{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:14:34Z","timestamp":1761621274937,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319252247"},{"type":"electronic","value":"9783319252261"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-25226-1_45","type":"book-chapter","created":{"date-parts":[[2016,8,3]],"date-time":"2016-08-03T13:33:15Z","timestamp":1470231195000},"page":"531-543","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Signature Based Method for Fraud Detection on\u00a0E-Commerce Scenarios"],"prefix":"10.1007","author":[{"given":"Orlando","family":"Belo","sequence":"first","affiliation":[]},{"given":"Gabriel","family":"Mota","sequence":"additional","affiliation":[]},{"given":"Joana","family":"Fernandes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,4]]},"reference":[{"issue":"3","key":"45_CR1","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1016\/j.dss.2010.08.008","volume":"50","author":"S. Bhattacharyya","year":"2011","unstructured":"Bhattacharyya, S., Jha, S., Tharakunnel, K., & Westland, J. C. (2011). Data mining for credit card fraud: a comparative study. Journal Decision Support Systems Archive, 50(3), 602\u2013613.","journal-title":"Journal Decision Support Systems Archive"},{"key":"45_CR2","doi-asserted-by":"crossref","unstructured":"Cortes, C., & Pregibon, D. (2001). Signature-based methods for data streams. Data Mining and Knowledge Discovery, (5), 167\u2013182.","DOI":"10.1023\/A:1011464915332"},{"issue":"3","key":"45_CR3","doi-asserted-by":"crossref","first-page":"211","DOI":"10.3233\/IDA-2002-6302","volume":"6","author":"C. Cortes","year":"2002","unstructured":"Cortes, C., Pregibon, D., & Volinsky, C. (2002). Communities of interest. Intelligence Data Analysis, 6(3), 211\u2013219.","journal-title":"Intelligence Data Analysis"},{"issue":"2","key":"45_CR4","first-page":"57","volume":"4","author":"L. Delamaire","year":"2009","unstructured":"Delamaire, L., Abdou, H., & Pointon, J. (2009). Credit card fraud and detection techniques: a review. Banks and Bank Systems, 4(2), 57\u201368.","journal-title":"Banks and Bank Systems"},{"key":"45_CR5","doi-asserted-by":"crossref","unstructured":"Ferreira, P., Alves, R., Belo, O., & Cortesao, L. (2006). Establishing fraud detection patterns based on signatures. In Proceedings of 6th Industrial Conference on Data Mining (ICDM 2006), Leipzig, July 14\u201315.","DOI":"10.1007\/11790853_41"},{"key":"45_CR6","doi-asserted-by":"crossref","unstructured":"Flegel, U., Vayssiere, J., & Bitz, G. (2010). A state of the art survey of fraud detection technology. In Insider threats in cyber security. Advances in Information Security (Vol.\u00a049, pp.\u00a073\u201384). New York: Springer.","DOI":"10.1007\/978-1-4419-7133-3_4"},{"key":"45_CR7","unstructured":"Kou, Y., Lu, C., Sirwongwattana, S., & Huang, Y. (2004). Survey of fraud detection techniques. In International Conference on Networking, Sensing, and Control (pp.\u00a0749\u2013754)."},{"issue":"1","key":"45_CR8","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1023\/A:1009843912662","volume":"5","author":"J. Lee","year":"2001","unstructured":"Lee, J., Podlaseck, M., Schonberg, E., & Hoch, R. (2001). Visualization  and analysis of clickstream data of online stores for understanding web merchandising. Data Mining and Knowledge Discovery, 5(1), 59\u201384.","journal-title":"Data Mining and Knowledge Discovery"},{"key":"45_CR9","doi-asserted-by":"crossref","unstructured":"Lopes, J., Belo, O., & Vieira, C. (2011). Applying user signatures on fraud detection in telecommunications networks. In 11th Industrial Conference on Data Mining (ICDM 2011), August 30\u2013September 3, Newark.","DOI":"10.1007\/978-3-642-23184-1_22"},{"key":"45_CR10","unstructured":"Phua, C., Lee, V., Smith K., & Gayler R. (2005). A comprehensive survey of data mining based fraud detection research. Artificial Intelligence Review."},{"issue":"22","key":"45_CR11","first-page":"14","volume":"45","author":"P. Richhariya","year":"2012","unstructured":"Richhariya, P., & Singh, P. (2012). A survey on financial fraud detection methodologies. International Journal of Computer Applications (0975 - 8887), 45(22), 14\u201324.","journal-title":"International Journal of Computer Applications (0975 - 8887)"},{"issue":"2","key":"45_CR12","doi-asserted-by":"publisher","first-page":"3630","DOI":"10.1016\/j.eswa.2008.02.001","volume":"36","author":"D. Sanchez","year":"2009","unstructured":"Sanchez, D., Vila, M. A., Cerda, L., & Serrano, J. M. (2009). Association rules applied to credit card fraud detection. Expert Systems with Applications: An International Journal, 36(2), 3630\u20133640.","journal-title":"Expert Systems with Applications: An International Journal"},{"key":"45_CR13","doi-asserted-by":"crossref","unstructured":"Vozalis, G., & Margaritis, K. (2005). Applying SVD on item-based filtering. In ISDA \u201905 Proceedings of the 5th International Conference on Intelligent Systems Design and Applications (pp.\u00a0464\u2013469).","DOI":"10.1109\/ISDA.2005.25"}],"container-title":["Studies in Classification, Data Analysis, and Knowledge Organization","Analysis of Large and Complex Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25226-1_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,3]],"date-time":"2022-09-03T00:32:50Z","timestamp":1662165170000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-25226-1_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319252247","9783319252261"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25226-1_45","relation":{},"ISSN":["1431-8814","2198-3321"],"issn-type":[{"type":"print","value":"1431-8814"},{"type":"electronic","value":"2198-3321"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"4 August 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}