{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T05:15:46Z","timestamp":1740287746633,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642145469"},{"type":"electronic","value":"9783642145476"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14547-6_23","type":"book-chapter","created":{"date-parts":[[2010,7,16]],"date-time":"2010-07-16T02:32:37Z","timestamp":1279247557000},"page":"290-303","source":"Crossref","is-referenced-by-count":2,"title":["Electronic Fraud Detection for Video-on-Demand System Using Hybrid Immunology-Inspired Algorithms"],"prefix":"10.1007","author":[{"given":"Rentian","family":"Huang","sequence":"first","affiliation":[]},{"given":"Hissam","family":"Tawfik","sequence":"additional","affiliation":[]},{"given":"Atulya","family":"Nagar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Rozsnyai, S., Schiefer, J., Schatten, A.: Solutionarchitecture for detecting and preventing fraud in real time. In: Proceeding of Digital Informatino Management, ICDIM 2007, pp. 152\u2013158 (2007)","key":"23_CR1","DOI":"10.1109\/ICDIM.2007.4444216"},{"doi-asserted-by":"crossref","unstructured":"Guo, T., Li, G.-Y.: Neural data mining for credit card fraud detection. In: Proceeding of International Conference on Machine Learning and Cybernetics, pp. 3630\u20133634 (2008)","key":"23_CR2","DOI":"10.1109\/ICMLC.2008.4621035"},{"doi-asserted-by":"crossref","unstructured":"Xu, J., Sung, A.H., Liu, Q.: Tree Based Behaviour Monitoring for Adaptive Fraud Detection. In: Proceeding of International Conference on Pattern Recognition, pp. 1208\u20131211 (2006)","key":"23_CR3","DOI":"10.1109\/ICPR.2006.1136"},{"doi-asserted-by":"crossref","unstructured":"Kirkos, E., Spathis, C., Manolopoulos, Y.: Data mining techniques for the detection of fraudulent financial statements. Expert Systems with Applications, 23\u201332 (2007)","key":"23_CR4","DOI":"10.1016\/j.eswa.2006.02.016"},{"unstructured":"CyberSource: Online Fraud Report, http:\/\/forms.cybersource.com\/forms\/FraudReport2009NACYBSwww020309","key":"23_CR5"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/3-540-36159-6_23","volume-title":"Information and Communications Security","author":"E. Lundin","year":"2002","unstructured":"Lundin, E., Kvarnstr\u00f6m, H., Jonsson, E.: A synthetic fraud data generation methodology. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol.\u00a02513, pp. 265\u2013277. Springer, Heidelberg (2002)"},{"doi-asserted-by":"crossref","unstructured":"Greensmith, J., Twycross, J., Aickelin, U.: Dendritic cells for anomaly detection. In: Proc. of the Congress on Evolutionary Computation (CEC), pp. 664\u2013671 (2006)","key":"23_CR7","DOI":"10.1109\/CEC.2006.1688374"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-540-85072-4_25","volume-title":"Artificial Immune Systems","author":"S. Yu","year":"2008","unstructured":"Yu, S., Dasgupta, D.: Conserved Self Pattern Recognition Algorithm. In: Bentley, P.J., Lee, D., Jung, S. (eds.) ICARIS 2008. LNCS, vol.\u00a05132, pp. 279\u2013290. Springer, Heidelberg (2008)"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1007\/978-3-540-69384-0_87","volume-title":"Computational Science \u2013 ICCS 2008","author":"R. Huang","year":"2008","unstructured":"Huang, R., Tawfik, H., Nagar, A.: Licence Plate Character Recognition Using Artificial Immune Technique. In: Bubak, M., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2008, Part I. LNCS, vol.\u00a05101, pp. 823\u2013832. Springer, Heidelberg (2008)"},{"issue":"4","key":"23_CR10","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1109\/TSMC.1985.6313426","volume":"15","author":"J.M. Keller","year":"1985","unstructured":"Keller, J.M., Gray, M.R., Givens Jr., J.A.: A Fuzzy K-Nearest Neighbor Algorithm. IEEE Transactions on Systems, Man, and Cybernetics\u00a015(4), 580\u2013585 (1985)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"key":"23_CR11","volume-title":"Basic Practice of Statistics","author":"D. Moore","year":"2006","unstructured":"Moore, D.: Basic Practice of Statistics. W.H. Freeman, San Francisco (2006)"},{"key":"23_CR12","volume-title":"Pattern Classification","author":"R.O. Duda","year":"2001","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. Wiley, Chichester (2001) ISBN 0-471 05669-3","edition":"2"}],"container-title":["Lecture Notes in Computer Science","Artificial Immune Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14547-6_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T23:24:08Z","timestamp":1740266648000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14547-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642145469","9783642145476"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14547-6_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}