Towards a Proactive Fraud Management Framework for Financial Data Streams
暂无分享,去创建一个
[1] Azzedine Boukerche,et al. Neural Fraud Detection in Mobile Phone Operations , 2000, IPDPS Workshops.
[2] Michael Stonebraker,et al. Aurora: a new model and architecture for data stream management , 2003, The VLDB Journal.
[3] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[4] David Luckham,et al. The power of events - an introduction to complex event processing in distributed enterprise systems , 2002, RuleML.
[5] Satish K. Tripathi,et al. A routing framework for providing robustness to node failures in mobile ad hoc networks , 2004, Ad Hoc Networks.
[6] Jennifer Widom,et al. STREAM: The Stanford Stream Data Manager , 2003, IEEE Data Eng. Bull..
[7] John Shawe-Taylor,et al. An Unsupervised Neural Network Approach to Profiling the Behavior of Mobile Phone Users for Use in Fraud Detection , 2001, J. Parallel Distributed Comput..
[8] Dipak Ghosal,et al. Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges , 2003, MASCOTS Tutorials.
[9] Sung-Ju Lee,et al. Split multipath routing with maximally disjoint paths in ad hoc networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[10] Diane Lambert,et al. Detecting fraud in the real world , 2002 .
[11] Fabio Casati,et al. Chapter 79 – Business Process Cockpit: Extended Abstract , 2002, VLDB 2002.
[12] Farooq Anjum,et al. Security for Wireless Ad Hoc Networks: Anjum/Ad hoc Networks , 2007 .
[13] Tom Fawcett,et al. Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.
[14] Óscar Corcho,et al. SWS for Financial Overdrawn Alerting , 2004, SEMWEB.
[15] Mike Burmester,et al. Secure multipath communication in mobile ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[16] Sung-Ju Lee,et al. AODV-BR: backup routing in ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[17] Lae-Jeong Park. Learning of Neural Networks for Fraud Detection Based on a Partial Area Under Curve , 2005, ISNN.
[18] David J. Hand,et al. Statistical fraud detection: A review , 2002 .
[19] A. Yasinsac,et al. Identifying flaws in the secure routing protocol , 2003, Conference Proceedings of the 2003 IEEE International Performance, Computing, and Communications Conference, 2003..
[20] Fabio Casati,et al. Business Process Cockpit , 2002, VLDB.
[21] Douglas L. Reilly,et al. Credit card fraud detection with a neural-network , 1994, 1994 Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences.
[22] Jennifer Widom,et al. The CQL continuous query language: semantic foundations and query execution , 2006, The VLDB Journal.
[23] Corinna Cortes,et al. Signature-Based Methods for Data Streams , 2001, Data Mining and Knowledge Discovery.
[24] Pedro A. Ortega,et al. A Medical Claim Fraud/Abuse Detection System based on Data Mining: A Case Study in Chile , 2006, DMIN.
[25] Panayiotis Kotzanikolaou,et al. Secure Multipath Routing for Mobile Ad Hoc Networks , 2005, Second Annual Conference on Wireless On-demand Network Systems and Services.
[26] Chang-Tien Lu,et al. Survey of fraud detection techniques , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.
[27] S. V. Raghavan,et al. SMORT: Scalable multipath on-demand routing for mobile ad hoc networks , 2007, Ad Hoc Networks.
[28] Jun-Jang Jeng,et al. RuleBAM: a rule-based framework for business activity management , 2004, IEEE International Conference onServices Computing, 2004. (SCC 2004). Proceedings. 2004.
[29] Kemal Bicakci,et al. One-Time Passwords: Security Analysis Using BAN Logic and Integrating with Smartcard Authentication , 2003, ISCIS.
[30] Rüdiger W. Brause,et al. Neural data mining for credit card fraud detection , 1999, Proceedings 11th International Conference on Tools with Artificial Intelligence.
[31] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[32] Samir Ranjan Das,et al. Performance of Multipath Routing for On-Demand Protocols in Mobile Ad Hoc Networks , 2001, Mob. Networks Appl..
[33] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[34] John J. McCarthy,et al. The Rule Engine for the Java Platform , 2008 .
[35] Anne Rogers,et al. Hancock: a language for extracting signatures from data streams , 2000, KDD '00.
[36] Ronnie Alves,et al. Establishing Fraud Detection Patterns Based on Signatures , 2006, ICDM.
[37] Mahesh K. Marina,et al. Ad hoc on-demand multipath distance vector routing , 2006, Wirel. Commun. Mob. Comput..
[38] Guido Dedene,et al. Auto claim fraud detection using Bayesian learning neural networks , 2005, Expert Syst. Appl..