Boukerche,et al. Neural Fraud Detection in Mobile Phone Operations , 2000, IPDPS Workshops.
[3] Michael Stonebraker,et al. Aurora: a new model and architecture for data stream management , 2003, The VLDB Journal.
[4] Constantinos S. Hilas,et al. Testing the Fraud Detection Ability of Different User Profiles by Means of FF-NN Classifiers , 2006, ICANN.
[5] Akhil Sahai,et al. Cauldron: a policy-based design tool , 2006, Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06).
[6] David Luckham,et al. The power of events - an introduction to complex event processing in distributed enterprise systems , 2002, RuleML.
[7] Kate Smith-Miles,et al. Adaptive communal detection in search of adversarial identity crime , 2007, DDDM '07.
[8] Jennifer Widom,et al. Active Database Systems: Triggers and Rules For Advanced Database Processing , 1994 .
[9] Philip S. Yu,et al. Active Mining of Data Streams , 2004, SDM.
[10] Andreas Reuter,et al. Transaction Processing: Concepts and Techniques , 1992 .
[11] Jennifer Widom,et al. STREAM: the stanford stream data manager (demonstration description) , 2003, SIGMOD '03.
[12] Hyerim Bae,et al. Automatic control of workflow processes using ECA rules , 2004, IEEE Transactions on Knowledge and Data Engineering.
[13] Babis Theodoulidis,et al. Analysis of stock market manipulations using knowledge discovery techniques applied to intraday trade prices , 2011, Expert Syst. Appl..
[14] Chang-Tien Lu,et al. Survey of fraud detection techniques , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.
[15] Teresa F. Lunt,et al. A survey of intrusion detection techniques , 1993, Comput. Secur..
[16] Kemal Bicakci,et al. One-Time Passwords: Security Analysis Using BAN Logic and Integrating with Smartcard Authentication , 2003, ISCIS.
[17] Emil C. Lupu,et al. The Ponder Policy Specification Language , 2001, POLICY.
[18] Ying Xing,et al. The Design of the Borealis Stream Processing Engine , 2005, CIDR.
[19] Rüdiger W. Brause,et al. Neural data mining for credit card fraud detection , 1999, Proceedings 11th International Conference on Tools with Artificial Intelligence.
[20] Richard J. Sullivan. The Changing Nature of US Card Payment Fraud: Issues for Industry and Public Policy , 2010, WEIS.
[21] Michael Stonebraker,et al. On rules, procedure, caching and views in data base systems , 1990, SIGMOD '90.
[22] Michael Stonebraker,et al. On rules, procedures, caching and views in database systems , 1994, SIGMOD 1994.
[23] Choong Seon Hong,et al. A Network Management Architecture Using XML-Based Policy Information Base , 2003, ICOIN.
[24] John Shawe-Taylor,et al. Fraud detection and management in mobile telecommunications networks , 1997 .
[25] Corinna Cortes,et al. Signature-Based Methods for Data Streams , 2001, Data Mining and Knowledge Discovery.
[26] Frederick Reiss,et al. TelegraphCQ: Continuous Dataflow Processing for an Uncertain World , 2003, CIDR.
[27] Jinoh Kim,et al. Design and implementation of policy decision point in policy-based network , 2005, Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05).
[28] Vitalian A. Danciu,et al. From processes to policies - concepts for large scale policy generation , 2004, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507).
[29] Guido Dedene,et al. Auto claim fraud detection using Bayesian learning neural networks , 2005, Expert Syst. Appl..
[30] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[31] Arie van Deursen,et al. Domain-specific languages: an annotated bibliography , 2000, SIGP.
[32] Steven J. Murdoch,et al. Thinking Inside the Box: System-Level Failures of Tamper Proofing , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[33] Pedro R. Falcone Sampaio,et al. A survey of signature based methods for financial fraud detection , 2009, Comput. Secur..
[34] Elisa Bertino,et al. Policy languages for digital identity management in federation systems , 2006, Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06).
[35] Axelle Apvrille,et al. XML distributed security policy for clusters , 2004, Comput. Secur..
[36] Ronnie Alves,et al. Establishing Fraud Detection Patterns Based on Signatures , 2006, ICDM.
[37] Jennifer Widom,et al. STREAM: The Stanford Stream Data Manager , 2003, IEEE Data Eng. Bull..
[38] Joseph Bonneau,et al. What's in a Name? , 2020, Financial Cryptography.
[39] Tom Fawcett,et al. Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.
[40] Jorge Lobo,et al. A Policy Description Language , 1999, AAAI/IAAI.
[41] Douglas L. Reilly,et al. Credit card fraud detection with a neural-network , 1994, 1994 Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences.
[42] Pedro R. Falcone Sampaio,et al. Specifying and Compiling High Level Financial Fraud Policies into StreamSQL , 2009, ICEIS.
[43] Bernd Freisleben,et al. CARDWATCH: a neural network based database mining system for credit card fraud detection , 1997, Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr).
[44] Richard John Anthony. Policy-based autonomic computing with integral support for self-stabilisation , 2009, Int. J. Auton. Comput..