{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:29:07Z","timestamp":1762032547505},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540307068"},{"type":"electronic","value":"9783540324225"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593980_20","type":"book-chapter","created":{"date-parts":[[2005,11,3]],"date-time":"2005-11-03T07:40:20Z","timestamp":1131003620000},"page":"263-276","source":"Crossref","is-referenced-by-count":19,"title":["A Game-Theoretic Approach to Credit Card Fraud Detection"],"prefix":"10.1007","author":[{"given":"Vishal","family":"Vatsa","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A. K.","family":"Majumdar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Chiueh, T., Pilania, D.: Design, Implementation and Evaluation of a Repairable Database Management System. In: Proceedings of ACSAC 2004, pp. 179\u2013188 (2004)"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Chung, C.Y., Gertz, M., Levitt, K.: DEMIDS: A Misuse Detection System for Database Systems. In: Third International IFIP TC-11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems, pp. 159\u2013178 (1999)","DOI":"10.1007\/978-0-387-35501-6_12"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Lee, V.C.S., Stankovic, J.A., Son, H.S.: Intrusion Detection in Real-Time Database Systems via Time Signatures. In: Proc. Sixth IEEE Real Time Technology and Applications Symposium (RTAS 2000), pp. 124\u2013133 (2000)","DOI":"10.1109\/RTTAS.2000.852457"},{"key":"20_CR4","unstructured":"Hu, Y., Panda, B.: Identification of Malicious Transactions in Database Systems. In: Seventh Int. Database Engineering and Applications Symposium (IDEAS), China, pp. 329\u2013335 (2003)"},{"key":"20_CR5","unstructured":"Hamilton, S.N., Miller, W.L., Ott, A., Saydjari, O.S.: The Role of Game Theory in Information Warfare. In: Fourth Information Survivability Workshop (2002)"},{"key":"20_CR6","unstructured":"Hamilton, S.N., Miller, W.L., Ott, A., Saydjari, O.S.: Challenges in Applying Game Theory to the Domain of Information Warfare. In: Fourth Information Survivability Workshop (2002)"},{"key":"20_CR7","unstructured":"Liu, P., Li, L.: A Game-Theoretic Approach for Attack Prediction, Technical Report, PSU-S2-2002-01, Penn State University (2002)"},{"key":"20_CR8","unstructured":"Complete Website and e-commerce solutions (April 20, 2005), http:\/\/www.haveninternet.com\/welcome.htm"},{"key":"20_CR9","unstructured":"Merchant account credit card processing (April 20, 2005), http:\/\/www.aaa-merchant-account.com\/"},{"key":"20_CR10","unstructured":"Clearly Business \u00e2\u01cd\u015e Card Fraud (April 20, 2005), http:\/\/www.clearlybusiness.com\/cb\/articles\/"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Online fraud is 12 times higher than offline fraud (April 20, 2005), http:\/\/sellitontheweb.com\/ezine\/news0434.shtml","DOI":"10.1016\/S1361-3723(05)70288-8"},{"key":"20_CR12","unstructured":"Li, Y., Zhang, X.: A Security-Enhanced One-Time Payment Scheme for Credit Card. In: 14th International Workshop on RIDE\u00e2\u01cd\u0179 2004, pp. 40\u201347 (2004)"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Peters, M.E.: Emerging eCommerce Credit and Debit Card Protocols. In: Proc. 3rd International Symposium on Electronic Commerce, pp. 39\u201346 (2002)","DOI":"10.1109\/ISEC.2002.1166909"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Low, S.H., Maxemchuk, N.F., Paul, S.: Anonymous credit cards and their collusion analysis. IEEE\/ACM Transactions on Networking, 809\u2013816 (1996)","DOI":"10.1109\/90.556339"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Reilly, D.L.: Credit card fraud detection with a neural network. In: Proc. 27th Annual Hawaii International Conference on System Sciences, pp. 621\u2013630 (1994)","DOI":"10.1109\/HICSS.1994.323314"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Aleskerov, E., Freisleben, B., Rao, B.: CARDWATCH: A Neural Network Based Database Mining System for Credit Card Fraud Detection. In: Proc. Computational Intelligence for Financial Engineering (CIFEr), pp. 220\u2013226 (1997)","DOI":"10.1109\/CIFER.1997.618940"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Chan, P.K., Fan, W., Prodromidis, A.L., Stolfo, S.J.: Distributed Data Mining in Credit Card Fraud Detection. IEEE Intelligent Systems, 67\u201374 (1999)","DOI":"10.1109\/5254.809570"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Syeda, M., Zhang, Y.Q., Pan, Y.: Parallel Granular Neural Networks for Fast Credit Card Fraud Detection. In: Proc. FUZZ-IEEE 2002 Int. Conference, pp. 572\u2013577 (2002)","DOI":"10.1109\/FUZZ.2002.1005055"},{"key":"20_CR19","unstructured":"Game Theory (April 26, 2005), http:\/\/plato.stanford.edu\/entries\/game-theory\/"},{"key":"20_CR20","unstructured":"Kydd, A.: Formal Theory for Political Science \u00e2\u01cd\u015e Lecture Notes (2002)"},{"key":"20_CR21","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1002\/(SICI)1520-6750(199804)45:3<327::AID-NAV6>3.0.CO;2-9","volume":"45","author":"T.S. Ferguson","year":"1998","unstructured":"Ferguson, T.S., Melolidakis, C.: On the Inspection Game. Naval Research Logistics\u00a045, 327\u2013334 (1998)","journal-title":"Naval Research Logistics"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Kodialam, M., Lakshman, T.V.: Detecting network intrusions via sampling: A Game-theoretic Approach. In: Proc. IEEE INFOCOM 2003, pp. 1880\u20131889 (2003)","DOI":"10.1109\/INFCOM.2003.1209210"},{"key":"20_CR23","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1002\/nav.3800130103","volume":"13","author":"M. Maschler","year":"1966","unstructured":"Maschler, M.: A price leadership method for solving the inspector\u00e2\u01cd\u0179s non-constant sum game. Naval Research Logistics Quarterly\u00a013, 11\u201333 (1966)","journal-title":"Naval Research Logistics Quarterly"},{"key":"20_CR24","unstructured":"\u00e2\u01cdIJTit for Tat\u00e2\u01cd\u0130 (April 28, 2005), http:\/\/www.abc.net.au\/science\/slab\/tittat\/story.htm"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593980_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:02:56Z","timestamp":1605643376000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593980_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540307068","9783540324225"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/11593980_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}