Cluster Analysis for Anomaly Detection in Accounting Data: An Audit Approach 1
暂无分享,去创建一个
[1] Alexander Hinneburg. Visualizing Clustering Results , 2009, Encyclopedia of Database Systems.
[2] P. Brockett,et al. Using Kohonen's Self-Organizing Feature Map to Uncover Automobile Bodily Injury Claims Fraud , 1998 .
[3] Teuvo Kohonen,et al. Self-Organizing Maps , 2010 .
[4] M. Vasarhelyi. THE CONTINUOUS AUDIT OF ONLINE SYSTEMS , 1991 .
[5] Ashutosh Deshmukh,et al. A rule-based fuzzy reasoning system for assessing the risk of management fraud , 1998, Intell. Syst. Account. Finance Manag..
[6] R. Layton,et al. Dimensions of Consumer Information Seeking Behavior , 1981 .
[7] Aidong Zhang,et al. FindOut: Finding Outliers in Very Large Datasets , 2002, Knowledge and Information Systems.
[8] Aidong Zhang,et al. WaveCluster: A Multi-Resolution Clustering Approach for Very Large Spatial Databases , 1998, VLDB.
[9] James V. Rauff. Data Mining: A Tutorial-Based Primer , 2005 .
[10] Sudipto Guha,et al. ROCK: A Robust Clustering Algorithm for Categorical Attributes , 2000, Inf. Syst..
[11] M. V. Velzen,et al. Self-organizing maps , 2007 .
[12] W. Anderson,et al. Bank Selection Decisions and Market Segmentation , 1976 .
[13] Daling Wang,et al. CD-Trees: An Efficient Index Structure for Outlier Detection , 2004, WAIM.
[14] Joseph V. Carcello,et al. A Decision Aid for Assessing the Likelihood of Fraudulent Financial Reporting , 2000 .
[15] Mark I. Hwang,et al. A fuzzy neural network for assessing the risk of fraudulent financial reporting , 2003 .
[16] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[17] Charles M. Schaninger,et al. The Complementary use of Multivariate Procedures to Investigate Nonlinear and Interactive Relationships between Personality and Product Usage , 1980 .
[18] Kenneth O. Cogger,et al. Neural network detection of management fraud using published financial data , 1998, Intell. Syst. Account. Finance Manag..
[19] Miklos A. Vasarhelyi,et al. A Thought Leadership Paper for the Institute of Chartered Accountants in Australia , 2010 .
[20] M. Venkatesan,et al. Concept Evaluation & Market Segmentation , 1978 .
[21] Rajendra P. Srivastava,et al. Detection of Management Fraud: A Neural Network Approach , 1995 .
[22] Roger J. Calantone,et al. The Stability of Benefit Segments , 1978 .
[23] Vipin Kumar,et al. Introduction to Data Mining , 2022, Data Mining and Machine Learning Applications.
[24] Vipin Kumar,et al. Finding Topics in Collections of Documents: A Shared Nearest Neighbor Approach , 2003, Clustering and Information Retrieval.
[25] Ashutosh Deshmukh,et al. A rule based fuzzy reasoning system for assessing the risk of management fraud , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.
[26] Miklos A. Vasarhelyi,et al. Continuous Assurance for the Now Economy , 2010 .
[27] Jay C. Thibodeau,et al. Applying Digital Analysis Using Benford's Law to Detect Fraud: The Dangers of Type I Errors , 2005 .
[28] M.M. Deris,et al. A Comparative Study for Outlier Detection Techniques in Data Mining , 2006, 2006 IEEE Conference on Cybernetics and Intelligent Systems.
[29] Sam Kash Kachigan. Multivariate statistical analysis: A conceptual introduction , 1982 .
[30] Sudipto Guha,et al. ROCK: a robust clustering algorithm for categorical attributes , 1999, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337).
[31] Alexander S. Szalay,et al. Very Fast Outlier Detection in Large Multidimensional Data Sets , 2002, DMKD.
[32] Giuseppe Lieto,et al. Cluster Analysis for Anomaly Detection , 2008, CISIS.
[33] B. Green,et al. Assessing the risk of management fraud through neural network technology , 1997 .
[34] Zengyou He,et al. Discovering cluster-based local outliers , 2003, Pattern Recognit. Lett..
[35] Douglas M. Hawkins. Identification of Outliers , 1980, Monographs on Applied Probability and Statistics.
[36] Khaled Labib,et al. NSOM: A Real-Time Network-Based Intrusion Detection System Using Self-Organizing Maps , 2002 .
[37] D. Sexton,et al. A Cluster Analytic Approach to Market Response Functions , 1974 .
[38] Girish N. Punj,et al. Cluster Analysis in Marketing Research: Review and Suggestions for Application , 1983 .
[39] Shawn Ostermann,et al. Detecting Anomalous Network Traffic with Self-organizing Maps , 2003, RAID.
[40] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[41] Mei-Chih Chen,et al. An Empirical Study for the Detection of Corporate Financial Anomaly Using Outlier Mining Techniques , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[42] Ying Liu,et al. Cluster-based outlier detection , 2009, Ann. Oper. Res..
[43] Rajendra P. Srivastava,et al. Detection of management fraud: a neural network approach , 1995, Proceedings the 11th Conference on Artificial Intelligence for Applications.
[44] Ian Davidson,et al. Visualizing Clustering Results , 2002, SDM.