{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:39:44Z","timestamp":1775068784725,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642040023","type":"print"},{"value":"9783642040030","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04003-0_10","type":"book-chapter","created":{"date-parts":[[2009,10,8]],"date-time":"2009-10-08T03:21:04Z","timestamp":1254972064000},"page":"231-268","source":"Crossref","is-referenced-by-count":41,"title":["Credit Card Transactions, Fraud Detection, and Machine Learning: Modelling Time with LSTM Recurrent Neural Networks"],"prefix":"10.1007","author":[{"given":"B\u00e9nard","family":"Wiese","sequence":"first","affiliation":[]},{"given":"Christian","family":"Omlin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Acton, F.S.: Analysis of straight-line data. Dover Publications (1959) (1994)"},{"key":"10_CR2","first-page":"235","volume":"173","author":"R.J. Bolton","year":"2002","unstructured":"Bolton, R.J., Hand, D.J.: Statistical Fraud Detection: A Review. Statistical Science\u00a0173, 235\u2013255 (2002)","journal-title":"Statistical Science"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Boser, B.E., Guyon, I.M., Vapnik, V.N.: A training algorithm for optimal margin classifiers. In: Haussler, D. (ed.) Proceedings of the 5th Annual ACM Workshop on Computational Learning Theory, pp. 144\u2013152 (1992)","DOI":"10.1145\/130385.130401"},{"key":"10_CR4","unstructured":"Brause, R., Langsdorf, T., Hepp, M.: Credit Card Fraud Detection by Adaptive Neural Data Mining (1999), \n                  \n                    http:\/\/Citeseer.ist.edu\/brause99credit.html"},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","author":"C.J.C. Burges","year":"1998","unstructured":"Burges, C.J.C.: A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery\u00a02, 121\u2013167 (1998)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"10_CR6","unstructured":"Card Fraud: The Facts, The definitive guide on plastic card fraud and measures to prevent it. APACS (2005), \n                  \n                    http:\/\/www.apacs.org.uk"},{"key":"10_CR7","unstructured":"Caruana, R.: The PERF Performance Evaluation Code (2004), \n                  \n                    http:\/\/kodiak.cs.cornell.edu\/kddcup\/software.html"},{"key":"10_CR8","unstructured":"Chang, C., Lin, C.: LIBSVM: a library for support vector machines (2001), \n                  \n                    http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm"},{"key":"10_CR9","first-page":"273","volume":"203","author":"C. Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-Vector networks. Machine Learning\u00a0203, 273\u2013297 (1995)","journal-title":"Machine Learning"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0364-0213(90)90002-E","volume":"142","author":"J.L. Elman","year":"1990","unstructured":"Elman, J.L.: Finding structure in time. Cognitive Science Journal\u00a0142, 179\u2013211 (1990)","journal-title":"Cognitive Science Journal"},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"2451","DOI":"10.1162\/089976600300015015","volume":"12","author":"F.A. Gers","year":"2000","unstructured":"Gers, F.A., Schmidhuber, J., Cummins, F.: Learning to Forget: Continual Prediction with LSTM. Neural Computation\u00a012, 2451\u20132471 (2000)","journal-title":"Neural Computation"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1162\/153244303768966139","volume":"3","author":"F.A. Gers","year":"2002","unstructured":"Gers, F.A., Schraudolph, N.N., Schmidhuber, J.: Learning Precise Timing with LSTM Recurrent Networks. Journal of Machine Learning Research\u00a03, 115\u2013143 (2002)","journal-title":"Journal of Machine Learning Research"},{"key":"10_CR13","unstructured":"Harvey Jr., L.O.: Detection Sensitivity and Response Bias. Psychology of Perception. Psychology 4165, Department of Psychology, University of Colorado (2003)"},{"issue":"8","key":"10_CR14","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S. Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long Short-Term Memory. Neural Computation\u00a09(8), 1735\u20131780 (1997)","journal-title":"Neural Computation"},{"key":"10_CR15","unstructured":"Hsu, C., Chang, C., Lin, C.: A Practical Guide to Support Vector Classification. Technical Report, Department of Computer Science and Information Engineering, National Taiwan University (2003)"},{"key":"10_CR16","unstructured":"Jordan, M.I.: Attractor dynamics and parallelism in a connectionist sequential machine. In: Proceedings of the Eighth Annual Conference of the Cognitive Science Society, pp. 531\u2013546 (1986)"},{"key":"10_CR17","doi-asserted-by":"publisher","first-page":"1667","DOI":"10.1162\/089976603321891855","volume":"15","author":"S.S. Keerthi","year":"2003","unstructured":"Keerthi, S.S., Lin, C.: Asymptotic Behaviors of Support Vector Machines with Gaussian Kernel. Neural Computation\u00a015, 1667\u20131689 (2003)","journal-title":"Neural Computation"},{"key":"10_CR18","first-page":"93","volume":"282","author":"S. Kroon","year":"2003","unstructured":"Kroon, S., Omlin, C.W.: Getting to grips with Support Vector Machines: Application. South African Statistical Journal\u00a0282, 93\u2013114 (2003)","journal-title":"South African Statistical Journal"},{"key":"10_CR19","first-page":"159","volume":"282","author":"S. Kroon","year":"2004","unstructured":"Kroon, S., Omlin, C.W.: Getting to grips with Support Vector Machines: Theory. South African Statistical Journal\u00a0282, 159\u2013172 (2004)","journal-title":"South African Statistical Journal"},{"key":"10_CR20","unstructured":"Lee, Y., Lin, Y., Wahba, G.: Multicategory Support Vector Machines. Technical Report TR1040, Department of Statistics, University of Wisconsin (2001)"},{"key":"10_CR21","unstructured":"Maes, S., Tuyls, K., Vanschoenwinkel, B., Manderick, B.: Credit Card Fraud Detection Using Bayesian and Neural Networks. In: Proceedings of the 1st International NAISO Congress on Neuro Fuzzy Technologies, Havana, Cuba (2002)"},{"key":"10_CR22","volume-title":"Practical neural network recipes in C++","author":"T. Masters","year":"1993","unstructured":"Masters, T.: Practical neural network recipes in C++. Academic Press, London (1993)"},{"key":"10_CR23","unstructured":"Mena, J.: Investigative data mining for security and criminal detection. Butterworth-Heinemann (2003)"},{"key":"10_CR24","unstructured":"Mitchell, T.M.: Machine learning. MIT Press and The McGraw-Hill Companies, Inc. (1997)"},{"key":"10_CR25","volume-title":"Numerical recipes in C","author":"W.H. Press","year":"1992","unstructured":"Press, W.H., Teukolsky, S.A., Vetterling, W.T., Flannery, B.P.: Numerical recipes in C. Cambridge University Press, Cambridge (1992)"},{"key":"10_CR26","unstructured":"Robinson, A.J., Fallside, F.: Static and dynamic error propagation networks with application to speech coding. In: Anderson, D.Z. (ed.) Neural Information Processing System, American Institute of Physics (1998)"},{"key":"10_CR27","unstructured":"Williams, R.J., Zipser, D.: Gradient-based learning algorithms for recurrent networks and their computational complexity. Back-propagation: Theory, Architectures and Applications (1995)"}],"container-title":["Studies in Computational Intelligence","Innovations in Neural Information Paradigms and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04003-0_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T10:53:39Z","timestamp":1619780019000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04003-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642040023","9783642040030"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04003-0_10","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"value":"1860-949X","type":"print"},{"value":"1860-9503","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}