{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:33:37Z","timestamp":1743046417915,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030336943"},{"type":"electronic","value":"9783030336950"}],"license":[{"start":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T00:00:00Z","timestamp":1572652800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-33695-0_26","type":"book-chapter","created":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T16:04:57Z","timestamp":1572624297000},"page":"377-386","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Applied Aspects of Implementation of Intelligent Information Technology for Fraud Detection During Mobile Applications Installation"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6668-2425","authenticated-orcid":false,"given":"Andrii","family":"Yarovyi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0379-1392","authenticated-orcid":false,"given":"Tetiana","family":"Polhul","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,2]]},"reference":[{"key":"26_CR1","doi-asserted-by":"publisher","unstructured":"Melnykova, N.: The basic approaches to automation of management by enterprise finances. In: 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT), Lviv, pp. 288\u2013291 (2017). \nhttps:\/\/doi.org\/10.1109\/stc-csit.2017.8098788","DOI":"10.1109\/stc-csit.2017.8098788"},{"key":"26_CR2","unstructured":"Yarovyi, A., Polhul, T., Krylyk, L.: Rozrobka metodu vyiavlennia shakhraistva pry instaliuvanni mobilnykh dodatkiv z vykorystanniam intelektualnoho analizu danykh. In: Materialy konferentsiyi\u2009XLVII Naukovo-tekhnichna konferentsiya pidrozdiliv Vinnytskoho natsionalnoho tekhnichnoho universytetu, Vinnytsia (2018). \nhttp:\/\/ir.lib.vntu.edu.ua\/bitstream\/handle\/123456789\/22722\/079.pdf?sequence=1"},{"key":"26_CR3","unstructured":"Our take on mobile fraud detection. \nhttp:\/\/geeks.jampp.com\/data-science\/mobile-fraud\/"},{"key":"26_CR4","unstructured":"Dave, V., Guha, S., Zhang, Y.: ViceROI: Catching Click-Spam in Search Ad Networks. \nhttp:\/\/www.sysnet.ucsd.edu\/~vacha\/ccs13.pdf"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Dave, V., Guha, S., Zhang, Y.: Measuring and fingerprinting click-spam in ad networks. In: Proceedings of the Annual Conference of the ACM Special Interest Group on Data Communication (SIGCOMM), Helsinki, Finland, pp. 175\u2013186, August 2012","DOI":"10.1145\/2377677.2377715"},{"key":"26_CR6","unstructured":"Yarovyi, A.A., Romanyuk, O.N., Arsenyuk, I.R., Polhul, T.D.: Program applications install fraud detection using data mining. Naukovi pratsi Donetskoho natsionalnoho tekhnichnoho universytetu. Seriya: \u201cInformatyka, kibernetyka ta obchysliuvalna tekhnika\u201d, issue 2(25), pp. 126\u2013131 (2017). \nhttp:\/\/science.donntu.edu.ua\/wp-content\/uploads\/2018\/03\/ikvt_2017_2_site-1.pdf"},{"key":"26_CR7","unstructured":"Polhul, T.D., Yarovyi, A.A.: Vyznachennia shakhraiskykh operatsiy pry vstanovlenni mobilnykh dodatkiv z vykorystanniam intelektualnoho analizu danykh. Suchasni tendentsiyi rozvytku systemnoho prohramuvannia. Tezy dopovidei, Kyiv, pp. 55\u201356 (2016). \nhttp:\/\/ccs.nau.edu.ua\/wp-content\/uploads\/2017\/12\/%D0%A1%D0%A2%D0%A0%D0%A1%D0%9F_2016_07.pdf"},{"key":"26_CR8","unstructured":"Polhul, T.D., Yarovyi, A.A.: Vyznachennia shakhraiskykh operatsiy pry instaliatsiyi mobilnykh dodatkiv z vykorystanniam intelektualnoho analizu danykh. Materialy XLVI naukovo-tekhnichnoi konferentsiyi pidrozdiliv VNTU, Vinnytsia (2017)"},{"key":"26_CR9","unstructured":"Kochava