{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T20:54:31Z","timestamp":1767905671997,"version":"3.49.0"},"publisher-location":"Cham","reference-count":53,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030222765","type":"print"},{"value":"9783030222772","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_26","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:02:28Z","timestamp":1577775748000},"page":"653-681","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Computational Techniques for Real-Time Credit Card Fraud Detection"],"prefix":"10.1007","author":[{"given":"Sangeeta","family":"Mittal","sequence":"first","affiliation":[]},{"given":"Shivani","family":"Tyagi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"issue":"3","key":"26_CR1","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1016\/j.dss.2010.08.008","volume":"50","author":"S Bhattacharyya","year":"2011","unstructured":"Bhattacharyya, S., Jha, S., Tharakunnel, K., & Westland, J. C. (2011). Data mining for credit card fraud: A comparative study. Decision Support Systems, 50(3), 602\u2013613.","journal-title":"Decision Support Systems"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Gupta, B. B., & Quamara, M. A. (2018). Taxonomy of various attacks on smart card\u2013based applications and countermeasures. Concurrency Computation Practice Experience, e4993.","DOI":"10.1002\/cpe.4993"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Ghosh, R. (1994). Credit card fraud detection with a neural-network. In Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences, Wailea, HI (pp. 621\u2013630).","DOI":"10.1109\/HICSS.1994.323314"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Richardson, R. (1997). Neural networks compared to statistical techniques. In Proceedings of the IEEE\/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr), New York City, NY (pp. 89\u201395).","DOI":"10.1109\/CIFER.1997.618919"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Hanagandi, V., Dhar, A., & Buescher, K. (1996). Density-based clustering and radial basis function modeling to generate credit card fraud scores. In IEEE\/IAFE Conference on Computational Intelligence for Financial Engineering (CIFEr), New York City, NY (pp. 247\u2013251).","DOI":"10.1109\/CIFER.1996.501848"},{"issue":"6","key":"26_CR6","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/5254.809570","volume":"14","author":"PK Chan","year":"1999","unstructured":"Chan, P. K., Fan, W., Prodromidis, A. L., & Stolfo, S. J. (1999). Distributed data mining in credit card fraud detection. IEEE Intelligent Systems and Their Applications, 14(6), 67\u201374.","journal-title":"IEEE Intelligent Systems and Their Applications"},{"issue":"2","key":"26_CR7","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1093\/imaman\/12.2.173","volume":"12","author":"DJ Hand","year":"2001","unstructured":"Hand, D. J., & Blunt, G. (2001). Prospecting for gems in credit card data. IMA Journal of Management Mathematics, 12(2), 173\u2013200.","journal-title":"IMA Journal of Management Mathematics"},{"key":"26_CR8","unstructured":"Bolton, R. J., & Hand, D. J. (2001) Unsupervised profiling methods for fraud detection. In Conference on Credit Scoring and Credit Control."},{"key":"26_CR9","unstructured":"Syeda, M., Zhang, Y.-Q., & Pan, Y. (2002) Parallel granular neural networks for fast credit card fraud detection. In IEEE World Congress on Computational Intelligence Proceedings (Cat. No.02CH37291), Honolulu, HI (Vol. 1, pp. 572\u2013577)."},{"issue":"3","key":"26_CR10","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1214\/ss\/1042727940","volume":"17","author":"Richard J. Bolton","year":"2002","unstructured":"Bolton, R. J., & Hand, D. J. (2002). Statistical fraud detection: A review. Statistical Science, 17. \nhttps:\/\/doi.org\/10.1214\/ss\/1042727940\n\n.","journal-title":"Statistical Science"},{"issue":"5","key":"26_CR11","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1109\/MSECP.2003.1236244","volume":"99","author":"B McCarty","year":"2003","unstructured":"McCarty, B. (2003). Automated identity theft. IEEE Security & Privacy, 99(5), 89\u201392.","journal-title":"IEEE Security & Privacy"},{"key":"26_CR12","unstructured":"Kou, Y., Lu, C.-T., Sirwongwattana, S., & Huang, Y.-P. (2004) Survey of fraud detection techniques. In: IEEE International Conference on Networking, Sensing and Control, Taipei (Vol. 2, pp. 749\u2013754)."