{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T17:47:28Z","timestamp":1759772848765,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319934105"},{"type":"electronic","value":"9783319934112"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93411-2_10","type":"book-chapter","created":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T07:49:28Z","timestamp":1528357768000},"page":"211-233","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds"],"prefix":"10.1007","author":[{"given":"Michele","family":"Carminati","sequence":"first","affiliation":[]},{"given":"Alessandro","family":"Baggio","sequence":"additional","affiliation":[]},{"given":"Federico","family":"Maggi","sequence":"additional","affiliation":[]},{"given":"Umberto","family":"Spagnolini","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Zanero","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,8]]},"reference":[{"issue":"4","key":"10_CR1","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/s11280-012-0178-0","volume":"16","author":"W Wei","year":"2013","unstructured":"Wei, W., Li, J., Cao, L., Ou, Y., Chen, J.: Effective detection of sophisticated online banking fraud on extremely imbalanced data. World Wide Web 16(4), 449\u2013475 (2013)","journal-title":"World Wide Web"},{"key":"10_CR2","unstructured":"Emm, D., Unuchek, R., Kruglov, K.: Kaspersky security bulletin 2016. Technical report, Kaspersky Lab (2017)"},{"key":"10_CR3","volume-title":"Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management. Handbook of Information Security","author":"H Bidgoli","year":"2006","unstructured":"Bidgoli, H.: Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management. Handbook of Information Security. Wiley, Hoboken (2006)"},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-540-74048-3_4","volume-title":"Information Retrieval for Music and Motion","author":"M M\u00fcller","year":"2007","unstructured":"M\u00fcller, M.: Dynamic time warping. In: M\u00fcller, M. (ed.) Information Retrieval for Music and Motion, pp. 69\u201384. Springer, Heidelberg (2007). \n                      https:\/\/doi.org\/10.1007\/978-3-540-74048-3_4"},{"issue":"3","key":"10_CR5","doi-asserted-by":"publisher","first-page":"15:1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 15:1\u201315:58 (2009)","journal-title":"ACM Comput. Surv."},{"key":"10_CR6","unstructured":"KasperskyLab: Banking Trojans: mobile\u2019s major cyberthreat, September 2015"},{"issue":"1","key":"10_CR7","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1007730.1007738","volume":"6","author":"C Phua","year":"2004","unstructured":"Phua, C., Alahakoon, D., Lee, V.: Minority report in fraud detection: classification of skewed data. SIGKDD Explor. Newsl. 6(1), 50\u201359 (2004)","journal-title":"SIGKDD Explor. Newsl."},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1214\/ss\/1042727940","volume":"17","author":"RJ Bolton","year":"2002","unstructured":"Bolton, R.J., Hand, D.J.: Statistical fraud detection: a review. Stat. Sci. 17, 235\u2013249 (2002)","journal-title":"Stat. Sci."},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.cose.2015.04.002","volume":"53","author":"M Carminati","year":"2015","unstructured":"Carminati, M., Caron, R., Maggi, F., Epifani, I., Zanero, S.: BankSealer: a decision support system for online banking fraud analysis and investigation. Comput. Secur. 53, 175\u2013186 (2015)","journal-title":"Comput. Secur."},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Chen, L.M., Chen, M.C., Sun, Y.S., Liao, W.: Spectrum analysis for detecting slow-paced persistent activities in network security. In: ICC. IEEE (2013)","DOI":"10.1109\/ICC.2013.6654815"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Aiello, M., Cambiaso, E., Mongelli, M., Papaleo, G.: An on-line intrusion detection approach to identify low-rate DoS attacks. In: 2014 International Carnahan Conference on Security Technology (ICCST) (2014)","DOI":"10.1109\/CCST.2014.6987039"},{"key":"10_CR12","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"T Cover","year":"1991","unstructured":"Cover, T., Thomas, J.: Elements of Information Theory. Wiley, New York (1991)"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1007\/11430919_85","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"GJ Janacek","year":"2005","unstructured":"Janacek, G.J., Bagnall, A.J., Powell, M.: A likelihood ratio distance measure for the similarity between the fourier transform of time series. In: Ho, T.B., Cheung, D., Liu, H. (eds.) PAKDD 2005. LNCS (LNAI), vol. 3518, pp. 737\u2013743. Springer, Heidelberg (2005). \n                      https:\/\/doi.org\/10.1007\/11430919_85"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Seyedhossein, L., Hashemi, M.: Mining information from credit card time series for timelier fraud detection. In: 2010 5th International Symposium on Telecommunications (IST), pp. 619\u2013624 (2010)","DOI":"10.1109\/ISTEL.2010.5734099"},{"issue":"3","key":"10_CR15","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1016\/j.dss.2010.08.008","volume":"50","author":"S Bhattacharyya","year":"2011","unstructured":"Bhattacharyya, S., Jha, S., Tharakunnel, K., Westland, J.C.: Data mining for credit card fraud: a comparative study. Decis. Support Syst. 50(3), 602\u2013613 (2011)","journal-title":"Decis. Support Syst."},{"issue":"8","key":"10_CR16","doi-asserted-by":"publisher","first-page":"6070","DOI":"10.1016\/j.eswa.2010.02.119","volume":"37","author":"M Krivko","year":"2010","unstructured":"Krivko, M.: A hybrid model for plastic card fraud detection systems. Expert Syst. Appl. 37(8), 6070\u20136076 (2010)","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"10_CR17","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1109\/TDSC.2009.11","volume":"6","author":"A Kundu","year":"2009","unstructured":"Kundu, A., Panigrahi, S., Sural, S., Majumdar, A.K.: BLAST-SSAHA hybridization for credit card fraud detection. IEEE Trans. Dependable Secure Comput. 6(4), 309\u2013315 (2009)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/S0022-2836(05)80360-2","volume":"215","author":"S Altschul","year":"1990","unstructured":"Altschul, S., Gish, W., Miller, W., Myers, E., Lipman, D.: Basic local alignment search tool. J. Mol. Biol. 215, 403\u2013410 (1990)","journal-title":"J. Mol. Biol."},{"key":"10_CR19","unstructured":"van der Vaart, A.: TIME SERIES. Technical report, Vrije Universiteit Amsterdam, pp. 67\u201379 (2010)"},{"key":"10_CR20","volume-title":"Discrete-Time Signal Processing","author":"AV Oppenheim","year":"1999","unstructured":"Oppenheim, A.V., Schafer, R.W., Buck, J.R.: Discrete-Time Signal Processing. Prentice Hall, Upper Saddle River (1999)"},{"key":"10_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/biomet\/37.1-2.1","volume":"37","author":"M Bartlett","year":"1950","unstructured":"Bartlett, M.: Periodogram analysis and continuous spectra. Biometrika 37, 1\u201316 (1950)","journal-title":"Biometrika"},{"issue":"6","key":"10_CR22","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1016\/S0031-3203(01)00118-2","volume":"35","author":"SH Cha","year":"2002","unstructured":"Cha, S.H., Srihari, S.N.: On measuring the distance between histograms. Pattern Recogn. 35(6), 1355\u20131370 (2002)","journal-title":"Pattern Recogn."},{"key":"10_CR23","unstructured":"Tran, N.M., Osipenko, M., H\u00e4rdle, W.K.: Principal component analysis in an asymmetric norm. arXiv preprint \n                      arXiv:1401.3229\n                      \n                     (2014)"},{"issue":"3","key":"10_CR24","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1016\/j.patcog.2010.09.013","volume":"44","author":"F Petitjean","year":"2011","unstructured":"Petitjean, F., Ketterlin, A., Gan\u00e7arski, P.: A global averaging method for dynamic time warping, with applications to clustering. Pattern Recogn. 44(3), 678\u2013693 (2011)","journal-title":"Pattern Recogn."},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Wagner, D., Soto, P.: Mimicry attacks on host-based intrusion detection systems. In: CCS02 (2002)","DOI":"10.1145\/586110.586145"},{"issue":"12","key":"10_CR26","doi-asserted-by":"publisher","first-page":"3397","DOI":"10.1109\/78.258082","volume":"41","author":"S Mallat","year":"1993","unstructured":"Mallat, S., Zhang, Z.: Matching pursuits with time-frequency dictionaries. IEEE Trans. Sig. Process. 41(12), 3397\u20133415 (1993)","journal-title":"IEEE Trans. Sig. Process."}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93411-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T03:19:15Z","timestamp":1583205555000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-93411-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319934105","9783319934112"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93411-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"8 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DIMVA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saclay","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dimva2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dimva2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}