Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks
暂无分享,去创建一个
Shamik Sural | Arun K. Majumdar | Suvasini Panigrahi | Amlan Kundu | S. Sural | A. Majumdar | A. Kundu | S. Panigrahi
[1] Thomas M. Chen,et al. Dempster-Shafer theory for intrusion detection in ad hoc networks , 2005, IEEE Internet Computing.
[2] Paola Britos,et al. Detecting Fraud in Mobile Telephony Using Neural Networks , 2005, IEA/AIE.
[3] John Shawe-Taylor,et al. Novel Techniques for Fraud Detection in Mobile Telecommunication Networks , 2007 .
[4] Volker Tresp,et al. Fraud detection in communication networks using neural and probabilistic methods , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[5] John Shawe-Taylor,et al. Detecting Cellular Fraud Using Adaptive Prototypes. , 1997, AAAI 1997.
[6] John Shawe-Taylor,et al. An Unsupervised Neural Network Approach to Profiling the Behavior of Mobile Phone Users for Use in Fraud Detection , 2001, J. Parallel Distributed Comput..
[7] Ramón García-Martínez,et al. Unusual Changes of Consumption Detection in Mobile Phone Users , 2006 .
[8] David J. Hand,et al. Statistical fraud detection: A review , 2002 .
[9] Ray J. Frank,et al. The detection of fraud in mobile phone networks , 1996 .
[10] Tom Fawcett,et al. Combining Data Mining and Machine Learning for Effective User Profiling , 1996, KDD.
[11] Yizhak Idan,et al. Discovery of fraud rules for telecommunications—challenges and solutions , 1999, KDD '99.
[12] D. Hand,et al. Unsupervised Profiling Methods for Fraud Detection , 2002 .
[13] Joos Vandewalle,et al. Detection of Mobile Phone Fraud Using Supervised Neural Networks: A First Prototype , 1997, ICANN.
[14] Chang-Tien Lu,et al. Survey of fraud detection techniques , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.
[15] Peter Hoath. Telecoms fraud, the gory details , 1998 .
[16] John Shawe-Taylor,et al. Novel techniques for fraud detection in mobile communications , 1996 .
[17] Xingyu Wang,et al. Distributed intrusion detection system based on data fusion method , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).
[18] Gadi Pinkas,et al. Unsupervised Profiling for Identifying Superimposed Fraud , 1999, PKDD.