},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Leung, A., Yan, Z., & Fong, S. (2004). On designing a flexible e-payment system with fraud detection capability. In Proceedings. IEEE International Conference on e-Commerce Technology, San Diego, CA (pp. 236\u2013243).","DOI":"10.1109\/ICECT.2004.1319739"},{"key":"26_CR14","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1016\/j.inffus.2008.04.001","volume":"10","author":"S Panigrahi","year":"2009","unstructured":"Panigrahi, S., Kundu, A., Sural, S., & Majumdar, A. K. (2009). Credit card fraud detection: A fusion approach using Dempster-Shafer theory and Bayesian learning. Information Fusion, 10, 354\u2013363.","journal-title":"Information Fusion"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Quah, J. T. S., & Sriganesh, M. (2007). Real time credit card fraud detection using computational intelligence. In International Joint Conference on Neural Networks, Orlando, FL (pp. 863\u2013868).","DOI":"10.1109\/IJCNN.2007.4371071"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Brabazon, A., Cahill, J., Keenan, P., & Walsh, D. (2010). Identifying online credit card fraud using artificial immune systems. In IEEE Congress on Evolutionary Computation, Barcelona (pp. 1\u20137).","DOI":"10.1109\/CEC.2010.5586154"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Bahnsen, A. C., Stojanovic, A., Aouada, D., & Ottersten, B. (2013) Cost sensitive credit card fraud detection using Bayes minimum risk. In 12th International Conference on Machine Learning and Applications, Miami, FL (pp. 333\u2013338).","DOI":"10.1109\/ICMLA.2013.68"},{"key":"26_CR18","doi-asserted-by":"publisher","first-page":"13057","DOI":"10.1016\/j.eswa.2011.04.110","volume":"38","author":"E Duman","year":"2011","unstructured":"Duman, E., & \u00d6z\u00e7elik, M. (2011). Detecting credit card fraud by genetic algorithm and scatter search. Expert Systems with Applications, 38, 13057\u201313063. \nhttps:\/\/doi.org\/10.1016\/j.eswa.2011.04.110\n\n.","journal-title":"Expert Systems with Applications"},{"key":"26_CR19","doi-asserted-by":"publisher","first-page":"35","DOI":"10.5120\/8184-1538","volume":"52","author":"M Zareapoor","year":"2012","unstructured":"Zareapoor, M., Seeja, K. R., & Alam, A. (2012). Analysis on credit card fraud detection techniques: Based on certain design criteria. International Journal of Computer Applications, 52, 35\u201342. \nhttps:\/\/doi.org\/10.5120\/8184-1538\n\n.","journal-title":"International Journal of Computer Applications"},{"key":"26_CR20","first-page":"53","volume":"22","author":"N Wong","year":"2012","unstructured":"Wong, N., Ray, P., Stephens, G., & Lewis, L. (2012). Artificial immune systems for the detection of credit card fraud: An architecture, prototype and preliminary results. International Journal of Information Systems, 22, 53\u201376.","journal-title":"International Journal of Information Systems"},{"issue":"1","key":"26_CR21","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.neucom.2011.02.021","volume":"75","author":"OZ Lei","year":"2012","unstructured":"Lei, O. Z., & Ghorbani, A. A. (2012). Improved competitive learning neural networks for network intrusion and fraud detection. Neurocomputing, 75(1), 135\u2013145.","journal-title":"Neurocomputing"},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Zanin, M., Romance, M., Moral, S., & Criado, R. (2018). Credit card fraud detection through parenclitic network analysis. Complexity. Article ID 5764370, 9 pp.","DOI":"10.1155\/2018\/5764370"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Rajeshwari, U., & Babu, B. S. (2016). Real-time credit card fraud detection using streaming analytics. In 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), Bangalore (pp. 439\u2013444).","DOI":"10.1109\/ICATCCT.2016.7912039"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Zeager, M. F., Sridhar, A., Fogal, N., Adams, S., Brown, D. E., & Beling, P. A. (2017). Adversarial learning in credit card fraud detection. In Systems and Information Engineering Design Symposium (SIEDS), Charlottesville, VA (pp. 112\u2013116).","DOI":"10.1109\/SIEDS.2017.7937699"},{"key":"26_CR25","doi-asserted-by":"crossref","unstructured":"Awoyemi, J. O., Adetunmbi, A. O., & Oluwadare, S. A. (2017). Credit card fraud detection using machine learning techniques: A comparative analysis. In International Conference on Computing Networking and Informatics (ICCNI), Lagos (pp. 1\u20139).","DOI":"10.1109\/ICCNI.2017.8123782"},{"key":"26_CR26","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.dss.2017.01.002","volume":"95","author":"Nuno Carneiro","year":"2017","unstructured":"Carneiro, N., Figueira, G., & Costa, M. (2017). A data mining-based system for credit-card fraud detection in e-tail. Decision Support Systems. \nhttps:\/\/doi.org\/10.1016\/j.dss.2017.01.002\n\n.","journal-title":"Decision Support