Skip to main content
Security and Defence Management
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Philip Spassov
Introduction
Short CV
Insert CV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Lebichot, Bertrand
,
Fabian Braun
,
Olivier Caelen
, and
Marco Saerens
.
A graph-based, semi-supervised, credit card fraud detection system
In
Complex Networks & Their Applications V. COMPLEX NETWORKS 2016. Studies in Computational Intelligence
. Vol. 693. Cham: Springer, 2016.
Sorournejad, Samaneh
,
Zahra Zojaji
,
Reza Ebrahimi Atani
, and
Amir Hassan Monadjemi
.
A Survey of Credit Card Fraud Detection Techniques: Data and Technique Oriented Perspective
In
Computer Science, Cryptography and Security
. Cornell University , 2016.
Li, Xingan
,
Henry Joutsijoki
,
Jorma Laurikkala
, and
Martti Juhola
.
"
Crime vs. Demographic Factors Revisited: Application of Data Mining Methods
."
Webology
12, no. 1 (2015).
Almendra, Vinicius da Silva
, and
Denis Enachescu
.
"
Using Self-Organizing Maps for Fraud Prediction at Online Auction Sites
." In
15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing
. Timisoara, Romania , 2013.
Jeong, Seong Hoon
,
Hana Kim
,
Youngsang Shin
,
Taejin Lee
, and
Huy Kang Kim
.
"
A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique (결제로그 분석 및 데이터 마이닝을 이용한 이상거래 탐지 연구 조사)
."
Journal of the Korea Institute of Information Security and Cryptology (정보보호학회논문지)
25, no. 6 (2015): 1525-1540.
Mahmud, Mohammad Sultan
,
Phayung Meesad
, and
Sunantha Sodsee
.
"
An evaluation of computational intelligence in credit card fraud detection
." In
International Computer Science and Engineering Conference (ICSEC)
. Chiang Mai, Thailand , 2016.
Li, Xingan
,
Henry Joutsijoki
,
Jorma Laurikkala
, and
Martti Juhola
.
"
GDP growth vs. criminal phenomena: data mining of Japan 1926–2013
."
AI & SOCIETY
33, no. 2 (2018): 261-274.
Falaki, S. O.
,
B. K. Alese
,
O. S. Adewale
,
J. O. Ayeni
,
G. A. Aderounmu
, and
W. O. Ismaila
.
"
Probabilistic Credit Card Fraud Detection System in Online Transactions
."
International Journal of Software Engineering and Its Applications
6, no. 4 (2012).
Almendra, Vinicius
, and
Denis Enachescu
.
"
Using Self-Organizing Maps for Binary Classification With Highly Imbalanced Datasets
."
International Journal of Numerical Analysis and Modeling, Series B
5, no. 3 (2014): 238-254.
Zanin, Massimiliano
,
Miguel Romance
,
Santiago Moral
, and
Regino Criado
.
"
Credit Card Fraud Detection through Parenclitic Network Analysis
."
Complexity
(2018).
Sitek, Albert
, and
Zbigniew Kotulski
.
"
POS-originated transaction traces as a source of contextual information for risk management systems in EFT transactions
."
EURASIP Journal on Information Security
(2018).
Zheng, Lutao
,
Guanjun Liu
,
Chungang Yan
, and
Changjun Jiang
.
"
Transaction Fraud Detection Based on Total Order Relation and Behavior Diversity
."
IEEE Transactions on Computational Social Systems
5, no. 3 (2018).
Taghva, Mohammad Reza
,
Taha Mansouri
,
Kamran Feiz
, and
Babak Akhgar4
.
"
Fraud Detection in Credit Card Transactions; Using Parallel Processing of Anomalies in Big Data
."
Journal of Information Technology Management
8, no. 3 (2016): 477-498.
Barman, Subhas
,
Utpal Pal
,
Asif Sarfaraj
,
Biswajit Biswas
,
Animesh Mahata
, and
Palash Mandal
.
"
A complete literature review on financial fraud detection applying data mining techniques
."
International Journal of Trust Management in Computing and Communications (IJTMCC)
3, no. 4 (2016).
Falaki, S. O.
,
B. K. Alese
, and
W. O. Ismaila
.
"
An update research on credit card on-line transactions
."
International Journal of Economic Development Research and Investment
1, no. 2 & 3 (2010).
Malekpour, Milad
,
Maryam Khademi
, and
Behrouz Minae-Bidgoli
.
"
A Hybrid Data Mining Method for Intrusion and Fraud Detection in E-Banking Systems
."
Journal of Computational Intelligence and Electronic Systems
3, no. 1–6 (2014).
Jans, Mieke
,
Nadine Lybaert
, and
Koen Vanhoof
.
"
Data Mining and Economic Crime Risk Management
." In
Data Mining: Concepts, Methodologies, Tools, and Applications
., 2013.
Triepels, Ron
,
Hennie Daniels
, and
Ronald Heijmans
.
Detection and Explanation of Anomalous Payment Behavior in Real-Time Gross Settlement Systems
In
Enterprise Information Systems, 19th International Conference, ICEIS 2017
. Porto, Portugal, 2017.
Gómez-Restrepo, Jackelyne
, and
Myladis R. Cogollo-Flórez
.
"
Detection of Fraudulent Transactions Through a Generalized Mixed Linear Models
."
Ingeniería y Ciencia
8, no. 16 (2012).
Zandian, Zahra Karimi
, and
Mohammadreza Keyvanpour
.
"
Systematic identification and analysis of different fraud detection approaches based on the strategy ahead
."
International Journal of Knowledge-based and Intelligent Engineering Systems
21, no. 2 (2017): 123-134.
Lebichot, Bertrand
.
Network analysis based on bag-of-paths: classification, node criticality and randomized policies
. Vol. Doctor of Engineering Science. Université catholique de Louvain, 2018.
Triepels, Ron
,
Hennie Daniels
, and
Ronald Heijmans
.
Anomaly Detection in Real-Time Gross Settlement Systems
In
Proceedings of the 19th International Conference on Enterprise Information Systems (ICEIS 2017)
. Vol. 1., 2017.
Beach, Scott R.
.
"
The Role of Technology in Elder Abuse Research
." In
Elder Abuse
, 201-214., 2017.
Lia, Xingan
,
Henry Joutsijoki
,
Jorma Laurikkala
, and
Martti Juhola
.
"
GDP Growth vs. Criminal Phenomena: Data Mining of Japan 1926-2013
."
AI & SOCIETY
33, no. 2 (2018): 261-274.
Kavitha, M.
, and
M. Suriakala
.
"
Hybrid Multi-Level Credit Card Fraud Detection System by Bagging Multiple Boosted Trees (BMBT)
." In
IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)
. Coimbatore, India , 2017.
Pages
« първа
‹ предишна
…
350
351
352
353
354
355
356
357
358
…
следваща ›
последна »
384388 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
26/08/2015
Closing the Call on National Case Studies in Organizing Cybersecurity
10/04/2015
CfP on Education & Training for Cybersecurity and Resilience
26/03/2015
CfP on Crisis Management Policies, Organisation and Capabilities
15/08/2014
EvoCS project webiste launched
31/07/2014
Call for Papers on Heart Failure and Stress Response
25/03/2015
Standing Call for Papers for the Biomedical Data Journal
07/04/2015
Call for Papers on Brain Disorders announced
31/03/2015
Call for Papers on High Throughput Drug Screening
07/01/2015
The Winter 2014 issue of Connections now online
03/04/2015
Call for Papers on Evolving Concepts of Security
view all