Applying Extensions of Evidence Theory to Detect Frauds in Financial Infrastructures
暂无分享,去创建一个
Luigi Coppolino | Salvatore D'Antonio | Valerio Formicola | Luigi Romano | L. Romano | Valerio Formicola | L. Coppolino | S. D'Antonio
[1] Didier Dubois,et al. On the relevance of non-standard theories of uncertainty in modeling and pooling expert opinions , 1992 .
[2] N. Balakrishnan,et al. Modified evidence theory for performance enhancement of Intrusion Detection Systems , 2008, 2008 11th International Conference on Information Fusion.
[3] Jean Dezert,et al. Applications and Advances of DSmT for Information Fusion , 2004 .
[4] Jianhua Li,et al. Intrusion Detection Engine Based on Dempster-Shafer's Theory of Evidence , 2006, 2006 International Conference on Communications, Circuits and Systems.
[5] Wilbert van Norden,et al. Applying the PCR6 Rule of combination in real time classification systems , 2009, 2009 12th International Conference on Information Fusion.
[6] Jean Dezert,et al. On the behavior of Dempster's rule of combination and the foundations of Dempster-Shafer Theory , 2011, 2012 6th IEEE International Conference Intelligent Systems.
[7] Baptiste Hemery,et al. Synthetic logs generator for fraud detection in mobile transfer services , 2013, 2013 International Conference on Collaboration Technologies and Systems (CTS).
[8] Christophe Osswald,et al. A new generalization of the proportional conflict redistribution rule stable in terms of decision , 2008, ArXiv.
[9] Frédéric Dambreville,et al. A Tripartite Architecture based on Referee Function for Generic Implementations of Evidence Combination Rules , 2010, GI Jahrestagung.
[10] Jean Dezert,et al. Proportional Conflict Redistribution Rule , 2004, ArXiv.
[11] Haiping Xu,et al. Inference of Online Auction Shills Using Dempster-Shafer Theory , 2009, 2009 Sixth International Conference on Information Technology: New Generations.
[12] Cynthia Merritt. Mobile money transfer services: The next phase in the evolution of person-to-person payments , 2011 .
[13] Florentin Smarandache,et al. Application of new absolute and relative conditioning rules in threat assessment , 2013, Proceedings of the 16th International Conference on Information Fusion.
[14] Florentin Smarandache,et al. Advances and Applications of DSmT for Information Fusion (Collected Works) , 2004 .
[15] Frédéric Dambreville,et al. Release ZERO.0.1 of package RefereeToolbox , 2010, ArXiv.
[16] Deborah A. Frincke,et al. Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory , 2005, ACM-SE 43.
[17] Lei Gao,et al. The Dempster-Shafer Theory: An Introduction and Fraud Risk Assessment Illustration , 2011 .
[18] Kari Sentz,et al. Combination of Evidence in Dempster-Shafer Theory , 2002 .
[19] Frédéric Dambreville,et al. Definition of Evidence Fusion Rules Based on Referee Functions , 2016 .
[20] Xinming Ou,et al. Prioritizing intrusion analysis using Dempster-Shafer theory , 2011, AISec '11.
[21] Arthur P. Dempster,et al. A Generalization of Bayesian Inference , 1968, Classic Works of the Dempster-Shafer Theory of Belief Functions.
[22] Luigi Coppolino,et al. Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study , 2014, IDC.
[23] Xu Huang,et al. Wireless Sensor Network Internal Attacker Identification with Multiple Evidence by Dempster-Shafer Theory , 2012, ICA3PP.
[24] Shamik Sural,et al. Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks , 2007, ACISP.
[25] Lotfi A. Zadeh,et al. On the Validity of Dempster''s Rule of Combination of Evidence , 1979 .
[26] Thomas M. Chen,et al. Dempster-Shafer theory for intrusion detection in ad hoc networks , 2005, IEEE Internet Computing.