{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:41:02Z","timestamp":1742913662430,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031665936"},{"type":"electronic","value":"9783031665943"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-66594-3_2","type":"book-chapter","created":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T01:01:48Z","timestamp":1723597308000},"page":"18-27","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fraud Detection Through Nature-Inspired Algorithms"],"prefix":"10.1007","author":[{"given":"Meenal","family":"Dugar","sequence":"first","affiliation":[]},{"given":"Aishwarya","family":"Asesh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,15]]},"reference":[{"key":"2_CR1","first-page":"473","volume":"8","author":"H Banati","year":"2011","unstructured":"Banati, H., Bajaj, M.: Fire fly based feature selection approach. Int. J. Comput. Sci. Issues 8, 473\u2013479 (2011)","journal-title":"Int. J. Comput. Sci. Issues"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Emary, E., Yamany, W., Hassanien, A.E.: New approach for feature selection based on rough set and bat algorithm. In: 9th International Conference on Computer Engineering Systems (ICCES), pp. 346\u2013353 (2014)","DOI":"10.1109\/ICCES.2014.7030984"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.swevo.2013.06.001","volume":"13","author":"I Fister","year":"2013","unstructured":"Fister, I., Fister, I., Jr., Yang, X.S., Brest, J.: A comprehensive review of firefly algorithms. Swarm Evol. Comput. 13, 34\u201346 (2013)","journal-title":"Swarm Evol. Comput."},{"key":"2_CR4","doi-asserted-by":"publisher","unstructured":"Mirjalili, S., Mirjalili, S.M., Lewis, A.: Grey wolf optimizer. Adv. Eng. Softw. 69, 46\u201361 (2014). https:\/\/doi.org\/10.1016\/j.advengsoft.2013.12.007, https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0965997813001853","DOI":"10.1016\/j.advengsoft.2013.12.007"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Kauser, A.P., Senthil Kumar, N.: A Comprehensive Review of Nature-Inspired Algorithms for Feature Selection, chap.\u00a016, pp. 331\u2013345. IGI Global, Hershey (2018)","DOI":"10.4018\/978-1-5225-2857-9.ch016"},{"key":"2_CR6","doi-asserted-by":"publisher","unstructured":"Sadgali, I., Sael, N., Benabbou, F.: Fraud detection in credit card transaction using neural networks. In: Proceedings of the 4th International Conference on Smart City Applications. SCA 2019. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3368756.3369082","DOI":"10.1145\/3368756.3369082"},{"key":"2_CR7","unstructured":"Slimani, T.: Application of rough set theory in data mining. Int. J. Comp. Sci. Netw. Sol. 1 (2013)"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Wang, L., Wang, Y., Chang, Q.: Feature selection methods for big data bioinformatics: a survey from the search perspective. Methods (San Diego, California) 111, 21 \u2013 31 (2016)","DOI":"10.1016\/j.ymeth.2016.08.014"},{"issue":"4","key":"2_CR9","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1016\/j.patrec.2006.09.003","volume":"28","author":"X Wang","year":"2007","unstructured":"Wang, X., Yang, J., Teng, X., Xia, W., Jensen, R.: Feature selection based on rough sets and particle swarm optimization. Pattern Recogn. Lett. 28(4), 459\u2013471 (2007)","journal-title":"Pattern Recogn. Lett."},{"key":"2_CR10","doi-asserted-by":"publisher","unstructured":"Wiese, B., Omlin, C.: Credit Card Transactions, Fraud Detection, and Machine Learning: Modelling Time with LSTM Recurrent Neural Networks. In: Bianchini, M., Maggini, M., Scarselli, F., Jain, L.C. (eds.)Innovations in Neural Information Paradigms and Applications. Studies in Computational Intelligence, vol. 247, pp. 231\u2013268. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04003-0_10","DOI":"10.1007\/978-3-642-04003-0_10"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Xuan, S., Liu, G., Li, Z., Zheng, L., Wang, S., Jiang, C.: Random forest for credit card fraud detection. In: 2018 IEEE 15th International Conference on Networking, Sensing and Control (ICNSC), pp.\u00a01\u20136 (2018)","DOI":"10.1109\/ICNSC.2018.8361343"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Yang, X.S.: A new metaheuristic bat-inspired algorithm. In: Gonz\u00e1lez, J.R., Pelta, D.A., Cruz, C., Terrazas, G., Krasnogor, N. (eds.) Nature Inspired Cooperative Strategies for Optimization (NICSO 2010), pp. 65\u201374. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-12538-6_6"},{"key":"2_CR13","doi-asserted-by":"publisher","unstructured":"Yang, X.S.: Flower pollination algorithm for global optimization. In: Durand-Lose, J., Jonoska, N. (eds.) International Conference on Unconventional Computing and Natural Computation, pp. 240\u2013249. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32894-7_27","DOI":"10.1007\/978-3-642-32894-7_27"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Yang, X.S., Deb, S.: Cuckoo search via l\u00e9vy flights. In: 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC), pp. 210\u2013214. IEEE (2009)","DOI":"10.1109\/NABIC.2009.5393690"},{"key":"2_CR15","unstructured":"Yang, X., He, X.: Studies in Computational Intelligence. Springer (2019)"}],"container-title":["Lecture Notes in Networks and Systems","Digital Interaction and Machine Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-66594-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T01:02:04Z","timestamp":1723597324000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-66594-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031665936","9783031665943"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-66594-3_2","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"15 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MIDI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Machine Intelligence and Digital Interaction Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"midi12023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/midi2023.opi.org.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}