Uncovers Global Ad Fraud Scam. \nhttps:\/\/www.kochava.com\/"},{"key":"26_CR10","unstructured":"TMC Attribution Analytics. \nhttps:\/\/help.tune.com\/marketing-console\/attribution-analytics\/"},{"key":"26_CR11","unstructured":"Fraudlogix: Ad Fraud Solutions for Exchanges, Networks, SSPs & DSPs. \nhttps:\/\/www.fraudlogix.com\/"},{"key":"26_CR12","unstructured":"Kraken Antibot. \nhttp:\/\/kraken.run\/"},{"key":"26_CR13","unstructured":"AppsFlyer: Measure In-App To Grow Your Mobile Business. \nhttps:\/\/www.appsflyer.com\/"},{"key":"26_CR14","unstructured":"Adjust. \nhttps:\/\/www.adjust.com\/"},{"key":"26_CR15","unstructured":"FraudScore: FraudScore fights ad fraud using Machine Learning. \nhttps:\/\/fraudscore.mobi\/"},{"key":"26_CR16","unstructured":"AppMetrica. \nhttps:\/\/appmetrica.yandex.ru\/"},{"key":"26_CR17","unstructured":"Polhul, T., Yarovyi, A.: The input data heterogeneities resolution method during mobile applications installation fraud detection. Visnyk SNU named after V. Dal\u2019 \u2013 Severodonetsk: SNU named after V. Dal\u2019, \u2116\u00a07(248), pp. 60\u201369 (2018)"},{"key":"26_CR18","unstructured":"Polhul, T.: Development of an intelligent system for detecting mobile app install fraud. In: Proceedings of the IRES 156th International Conference, Bangkok, Thailand, 21\u201322 March, 2019, pp. 25\u201329"},{"key":"26_CR19","doi-asserted-by":"publisher","unstructured":"Polhul, T.D., Yarovyi, A.A.: Heterogeneous data analysis in intelligent fraud detection systems, \u2116 2, pp. 78\u201390. Visnyk of Vinnutsia Polytechnic Institute, April 2019. \nhttps:\/\/doi.org\/10.31649\/1997-9266-2019-143-2-78-90","DOI":"10.31649\/1997-9266-2019-143-2-78-90"},{"key":"26_CR20","doi-asserted-by":"publisher","unstructured":"Polhul, T., Yarovyi, A.: Development of a method for fraud detection in heterogeneous data during installation of mobile applications. East. Eur. J. Enterp. Technol. 1\/2(97) (2019). \nhttps:\/\/doi.org\/10.15587\/1729-4061.2019.155060","DOI":"10.15587\/1729-4061.2019.155060"},{"key":"26_CR21","unstructured":"Segaran, T.: Programming Collective Intelligence. Building Smart Web 2.0 Applications. O\u2019Reilly Media, Newton (2008). 368 p."},{"key":"26_CR22","unstructured":"Kiulian, A.H., Polhul, T.D., Khazin, M.B.: Matematychna model rekomendatsiynoho servisu na osnovi metodu kolaboratyvnoi filtratsiyi. In: Kompiuterni tekhnolohiyi ta Internet v informatsiynomu suspilstvi, pp. 226\u2013227 (2012). \nhttp:\/\/ir.lib.vntu.edu.ua\/bitstream\/handle\/123456789\/7911\/226-227.pdf?sequence=1&isAllowed=y"},{"key":"26_CR23","volume-title":"Introduction to Machine Learning with Python: A Guide for Data Scientists","author":"S Guido","year":"2016","unstructured":"Guido, S., M\u00fcller, A.: Introduction to Machine Learning with Python: A Guide for Data Scientists. O\u2019Reilly Media, Newton (2016). 400 p."},{"key":"26_CR24","doi-asserted-by":"publisher","unstructured":"Yarovyi, A., Ilchenko, R., Arseniuk, I., Shemet, Y., Kotyra, A., Smailova, S.: An intelligent system of neural networking recognition of multicolor spot images of laser beam profile. In: Proceedings of SPIE 10808, Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2018, vol. 108081, October 2018. \nhttps:\/\/doi.org\/10.1117\/12.2501691","DOI":"10.1117\/12.2501691"},{"key":"26_CR25","volume-title":"Hands-On Machine Learning with Scikit-Learn and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems","author":"A G\u00e9ron","year":"2017","unstructured":"G\u00e9ron, A.: Hands-On Machine Learning with Scikit-Learn and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems. Aur\u00e9lien G\u00e9ron, O\u2019Reilly Media, Newton (2017). 