Application of Anomaly Detection Techniques to Identify Fraudulent Refunds
暂无分享,去创建一个
[1] Miklos A. Vasarhelyi,et al. Cluster Analysis for Anomaly Detection in Accounting Data: An Audit Approach 1 , 2011 .
[2] Patrick L. Brockett,et al. Fraud Classification Using Principal Component Analysis of Ridits , 2002 .
[3] Mario Vento,et al. To reject or not to reject: that is the question-an answer in case of neural classifiers , 2000, IEEE Trans. Syst. Man Cybern. Part C.
[4] Anil K. Jain. Data clustering: 50 years beyond K-means , 2008, Pattern Recognit. Lett..
[5] Bianca Zadrozny,et al. Outlier detection by active learning , 2006, KDD '06.
[6] Sushil Jajodia,et al. Applications of Data Mining in Computer Security , 2002, Advances in Information Security.
[7] Shashi Shekhar,et al. Detecting graph-based spatial outliers , 2002, Intell. Data Anal..
[8] Lionel Tarassenko,et al. The use of novelty detection techniques for monitoring high-integrity plant , 2002, Proceedings of the International Conference on Control Applications.
[9] P. Brockett,et al. Using Kohonen's Self-Organizing Feature Map to Uncover Automobile Bodily Injury Claims Fraud , 1998 .
[10] Chang-Tien Lu,et al. Spatial Weighted Outlier Detection , 2006, SDM.
[11] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[12] Tom Fawcett,et al. Activity monitoring: noticing interesting changes in behavior , 1999, KDD '99.
[13] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[14] H. Arp. Discordant observations. , 1990, Science.
[15] Rüdiger W. Brause,et al. Neural data mining for credit card fraud detection , 1999, Proceedings 11th International Conference on Tools with Artificial Intelligence.
[16] L. Baker,et al. A Hierarchical Probabilistic Model for Novelty Detection in Text , 1999, NIPS 1999.
[17] Sanjay Ranka,et al. Conditional Anomaly Detection , 2007, IEEE Transactions on Knowledge and Data Engineering.
[18] F. Y. Edgeworth,et al. XLI. On discordant observations , 1887 .
[19] Philip Chan,et al. Learning States and Rules for Time Series Anomaly Detection , 2004, FLAIRS.
[20] Kate Smith-Miles,et al. A Comprehensive Survey of Data Mining-based Fraud Detection Research , 2010, ArXiv.
[21] David G. Stork,et al. Pattern Classification , 1973 .
[22] K. Mumtaz,et al. A Novel Density based improved k-means Clustering Algorithm – Dbkmeans , 2010 .
[23] Alfonso Valdes,et al. Adaptive, Model-Based Monitoring for Cyber Attack Detection , 2000, Recent Advances in Intrusion Detection.
[24] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[25] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.