Survey of fraud detection techniques
暂无分享,去创建一个
Chang-Tien Lu | Yo-Ping Huang | Yufeng Kou | S. Sirwongwattana | Yufeng Kou | Chang-Tien Lu | Yo-Ping Huang | S. Sirwongwattana
[1] M Syeda,et al. Parallel granular neural networks for fast credit card fraud detection , 2002, 2002 IEEE World Congress on Computational Intelligence. 2002 IEEE International Conference on Fuzzy Systems. FUZZ-IEEE'02. Proceedings (Cat. No.02CH37291).
[2] Volker Tresp,et al. Call-Based Fraud Detection in Mobile Communication Networks Using a Hierarchical Regime-Switching Model , 1998, NIPS.
[3] Volker Tresp,et al. Fraud detection in communication networks using neural and probabilistic methods , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[4] Kazuo J. Ezawa,et al. Constructing Bayesian Networks to Predict Uncollectible Telecommunications Accounts , 1996, IEEE Expert.
[5] D. Hand,et al. Unsupervised Profiling Methods for Fraud Detection , 2002 .
[6] Salvatore J. Stolfo,et al. Data mining-based intrusion detectors: an overview of the columbia IDS project , 2001, SGMD.
[7] Anup K. Ghosh,et al. A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.
[8] Ronald J. Brachman,et al. Brief Application Description; Visual Data Mining: Recognizing Telephone Calling Fraud , 2004, Data Mining and Knowledge Discovery.
[9] Salvatore J. Stolfo,et al. Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results 1 , 1997 .
[10] Martin Hepp,et al. Credit Card Fraud Detection by Adaptive Neural Data Mining , 1999 .
[11] Jaideep Srivastava,et al. Data Mining for Network Intrusion Detection , 2002 .
[12] Chittur,et al. Model Generation for an Intrusion Detection System Using Genetic Algorithms , 2001 .
[13] Douglas L. Reilly,et al. Credit card fraud detection with a neural-network , 1994, 1994 Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences.
[14] Bernd Freisleben,et al. CARDWATCH: a neural network based database mining system for credit card fraud detection , 1997, Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr).
[15] Yizhak Idan,et al. Discovery of fraud rules for telecommunications—challenges and solutions , 1999, KDD '99.
[16] S. Patel. Location, identity and wireless fraud detection , 1997, 1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338).
[17] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[18] David J. Hand,et al. Statistical fraud detection: A review , 2002 .
[19] José R. Dorronsoro,et al. Neural fraud detection in credit card operations , 1997, IEEE Trans. Neural Networks.
[20] Koral Ilgun. USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[21] Stefan Axelsson. Research in Intrusion-Detection Systems: A Survey , 1998 .
[22] Dwl Cheung,et al. Parallel Algorithm for Mining Outliers in Large Database , 1999 .
[23] Eugene H. Spafford,et al. A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .
[24] K. Hassibi. Detecting Payment Card Fraud with Neural Networks , 2000 .
[25] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[26] Risto Miikkulainen,et al. Intrusion Detection with Neural Networks , 1997, NIPS.