{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T01:28:36Z","timestamp":1755221316636,"version":"3.43.0"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032006370","type":"print"},{"value":"9783032006356","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-032-00635-6_12","type":"book-chapter","created":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T13:36:20Z","timestamp":1754660180000},"page":"205-220","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Countering Financial Cyber Crime: New Method for\u00a0Subsequent Steps Analysis in\u00a0Large Complex Graphs of\u00a0Financial Transactions"],"prefix":"10.1007","author":[{"given":"Rafa\u0142","family":"Kozik","sequence":"first","affiliation":[]},{"given":"Piotr","family":"Goca\u0142","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,9]]},"reference":[{"key":"12_CR1","unstructured":"Akoglu, L., Tong, H., Koutra, D.: Graph-based anomaly detection and description: a survey (2014). https:\/\/arxiv.org\/abs\/1404.4679"},{"key":"12_CR2","doi-asserted-by":"publisher","unstructured":"Bolton, R., Hand, D.: Statistical fraud detection: a review. Stat. Sci. 17 (2002). https:\/\/doi.org\/10.1214\/ss\/1042727940","DOI":"10.1214\/ss\/1042727940"},{"key":"12_CR3","doi-asserted-by":"publisher","unstructured":"Chakraborty, S., Sharov, S.: Chapter 3 - graph based approach on financial fraudulent detection and prediction. In: Raj, P., Dutta, P.K., Chong, P.H.J., Song, H.H., Zaitsev, D.A. (eds.) Applied Graph Data Science, pp. 25\u201337. Morgan Kaufmann (2025). https:\/\/doi.org\/10.1016\/B978-0-443-29654-3.00019-3, https:\/\/www.sciencedirect.com\/science\/article\/pii\/B9780443296543000193","DOI":"10.1016\/B978-0-443-29654-3.00019-3"},{"key":"12_CR4","doi-asserted-by":"publisher","unstructured":"Desai, A., Kosse, A., Sharples, J.: Finding a needle in a haystack: a machine learning framework for anomaly detection in payment systems. J. Finance Data Sci., 100163 (2025). https:\/\/doi.org\/10.1016\/j.jfds.2025.100163, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2405918825000157","DOI":"10.1016\/j.jfds.2025.100163"},{"key":"12_CR5","doi-asserted-by":"publisher","unstructured":"Eboli, M.: Financial Applications of Flow Network Theory, pp. 21\u201329 (2013). https:\/\/doi.org\/10.1007\/978-3-642-32903-6_3","DOI":"10.1007\/978-3-642-32903-6_3"},{"key":"12_CR6","unstructured":"Herreros-Mart\u00ednez, A., Magdalena-Benedicto, R., Vila-Franc\u00e9s, J., Serrano-L\u00f3pez, A.J., P\u00e9rez-D\u00edaz, S.: Applied machine learning to anomaly detection in enterprise purchase processes (2024). https:\/\/arxiv.org\/abs\/2405.14754"},{"key":"12_CR7","doi-asserted-by":"publisher","unstructured":"Jullum, M., L\u00f8land, A., Huseby, R., \u00c5nonsen, G., Lorentzen, J.: Detecting money laundering transactions with machine learning. J. Money Laundering Control ahead-of-print (2020). https:\/\/doi.org\/10.1108\/JMLC-07-2019-0055","DOI":"10.1108\/JMLC-07-2019-0055"},{"key":"12_CR8","doi-asserted-by":"publisher","unstructured":"Motie, S., Raahemi, B.: Financial fraud detection using graph neural networks: a systematic review. Expert Syst. Appl. 240, 122156 (2024). https:\/\/doi.org\/10.1016\/j.eswa.2023.122156, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0957417423026581","DOI":"10.1016\/j.eswa.2023.122156"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Ngai, E., Hu, Y., Wong, Y., Chen, Y., Sun, X.: The application of data mining techniques in financial fraud detection: a classification framework and an academic review of literature. Decis. Support Syst. 50(3), 559\u2013569 (2011). https:\/\/doi.org\/10.1016\/j.dss.2010.08.006, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167923610001302, on quantitative methods for detection of financial fraud","DOI":"10.1016\/j.dss.2010.08.006"},{"key":"12_CR10","doi-asserted-by":"publisher","unstructured":"\u015alusarek, N.: The fraudulent phenomenon of the financial pyramids in the financial industry. Finanse i Prawo Finansowe, 87\u2013107 (2022). https:\/\/doi.org\/10.18778\/2391-6478.S2.2022.06","DOI":"10.18778\/2391-6478.S2.2022.06"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-00635-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T13:36:21Z","timestamp":1754660181000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-00635-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783032006370","9783032006356"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-00635-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"9 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Availability, Reliability and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghent","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ares-12025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.ares-conference.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}