574 p."},{"key":"26_CR26","doi-asserted-by":"publisher","unstructured":"Dong, X., Qiu, P., L\u00fc, J., Cao, L., Xu, T.: Mining top-k useful negative sequential patterns via learning. IEEE Trans. Neural Netw. Learn. Syst. \nhttps:\/\/doi.org\/10.1109\/tnnls.2018.2886199","DOI":"10.1109\/tnnls.2018.2886199"},{"key":"26_CR27","doi-asserted-by":"publisher","unstructured":"Kozhemyako, V., Timchenko, L., Yarovyy, A.: Methodological principles of pyramidal and parallel-hierarchical image processing on the base of neural-like network systems. Adv. Electr. Comput. Eng. 8(2), 54\u201360 (2008). \nhttps:\/\/doi.org\/10.4316\/aece.2008.02010","DOI":"10.4316\/aece.2008.02010"},{"key":"26_CR28","doi-asserted-by":"publisher","unstructured":"Granik, M., Mesyura, V., Yarovyi, A.: Determining fake statements made by public figures by means of artificial intelligence. In: IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT), Lviv, pp. 424\u2013427 (2018). \nhttps:\/\/doi.org\/10.1109\/stc-csit.2018.8526631","DOI":"10.1109\/stc-csit.2018.8526631"},{"key":"26_CR29","doi-asserted-by":"publisher","unstructured":"Polhul, T.D.: Information technology for the construction of intelligent systems for detecting fraud during mobile applications installation. Information Technologies and Computing Engineering, vol. 44, \u2116 1, pp. 4\u201316, May 2019. \nhttps:\/\/doi.org\/10.31649\/1999-9941-2019-44-1-4-16","DOI":"10.31649\/1999-9941-2019-44-1-4-16"},{"key":"26_CR30","volume-title":"Introducing Data Science: Big Data, Machine Learning, and More, Using Python Tools","author":"D Cielen","year":"2016","unstructured":"Cielen, D., Meysman, A.D.B., Ali, M.: Introducing Data Science: Big Data, Machine Learning, and More, Using Python Tools. Manning, New york (2016). 320 p."},{"key":"26_CR31","unstructured":"Yarovyi, A.A., Polhul, T.D.: Kompiuterna prohrama \u201cProhramnyi modul zboru danykh informatsiynoi tekhnolohiyi\u201d vyiavlennia shakhraistva pry instaliuvanni prohramnykh dodatkiv. Cvidotstvo pro reiestratsiu avtorskoho prava na tvir No. 76348. Ministerstvo ekonomichnoho rozvytku i torhivli Ukrainy, Kyiv (2018)"},{"key":"26_CR32","unstructured":"Yarovyi, A.A., Polhul, T.D.: Kompiuterna prohrama \u201cProhramnyi modul vyznachennia skhozhosti korystuvachiv informatsiynoi tekhnolohiyi vyiavlennia shakhraistva pry instaliuvanni prohramnykh dodatkiv\u201d. Cvidotstvo pro reiestratsiu avtorskoho prava na tvir No. 76347. Ministerstvo ekonomichnoho rozvytku i torhivli Ukrainy, Kyiv (2018)"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Intelligent Systems and Computing IV"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-33695-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T10:10:41Z","timestamp":1600510241000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-33695-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,2]]},"ISBN":["9783030336943","9783030336950"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-33695-0_26","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,11,2]]},"assertion":[{"value":"2 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSIT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Computer Science and Information Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lviv","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ukraine","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csit2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}