Systems"},{"key":"26_CR27","doi-asserted-by":"crossref","unstructured":"Zheng, L., Liu, G., Luan, W., Li, Z., Zhang, Y., Yan, C., et al. (2018). A new credit card fraud detecting method based on behavior certificate. In IEEE 15th International Conference on Networking, Sensing and Control (ICNSC), Zhuhai (pp. 1\u20136).","DOI":"10.1109\/ICNSC.2018.8361328"},{"key":"26_CR28","doi-asserted-by":"crossref","unstructured":"Cody, T., Adams, S., & Beling, P. A. (2018). A utilitarian approach to adversarial learning in credit card fraud detection. In Systems and Information Engineering Design Symposium (SIEDS), Charlottesville, VA (pp. 237\u2013242).","DOI":"10.1109\/SIEDS.2018.8374743"},{"key":"26_CR29","doi-asserted-by":"crossref","unstructured":"Patil, S., Nemade, V., & Soni, P. K. (2018). Predictive modelling for credit card fraud detection using data analytics. In International Conference on Computational Intelligence and Data Science.","DOI":"10.1016\/j.procs.2018.05.199"},{"key":"26_CR30","doi-asserted-by":"crossref","unstructured":"Roy, A., Sun, J., Mahoney, R., Alonzi, L., Adams, S., & Beling, P. (2018). Deep learning detecting fraud in credit card transactions. In Systems and Information Engineering Design Symposium (SIEDS), Charlottesville, VA (pp. 129\u2013134).","DOI":"10.1109\/SIEDS.2018.8374722"},{"key":"26_CR31","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.engappai.2018.03.011","volume":"72","author":"AGC S\u00e1 de","year":"2018","unstructured":"de S\u00e1, A. G. C., Pereira, A. C. M., & Pappa, G. L. (2018). A customized classification algorithm for credit card fraud detection. Engineering Applications of Artificial Intelligence, 72, 21\u201329.","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"26_CR32","doi-asserted-by":"crossref","unstructured":"Dhankhad, S., Mohammed, E., & Far, B. (2018). Supervised machine learning algorithms for credit card fraudulent transaction detection: A comparative study. In IEEE International Conference on Information Reuse and Integration (IRI), Salt Lake City, UT (pp. 122\u2013125).","DOI":"10.1109\/IRI.2018.00025"},{"key":"26_CR33","doi-asserted-by":"crossref","unstructured":"Wang, Y., Adams, S. C., Beling, P. A., Greenspan, S., Rajagopalan, S., Velez-Rojas, M. C., et al. (2018). Privacy preserving distributed deep learning and its application in credit card fraud detection. In 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), New York, NY (pp. 1070\u20131078).","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00150"},{"issue":"4","key":"26_CR34","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1108\/13590790810907236","volume":"15","author":"KJ Barker","year":"2008","unstructured":"Barker, K. J., D\u2019amato, J., & Sheridon, P. (2008). Credit card fraud: Awareness and prevention. Journal of Financial Crime, 15(4), 398\u2013410.","journal-title":"Journal of Financial Crime"},{"key":"26_CR35","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.jnca.2016.04.007","volume":"68","author":"A Abdallah","year":"2016","unstructured":"Abdallah, A., Maarof, M. A., & Zainal, A. (2016). Fraud detection system. Journal of Network and Computer Applications, 68, 90\u2013113.","journal-title":"Journal of Network and Computer Applications"},{"issue":"3","key":"26_CR36","first-page":"126","volume":"2","author":"V Dheepa","year":"2009","unstructured":"Dheepa, V., & Dhanapal, R. (2009). Analysis of credit card fraud detection methods. International Journal of Recent Trends in Engineering, 2(3), 126.","journal-title":"International Journal of Recent Trends in Engineering"},{"issue":"8","key":"26_CR37","doi-asserted-by":"publisher","first-page":"3784","DOI":"10.1109\/TNNLS.2017.2736643","volume":"29","author":"A Dal Pozzolo","year":"2018","unstructured":"Dal Pozzolo, A., Boracchi, G., Caelen, O., Alippi, C., & Bontempi, G. (2018). Credit card fraud detection: A realistic modeling and a novel learning strategy. IEEE Transactions on Neural Networks and Learning Systems, 29(8), 3784\u20133797.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"1","key":"26_CR38","first-page":"20","volume":"1","author":"T Subbulakshmi","year":"2010","unstructured":"Subbulakshmi, T., Mathew, G., & Shalinie, S. M. (2010). Real time classification and clustering of ids alerts using machine learning algorithms. International Journal of Artificial & Application, 1(1), 20.","journal-title":"International Journal of Artificial & Application"},{"key":"26_CR39","unstructured":"Sorournejad, S., Zojaji, Z., Atani, R. E., & Monadjemi, A. H. (2016). A survey of credit card fraud detection techniques: Data and technique oriented perspective. ArXiv preprint, arXiv:1611.06439."