{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:44:45Z","timestamp":1742957085034,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030116798"},{"type":"electronic","value":"9783030116804"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-11680-4_16","type":"book-chapter","created":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T02:04:31Z","timestamp":1549505071000},"page":"151-159","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Data Mining Algorithms for Risk Detection in Bank Loans"],"prefix":"10.1007","author":[{"given":"Alvaro","family":"Talavera","sequence":"first","affiliation":[]},{"given":"Luis","family":"Cano","sequence":"additional","affiliation":[]},{"given":"David","family":"Paredes","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Chong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,8]]},"reference":[{"key":"16_CR1","unstructured":"Bolton, R.J., Hand, D.J.: Unsupervised profiling methods for fraud detection. In: Proceedings of Credit Scoring and Credit Control VII (2001)"},{"key":"16_CR2","unstructured":"Bravo, E., Talavera, A., Serra, M.R.: Prediction and explanation in credit scoring problems. In: Data Analytics Applications in Latin America and Emerging Economies. Auerbach Publications, New York (2017)"},{"key":"16_CR3","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1109\/PGEC.1965.264137","volume":"14","author":"TM Cover","year":"1965","unstructured":"Cover, T.M.: Geometrical and statistical properties of systems of linear inequalities with applications in pattern recognition. IEEE Trans. Electron. Comput. 14, 326\u2013334 (1965)","journal-title":"IEEE Trans. Electron. Comput."},{"issue":"2","key":"16_CR4","first-page":"57","volume":"4","author":"L Delamaire","year":"2009","unstructured":"Delamaire, L., Abdou, H., Pointon, J.: Credit card fraud and detection techniques: a review. Banks Bank Syst. 4(2), 57\u201368 (2009)","journal-title":"Banks Bank Syst."},{"key":"16_CR5","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.geb.2010.02.004","volume":"70","author":"J Geanakoplos","year":"2010","unstructured":"Geanakoplos, J., Dubey, P.: Credit cards and inflation. Games Econ. Behav. 70, 325\u2013353 (2010)","journal-title":"Games Econ. Behav."},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Reilly, D.L.: Credit card fraud detection with a neural-network. In: Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences (1994)","DOI":"10.1109\/HICSS.1994.323314"},{"key":"16_CR7","unstructured":"Guo, T., Li, G.Y.: Neural data mining for credit card fraud detection. In: 2008 International Conference on Machine Learning and Cybernetics, vol. 7 (2008)"},{"issue":"4","key":"16_CR8","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1016\/j.eswa.2006.02.016","volume":"32","author":"E Kirkos","year":"2007","unstructured":"Kirkos, E., Spathis, C., Manolopoulos, Y.: Data mining techniques for the detection of fraudulent financial statements. Expert Syst. Appl. 32(4), 995\u20131003 (2007)","journal-title":"Expert Syst. Appl."},{"key":"16_CR9","unstructured":"Lichman, M.: UCI machine learning repository (2013). \n                  http:\/\/archive.ics.uci.edu\/ml"},{"key":"16_CR10","unstructured":"Maes, S., Tuyls, K., Vanschoenwinkel, B.: Credit card fraud detection using Bayesian and neural networks (2015)"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Sahin, Y., Duman, E.: Detecting credit card fraud by decision trees and support vector machines. In: Vector Machines, International Multiconference of Engineers and Computer Scientists (2011)","DOI":"10.1109\/INISTA.2011.5946108"},{"issue":"3","key":"16_CR12","first-page":"29","volume":"98","author":"V Vaishali","year":"2014","unstructured":"Vaishali, V.: Fraud detection in credit card by clustering approach. Int. J. Comput. Appl. 98(3), 29\u201332 (2014)","journal-title":"Int. J. Comput. Appl."},{"issue":"11","key":"16_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0895-7177(93)90202-A","volume":"18","author":"MS Yang","year":"1993","unstructured":"Yang, M.S.: A survey of fuzzy clustering. Math. Comput. Model. 18(11), 1\u201316 (1993)","journal-title":"Math. Comput. Model."},{"issue":"3","key":"16_CR14","first-page":"35","volume":"52","author":"M Zareapoor","year":"2012","unstructured":"Zareapoor, M., Seeja, K.R., Alam, M.A.: Analysis on credit card fraud detection techniques: based on certain design criteria. Int. J. Comput. Appl. 52(3), 35\u201342 (2012)","journal-title":"Int. J. Comput. Appl."},{"key":"16_CR15","first-page":"48","volume":"18","author":"V Zaslavsky","year":"2006","unstructured":"Zaslavsky, V., Strizhak, A.: Credit card fraud detection using self-organizing maps. Int. J. Inf. Secur. 18, 48 (2006)","journal-title":"Int. J. Inf. Secur."}],"container-title":["Communications in Computer and Information Science","Information Management and Big Data"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-11680-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:10:45Z","timestamp":1558397445000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-11680-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030116798","9783030116804"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-11680-4_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"8 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SIMBig","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Symposium on Information Management and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lima","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Peru","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"simbig2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/simbig.org\/SIMBig2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}