{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:39:55Z","timestamp":1725518395770},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540858928"},{"type":"electronic","value":"9783540858935"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-85893-5_9","type":"book-chapter","created":{"date-parts":[[2008,8,29]],"date-time":"2008-08-29T02:28:18Z","timestamp":1219976898000},"page":"118-132","source":"Crossref","is-referenced-by-count":3,"title":["Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence"],"prefix":"10.1007","author":[{"given":"Wael William Zakhari","family":"Malek","sequence":"first","affiliation":[]},{"given":"Keith","family":"Mayes","sequence":"additional","affiliation":[]},{"given":"Kostas","family":"Markantonakis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Harris, S.: CISSP, 3rd edn. Hardcover. Osborne (2005)","key":"9_CR1"},{"unstructured":"John, P., Jesan, D.M.L.: Human brain and neural network behavior: A comparison 1, 2\u20135 (2003) [accessed on 3\/04\/2007], http:\/\/www.acm.org","key":"9_CR2"},{"unstructured":"Dewri, R.: Evolutionary neural networks: Design methodologies 1, 1\u20135 (2003) [accessed on 9\/02\/2007], http:\/\/aidepot.com\/articles\/evolutionary-neural-networks-design-methodologies\/","key":"9_CR3"},{"key":"9_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-12312-4","volume-title":"Neural Networks","author":"E. Davalo","year":"1991","unstructured":"Davalo, E., Patrick Naim, A.R.: Neural Networks. MacMillan Education Limited, Basingstoke (1991)"},{"unstructured":"Nicholls, J.G., Martin, A.R., Wallace, B.G., Fuchs, P.A.: From Neuron To Brain, 4th edn. Sinauer Associates Inc. (2001)","key":"9_CR5"},{"unstructured":"Stergiou, C.: Neural networks, the human brain and learning 1, 1\u20133 (1996) [accessed on 14\/06\/2007], http:\/\/www-dse.doc.ic.ac.uk\/nd\/surprise96\/journal\/vol2\/cs11\/article2.html","key":"9_CR6"},{"key":"9_CR7","volume-title":"Foundations of Neural Networks","author":"T. Khanna","year":"1990","unstructured":"Khanna, T.: Foundations of Neural Networks. Addison-Wesley, Reading (1990)"},{"key":"9_CR8","volume-title":"Fundamentals of Neural Networks","author":"L. Fausett","year":"1994","unstructured":"Fausett, L.: Fundamentals of Neural Networks. Prentice-Hall, Englewood Cliffs (1994)"},{"key":"9_CR9","volume-title":"Neural Networks and Pattern Recognition","author":"J.D. Omid Omidvar","year":"1998","unstructured":"Omid Omidvar, J.D.: Neural Networks and Pattern Recognition. Academic Press, London (1998)"},{"unstructured":"Dimension, N.: Fraud detection using neural networks and sentinel solutions (smartsoft). \u00a01, 1\u20133 (2006) [accessed on 17\/06\/2007], http:\/\/www.nd.com\/resources\/smartsoft.html","key":"9_CR10"},{"unstructured":"Khan, A.: Feedforward Neural Networks with Constrained Weights. PhD thesis, Univ. of Warwick, Dept. of Engineering (1996)","key":"9_CR11"},{"unstructured":"VeriSign: Verisign identity protection fraud detection service an overview. Whitepaper, VeriSign (2006)","key":"9_CR12"},{"unstructured":"University, M.: Exponential function 1, 1\u20133 (2004) (12\/07\/2007), http:\/\/www.cs.mtu.edu\/shene\/COURSES\/cs201\/NOTES\/chap04\/exp.html","key":"9_CR13"},{"unstructured":"Vassilis, P., Plagianakos, M.N.V.: Parallel evolutionary training algorithms for hardware-friendly neural networks. Technical report, University of Patras, GR-26110 Patras, Greece (2002)","key":"9_CR14"},{"unstructured":"\u00a0Pavlidis, N.G., \u00a0Tasoulis, D.K., Plagianauos, V.P., Nikifuridis, G., Vrahatis, M.N.: Spiking neural network training using evolutionary algorithms. Technical report, 3Department of Pathology, University Hospital, GR26500 Patras, Greece (2001)","key":"9_CR15"},{"doi-asserted-by":"crossref","unstructured":"Vassilis, P., Plagianakos, M.N.V.: Training neural networks with threshold activation functions and constrained integer weights. Technical report, University of Patras, GR-26500, Greece (2001)","key":"9_CR16","DOI":"10.1109\/IJCNN.2000.861451"},{"unstructured":"Magoulas, G.D., Plagianakos, V.P., Vrahatis, M.N.: Hybrid methods using evolutionary algorithms for online training. Technical report, Department of Information Systems and Computing, Brunel University, Uxbridge UB8 3PH (2001)","key":"9_CR17"},{"unstructured":"Sutton, J.Z.P.: Fpga implementations of neural networks - a survey of a decade of progress. Technical report, University of Queensland, Brisbane, Queensland 4072, Australia (2004)","key":"9_CR18"},{"unstructured":"SharpNeat-Developers: An integer based neural network, sharpneat.sourceforge.net. 1, 1\u20135 (2004), http:\/\/www.sharpneat.sourceforge.net\/integernetwork.html","key":"9_CR19"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85893-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T13:38:34Z","timestamp":1557754714000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85893-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540858928","9783540858935"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85893-5_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}