Agent-Based Behavioural Modelling for Anomaly Detection in Call Data from Telecommunication Networks
暂无分享,去创建一个
[1] G. Mann. The Quark and the Jaguar: adventures in the simple and the complex , 1994 .
[2] J. Sutherland. The Quark and the Jaguar , 1994 .
[3] M. Zwick. Wholes and Parts in General Systems Methodology , 2001 .
[4] John G. Proakis,et al. Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..
[5] Volker Tresp,et al. Call-Based Fraud Detection in Mobile Communication Networks Using a Hierarchical Regime-Switching Model , 1998, NIPS.
[6] Tom Fawcett,et al. Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.
[7] Catherine Bounsaythip,et al. Overview of Data Mining for Customer Behavior Modeling , 2001 .
[8] Karlton David Sequeira,et al. ANOMALY-BASED DATA MINING OF INTRUSIONS , 2002 .
[9] Diane Lambert,et al. Detecting fraud in the real world , 2002 .
[10] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[11] Judea Pearl,et al. Probabilistic reasoning in intelligent systems , 1988 .
[12] Judea Pearl,et al. Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.
[13] Iqbal Adjali,et al. Agent Based Customer Modelling , 1999 .
[14] Stephen D. Bay,et al. Mining distance-based outliers in near linear time with randomization and a simple pruning rule , 2003, KDD '03.
[15] David J. C. MacKay,et al. Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.
[16] Wander Jager,et al. An integrated approach of simulating behavioral processes , 1999 .
[17] Szymon Jaroszewicz,et al. Interestingness of frequent itemsets using Bayesian networks as background knowledge , 2004, KDD.
[18] L. Goddard. Information Theory , 1962, Nature.
[19] Nils J. Nilsson,et al. Artificial Intelligence , 1974, IFIP Congress.
[20] Yizhak Idan,et al. Discovery of fraud rules for telecommunications—challenges and solutions , 1999, KDD '99.
[21] John Shawe-Taylor,et al. Fraud detection and management in mobile telecommunications networks , 1997 .