{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:17:49Z","timestamp":1725578269737},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642193750"},{"type":"electronic","value":"9783642193767"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19376-7_18","type":"book-chapter","created":{"date-parts":[[2011,2,17]],"date-time":"2011-02-17T01:46:54Z","timestamp":1297907214000},"page":"200-211","source":"Crossref","is-referenced-by-count":5,"title":["3LSPG: Forensic Tool Evaluation by Three Layer Stochastic Process-Based Generation of Data"],"prefix":"10.1007","author":[{"given":"York","family":"Yannikos","sequence":"first","affiliation":[]},{"given":"Frederik","family":"Franke","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Winter","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Behrends, E.: Introduction to Markov Chains. Vieweg Verlag (2000)","DOI":"10.1007\/978-3-322-90157-6"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Bolton, R., Hand, D.: Statistical Fraud Detection: A Review. Statistical Science\u00a017(3) (2002)","DOI":"10.1214\/ss\/1042727940"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Dacier, M., Deswarte, Y., Kaaniche, M.: Models and tools for quantitative assessment of operational security. In: IFIP SEC 1996 (1996)","DOI":"10.1007\/978-1-5041-2919-0_15"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Dacier, M., Deswarte, Y., Kaaniche, M.: Quantitative Assessment of Operational Security: Models and Tools. LAAS Research Report 96493 (May 1996)","DOI":"10.1007\/978-1-5041-2919-0_15"},{"key":"18_CR5","unstructured":"Deloitte: Ten things about financial statement fraud \u2014 A review of SEC enforcement releases, 2000-2006 (June 2007), \n                    \n                      www.deloitte.com\/us\/forensiccenter"},{"key":"18_CR6","unstructured":"Germany\u2019s Federal Criminal Police Office (BKA): Wirtschaftskriminalit\u00e4t \u2014 Bundeslagebild (2008), \n                    \n                      http:\/\/www.bka.de\/lageberichte\/wi.html"},{"key":"18_CR7","unstructured":"Jans, M., Lybaert, N., Vanhoff, K.: Data Mining for Fraud Detection: Toward an Improvement on Internal Control Systems? In: 30rd European Accounting Association, Ann. Congr., Lisbon (2007)"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Jeske, D., Samadi, B., Lin, P., Ye, L., Cox, S., Xiao, R., Younglove, T., Ly, M., Holt, D., Rich, R.: Generation of synthetic data sets for evaluating the accuracy of knowledge discovery systems. In: ACM KDD 2005 (2005)","DOI":"10.1145\/1081870.1081969"},{"key":"18_CR9","unstructured":"Kou, Y., Lu, C., Sirwongwattana, S., Huang, Y.: Survey of fraud detection techniques. In: IEEE Int. Conf. on Networking, Sensing & Control (2004)"},{"key":"18_CR10","unstructured":"KPMG: Anti Fraud Management \u2014 Best Practice der Pr\u00e4vention gegen Wirtschaftskriminalit\u00e4t. White Paper (2006)"},{"key":"18_CR11","unstructured":"KPMG: Profile of a Fraudster. White Paper (2007)"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Lin, P., Samadi, B., Cipolone, A., Jeske, D., Cox, S., Rendon, C., Holt, D., Xiao, R.: Development of a synthetic data set generator for building and testing information discovery systems. In: 3rd Int. Conf. on Inf. Techn.: New Generations (2006)","DOI":"10.1109\/ITNG.2006.51"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/3-540-36159-6_23","volume-title":"Information and Communications Security","author":"E. Lundin","year":"2002","unstructured":"Lundin, E., Kvarnstr\u00f6m, H., Jonsson, E.: A synthetic fraud data generation methodology. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol.\u00a02513, pp. 265\u2013277. Springer, Heidelberg (2002)"},{"key":"18_CR14","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Computer Systems Architecture","author":"E. Lundin Barse","year":"2003","unstructured":"Lundin Barse, E., Kvarnstr\u00f6m, H., Jonsson, E.: Synthesizing test data for fraud detection systems. In: Omondi, A.R., Sedukhin, S.G. (eds.) ACSAC 2003. LNCS, vol.\u00a02823, Springer, Heidelberg (2003)"},{"key":"18_CR15","unstructured":"Nestler, C., Salvenmoser, S., Bussmann, K., Werle, M., Krieg, O.: Wirtschaftskriminalit\u00e4t 2007 \u2014 Sicherheitslage der deutschen Wirtschaft (2007), \n                    \n                      http:\/\/www.pwc.de\/de\/crimesurvey"},{"key":"18_CR16","unstructured":"Phua, C., Lee, V., Smith, K., Gayler, R.: A comprehensive survey of data mining-based fraud detection research. Working Paper (2005) (unpublished)"},{"key":"18_CR17","unstructured":"PriceWaterhouseCoopers: Key elements of antifraud programs and controls. White Paper (2003)"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Richard, G., Roussev, V.: Next-Generation Digital Forensics. Communications of the ACM\u00a049(2) (2006)","DOI":"10.1145\/1113034.1113074"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Shamshad, A., Wan Hussin, W., Bawadi, M., Sanusi, S.: First and second order markov chain models for synthetic generation of wind speed time series. Energy 30(5) (2005)","DOI":"10.1016\/j.energy.2004.05.026"},{"key":"18_CR20","volume-title":"Corporate Fraud Handbook","author":"J. Wells","year":"2007","unstructured":"Wells, J.: Corporate Fraud Handbook, 2nd edn. Wiley, Chichester (2007)","edition":"2"}],"container-title":["Lecture Notes in Computer Science","Computational Forensics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19376-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T04:03:35Z","timestamp":1558411415000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19376-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642193750","9783642193767"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19376-7_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}