},{"key":"26_CR40","doi-asserted-by":"publisher","first-page":"4915","DOI":"10.1016\/j.eswa.2014.02.026","volume":"41","author":"A Dal Pozzolo","year":"2014","unstructured":"Dal Pozzolo, A., Caelen, O., Le Borgne, Y.-A., Waterschoot, S., & Bontempi, G. (2014). Learned lessons in credit card fraud detection from a practitioner perspective. Expert Systems with Applications, 41, 4915\u20134928.","journal-title":"Expert Systems with Applications"},{"key":"26_CR41","doi-asserted-by":"crossref","unstructured":"Dal Pozzolo, A., Boracchi, G., Caelen, O., Alippi, C., & Bontempi, G. (2015). Credit card fraud detection and concept-drift adaptation with delayed supervised information. In International Joint Conference on Neural Networks (IJCNN), Killarney (pp. 1\u20138).","DOI":"10.1109\/IJCNN.2015.7280527"},{"key":"26_CR42","unstructured":"Dal Pozzolo, A. (2015). Adaptive machine learning for credit card fraud detection [online]. Retrieved from \nhttp:\/\/difusion.ulb.ac.be\/vufind\/Record\/ULB"},{"key":"26_CR43","doi-asserted-by":"publisher","first-page":"14277","DOI":"10.1109\/ACCESS.2018.2806420","volume":"6","author":"K Randhawa","year":"2018","unstructured":"Randhawa, K., Loo, C. K., Seera, M., Lim, C. P., & Nandi, A. K. (2018). Credit card fraud detection using AdaBoost and majority voting. IEEE Access, 6, 14277\u201314284.","journal-title":"IEEE Access"},{"issue":"3","key":"26_CR44","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1109\/TCSS.2018.2856910","volume":"5","author":"L Zheng","year":"2018","unstructured":"Zheng, L., Liu, G., Yan, C., & Jiang, C. (2018). Transaction fraud detection based on total order relation and behavior diversity. IEEE Transactions on Computational Social Systems, 5(3), 796\u2013806.","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"26_CR45","unstructured":"Newman, D. J., & Asuncion, A. (2007) UCI machine learning repository. Transformed datasets are available at \nhttp:\/\/www.ulb.ac.be\/di\/map\/adalpozz\/imbalanced-datasets.zip\n\n."},{"key":"26_CR46","doi-asserted-by":"publisher","first-page":"48","DOI":"10.11610\/isij.1803","volume":"18","author":"V Zaslavsky","year":"2006","unstructured":"Zaslavsky, V., & Strizhak, A. (2006). Credit card fraud detection using self-organizing maps. International Journal Information & Security, 18, 48\u201363.","journal-title":"International Journal Information & Security"},{"key":"26_CR47","doi-asserted-by":"crossref","unstructured":"Hssina, B., Merbouha, A., Ezzikouri, H., & Erritali, M. (2014) A comparative study of decision tree ID3 and C4.5. International Journal of Advanced Computer Science and Applications (Special Issue on Advances in Vehicular Ad Hoc Networking and Applications).","DOI":"10.14569\/SpecialIssue.2014.040203"},{"key":"26_CR48","volume-title":"Artificial immune systems: A new computational intelligence approach","author":"LN Castro De","year":"2002","unstructured":"De Castro, L. N., & Timmis, J. (2002). Artificial immune systems: A new computational intelligence approach. London: Springer."},{"key":"26_CR49","doi-asserted-by":"crossref","unstructured":"Behera, T. K., & Panigrahi, S. (2015) Credit card fraud detection: A hybrid approach using fuzzy clustering and neural network. In Second International Conference on Advances in Computing and Communication Engineering, Dehradun (pp. 494\u2013499).","DOI":"10.1109\/ICACCE.2015.33"},{"key":"26_CR50","unstructured":"Heckerman, D. (1995). A tutorial on learning with Bayesian. Technical report, MSRTR-95-06. Redmond, WA: Microsoft Research."},{"key":"26_CR51","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N. V., Bowyer, K. W., Hall, L. O., & Philip Kegelmeyer, W. (2002). SMOTE: Synthetic minority over-sampling technique. Journal of Artificial Intelligence Research, 16, 321\u2013357.","journal-title":"Journal of Artificial Intelligence Research"},{"key":"26_CR52","series-title":"Lecture Notes in Computer Science","volume-title":"An unbalanced data classification model using hybrid sampling technique for fraud detection","author":"TM Padmaja","year":"2007","unstructured":"Padmaja, T. M., Dhulipalla, N., Krishna, P. R., Bapi, R. S., & Laha, A. (2007). An unbalanced data classification model using hybrid sampling technique for fraud detection (Lecture Notes in Computer Science) (Vol. 4815). Berlin: Springer."},{"key":"26_CR53","unstructured":"Elkan, C. (2001). The foundations of cost-sensitive learning. In International Joint Conference on Artificial Intelligence, Citeseer (Vol. 17, pp. 973\u2013978)."}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:07:15Z","timestamp":1577776035000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_26","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}