Subscription fraud prevention in telecommunications using fuzzy rules and neural networks
Tài liệu tham khảo
Barghava, 2003, Fraud formalization and detection, Vol. 2737, 330
Bolton, 2002, Statistical fraud detection: A review, Statistical Science, 17, 235, 10.1214/ss/1042727940
Burge, 2001, An unsupervised neural network approach to profiling the behavior of mobile phone users for use in fraud detection, Journal of Parallel and Distributed Computing, 61, 915, 10.1006/jpdc.2000.1720
Cahill, 2002, Detecting fraud in the real world, 913
Chan, 1999, Distributed data mining in credit card fraud detection, IEEE Intelligent Systems, 14, 67, 10.1109/5254.809570
Collins, 1999, Telecommunications crime—Part 1, Computer & Security, 18, 577, 10.1016/S0167-4048(99)82004-5
Collins, 1999, Telecommunications crime—Part 2, Computer & Security, 18, 683, 10.1016/S0167-4048(99)80132-1
Collins, 2000, Telecommunications crime—Part 3, Computer & Security, 19, 141, 10.1016/S0167-4048(00)87824-4
Cortes, 2001, Communities of interest, Vol. 2189, 105
Cortes, 2003, Computational methods for dynamics graphs, Journal of Computational and Graphical Statistics, 12, 950, 10.1198/1061860032742
Daskalaki, 2003, Data mining for decision support on customer insolvency in telecommunications business, European Journal of Operational Research, 145, 239, 10.1016/S0377-2217(02)00532-5
Ezawa, 1996, Constructing Bayesian networks to predict uncollectible telecommunications accounts, IEEE Expert, 11, 45, 10.1109/64.539016
Fawcett, 2002, Case study: Adaptive fraud detection
Fawcett, T. (2003). ROC graphs: Notes and practical considerations for data mining researchers. HP Labs. Technical report HPL-2003-4.
Fawcett, T., & Provost, F. (1997a). Combining data mining and machine learning for effective fraud detection. In AI approaches to fraud detection and risk management, workshop technical report WS-97-07 (pp. 14–19). Menlo Park, CA: AAAI Press.
Fawcett, 1997, Adaptive fraud detection, Data Mining and Knowledge Discovery, 1, 291, 10.1023/A:1009700419189
Fawcett, 2002, Fraud detection
FML. (2003). FML revenue assurance and fraud management yearbook.
Hoath, 1998, Telecoms fraud, the gory details, Computer Fraud & Security, 1998, 10, 10.1016/S1361-3723(97)82712-1
Hoath, 1999, What's new in telecoms fraud?, Computer Fraud & Security, 1999, 13, 10.1016/S1361-3723(99)80006-2
Hong, 2001, Advances in predictive models for data mining, Pattern Recognition Letters, 22, 55, 10.1016/S0167-8655(00)00099-4
Kou, 2004, Survey of fraud detection techniques
Liao, 2005, Expert systems methodologies and applications—a decade review from 1995 to 2004, Expert Systems with Applications, 28, 93, 10.1016/j.eswa.2004.08.003
Mozer, 2000, Predicting subscriber dissatisfaction and improving retention in the wireless telecommunications industry, IEEE Transactions on Neural Networks, 11, 690, 10.1109/72.846740
Paredes, 2005, Lessons from the deregulation transition in Chile's local telephony market, Telecommunications Policy, 29, 333, 10.1016/j.telpol.2004.02.003
Phua, C., Lee, V., Smith, K., & Gayler R. (2005). A comprehensive survey of data mining-based fraud detection research. Available at http://www.bsys.monash.edu.au/people/cphua/.
Provost, F., & Fawcett, T. (1997). Analysis and visualization of classifier performance with nonuniform class and cost distributions. In AI approaches to fraud detection and risk management, workshop technical report WS-97-07 (pp. 57–63). Menlo Park, CA: AAAI Press.
Rosset, S., Murad, U., Neumann, E., Idan, Y., & Pinkas, G. (1999). Discovery of fraud rules for telecommunications—Challenges and solutions. In Proceedings of the fifth ACM SIGKDD international conference on knowledge discovery and data mining (pp. 409–413).
Shawe-Taylor, 1999, Detection of fraud in mobile telecommunications, Information Security Technical Report, 4, 16, 10.1016/S1363-4127(99)80003-X
Shawe-Taylor, 2000, Novel techniques for profiling and fraud in mobile telecommunications, 113
Stehmann, 1995, Network liberalization and developing countries: The case of Chile, Telecommunications Policy, 19, 667, 10.1016/0308-5961(95)00043-7
Stolfo, S. J., Fan, D. W., Lee W. L., Prodromidis, A. L., & Chan, P. K. (1997). Credit card fraud detection using meta-learning: Issues and initial results. In AI approaches to fraud detection and risk management, workshop technical report WS-97-07 (pp. 83–90). Menlo Park, CA: AAAI Press.
SUBTEL. (2002). Estadísticas del Sector de las Telecomunicaciones en Chile: 2000-Primer semestre 2002. Informe Estadístico 6. Gobierno de Chile: Subsecretaría de Telecomunicaciones (Available at http://www.subtel.cl).
Vellido, 1999, Neural networks in business: A survey of applications (1992–1998), Expert Systems with Applications, 17, 51, 10.1016/S0957-4174(99)00016-0
Weatherford, 2002, Mining for fraud, IEEE Intelligent Systems, 17, 4, 10.1109/MIS.2002.1024744
Wei, 2002, Turning telecommunications call details to churn prediction: A data mining approach, Expert Systems with Applications, 23, 103, 10.1016/S0957-4174(02)00030-1
Wieland, 2004, The last taboo? Revenue leakage continues to hamper the telecom industry, Telecommunications (International Edition), 38, 10
Wong, 1997, Neural network applications in business: A review and analysis of the literature (1988–95), Decision Support Systems, 19, 301, 10.1016/S0167-9236(96)00070-X
Wong, 1995, Expert system applications in business: A review and analysis of the literature (1977–1993), Information & Management, 29, 141, 10.1016/0378-7206(95)00023-P