{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T07:11:39Z","timestamp":1725606699957},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642239564"},{"type":"electronic","value":"9783642239571"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23957-1_12","type":"book-chapter","created":{"date-parts":[[2011,9,10]],"date-time":"2011-09-10T12:43:04Z","timestamp":1315658584000},"page":"101-110","source":"Crossref","is-referenced-by-count":6,"title":["Neural Network Rule Extraction to Detect Credit Card Fraud"],"prefix":"10.1007","author":[{"given":"Nick F.","family":"Ryman-Tubb","sequence":"first","affiliation":[]},{"given":"Paul","family":"Krause","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Transnational Financial Crime Program, The International Centre for Criminal Law Reform & Criminal Justice Policy, Vancouver, Canada: Drawing conclusions about financial fraud: crime, development, and international co-operative strategies in China and the West (2008)"},{"key":"12_CR2","unstructured":"IdentityTheft.com Inc., http:\/\/www.identitytheft.com\/index.php\/article\/stolen_credit_terroist_attacks"},{"key":"12_CR3","unstructured":"Unisys-Corporation: Research shows economic crisis increases Americans\u2019 fears about fraud and ID theft (2009)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Button, M., Johnston, L., Frimpong, K.: The fraud review and the policing of fraud: Laying the foundations for a centralized fraud police or counter fraud executive? Policing, 241\u2013250 (2008)","DOI":"10.1093\/police\/pan027"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Everett, C.: Credit card fraud funds terrorism. Computer Fraud & Security (5) (2003)","DOI":"10.1016\/S1361-3723(03)05001-2"},{"key":"12_CR6","unstructured":"BBC News, http:\/\/news.bbc.co.uk\/1\/hi\/business\/8473167.stm"},{"key":"12_CR7","unstructured":"Association of Certified Fraud Examiners: Report to the Nation on Occupational Fraud and Abuse (2008)"},{"key":"12_CR8","unstructured":"European Healthcare Fraud & Corruption Network: The Human Cost of Fraud (2010)"},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/CIFER.1997.618940","volume-title":"Computational Intelligence for Financial Engineering (CIFEr)","author":"E. Aleskerov","year":"1997","unstructured":"Aleskerov, E., Freisleben, B., Rao, B.: CARDWATCH: a neural network based database mining system for credit card fraud detection. In: Computational Intelligence for Financial Engineering (CIFEr), pp. 220\u2013226. IEEE Press, Los Alamitos (1997)"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"810","DOI":"10.1109\/ICNNB.2005.1614747","volume-title":"International Conference on Neural Networks and Brain","author":"C. Rong-Chang","year":"2005","unstructured":"Rong-Chang, C., Shu-Ting, L., Xun, L.: Personalized Approach Based on SVM and ANN for detecting credit card fraud. In: International Conference on Neural Networks and Brain, pp. 810\u2013815. IEEE Press, Los Alamitos (2005)"},{"key":"12_CR11","unstructured":"Crosman, P.: Card fraud costs U.S. payment providers $8.6 billion per year. Bank Systems & Technology (2010)"},{"key":"12_CR12","unstructured":"UK Payments Administration: Card fraud facts and figures (2009)"},{"key":"12_CR13","unstructured":"Cybersource: Seventh annual UK online fraud report: trends, key metrics, informed decisions (2011)"},{"key":"12_CR14","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/TAI.1999.809773","volume-title":"11th International Conference on Tools with Artificial Intelligence","author":"R. Brause","year":"1999","unstructured":"Brause, R., Langsdorf, T., Hepp, M.: Neural data mining for credit card fraud detection. In: 11th International Conference on Tools with Artificial Intelligence, p. 103. IEEE Press, Los Alamitos (1999)"},{"key":"12_CR15","first-page":"621","volume-title":"International Conference on System Sciences","author":"S. Ghosh","year":"1994","unstructured":"Ghosh, S., Reilly, D.L.: Credit card fraud detection with a neural network. In: International Conference on System Sciences, Hawaii, pp. 621\u2013630. IEEE Press, Los Alamitos (1994)"},{"key":"12_CR16","first-page":"81","volume":"1","author":"J.R. Quinlan","year":"1986","unstructured":"Quinlan, J.R.: Induction of decision trees. Machine Learning\u00a01, 81\u2013106 (1986)","journal-title":"Machine Learning"},{"issue":"1","key":"12_CR17","first-page":"71","volume":"13","author":"G.G. Towell","year":"1993","unstructured":"Towell, G.G., Shavlik, J.W.: Extracting refined rules from knowledge-based neural networks. Machine Learning\u00a013(1), 71\u2013101 (1993)","journal-title":"Machine Learning"},{"issue":"1","key":"12_CR18","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1162\/neco.1997.9.1.205","volume":"9","author":"R. Setiono","year":"1997","unstructured":"Setiono, R.: Extracting rules from neural networks by pruning and hidden-unit splitting. Neural Computation\u00a09(1), 205\u2013225 (1997)","journal-title":"Neural Computation"},{"key":"12_CR19","first-page":"37","volume-title":"International Conference on Machine Learning","author":"M. Craven","year":"1994","unstructured":"Craven, M., Shavlik, J.W.: Using sampling and queries to extract rules from trained neural networks. In: International Conference on Machine Learning, pp. 37\u201345. Morgan Kaufmann, San Francisco (1994)"},{"key":"12_CR20","volume-title":"Advances in Neural Information Processing Systems-Extracting rules from artificial neural networks with distributed representations","author":"S. Thrun","year":"1995","unstructured":"Thrun, S.: Advances in Neural Information Processing Systems-Extracting rules from artificial neural networks with distributed representations. MIT Press, Cambridge (1995)"},{"key":"12_CR21","first-page":"1","volume-title":"World Congress on Computational Intelligence","author":"N. Ryman-Tubb","year":"2010","unstructured":"Ryman-Tubb, N., d\u2019Avila Garcez, A.S.: SOAR - Sparse Oracle-based Adaptive Rule extraction: knowledge extraction from large-scale datasets to detect credit card fraud. In: World Congress on Computational Intelligence, Barcelona, Spain, pp. 1\u20139. IEEE Press, Los Alamitos (2010)"},{"key":"12_CR22","volume-title":"12th International Conference on Computer Theory and Applications","author":"N. Barakat","year":"2004","unstructured":"Barakat, N., Diederich, J.: Learning-based rule-extraction from support vector machines. In: 12th International Conference on Computer Theory and Applications, IEEE Press, Los Alamitos (2004)"},{"issue":"1","key":"12_CR23","first-page":"59","volume":"2","author":"N. Barakat","year":"2005","unstructured":"Barakat, N., Diederich, J.: Eclectic rule-extraction from support vector machines. International Journal Computational Intelligence\u00a02(1), 59\u201362 (2005)","journal-title":"International Journal Computational Intelligence"},{"key":"12_CR24","volume-title":"Engineering applications of bio-inspired artificial neural networks-Rule improvement through decision boundary detection using sensitivity analysis","author":"A.P. Engelbrecht","year":"1999","unstructured":"Engelbrecht, A.P., Viktor, H.L.: Engineering applications of bio-inspired artificial neural networks-Rule improvement through decision boundary detection using sensitivity analysis. Springer, Heidelberg (1999)"},{"key":"12_CR25","doi-asserted-by":"publisher","first-page":"4919","DOI":"10.1364\/AO.26.004919","volume":"26","author":"G.A. Carpenter","year":"1987","unstructured":"Carpenter, G.A., Grossberg, S.: ART2: Self-organization of stable category recognition codes for analog input patterns. Applied Optics\u00a026, 4919\u20134930 (1987)","journal-title":"Applied Optics"},{"key":"12_CR26","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1613\/jair.953","volume":"16","author":"N.V. Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: Synthetic Minority Over-sampling TEchnique. Journal of Artificial Intelligence Research\u00a016, 341\u2013378 (2002)","journal-title":"Journal of Artificial Intelligence Research"},{"key":"12_CR27","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1093\/comjnl\/6.2.163","volume":"6","author":"R. Fletcher","year":"1963","unstructured":"Fletcher, R., Powell, M.J.D.: A rapidly convergent descent method for minimization. Computing Journal\u00a06, 163\u2013168 (1963)","journal-title":"Computing Journal"},{"key":"12_CR28","first-page":"625","volume-title":"International Joint Conference on Neural Networks","author":"Y. Hirose","year":"1989","unstructured":"Hirose, Y., Yamashita, K., Hijiya, S.: Backpropagation algorithm which varies the number of hidden units. In: International Joint Conference on Neural Networks, p. 625. Elsevier, Amsterdam (1989)"}],"container-title":["IFIP Advances in Information and Communication Technology","Engineering Applications of Neural Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23957-1_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T12:01:19Z","timestamp":1620043279000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23957-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642239564","9783642239571"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23957-1_12","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}