{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T22:04:47Z","timestamp":1769724287486,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642397356","type":"print"},{"value":"9783642397363","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39736-3_17","type":"book-chapter","created":{"date-parts":[[2013,7,11]],"date-time":"2013-07-11T04:44:59Z","timestamp":1373517899000},"page":"218-228","source":"Crossref","is-referenced-by-count":33,"title":["Data Mining Application for Cyber Credit-Card Fraud Detection System"],"prefix":"10.1007","author":[{"given":"John","family":"Akhilomen","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"17_CR1","first-page":"137","volume":"2","author":"A.M. Al-Khatib","year":"2012","unstructured":"Al-Khatib, A.M.: Electronic payment fraud detection techniques. World of Computer Science and Information Technology Journal\u00a02(4), 137\u2013141 (2012)","journal-title":"World of Computer Science and Information Technology Journal"},{"issue":"3","key":"17_CR2","first-page":"311","volume":"6","author":"F.N. Ogwueleka","year":"2011","unstructured":"Ogwueleka, F.N.: Data mining application in credit-card Fraud detection system. Journal of Engineering Science and Technology\u00a06(3), 311\u2013322 (2011)","journal-title":"Journal of Engineering Science and Technology"},{"issue":"6","key":"17_CR3","first-page":"37","volume":"5","author":"S. Yashpal","year":"2005","unstructured":"Yashpal, S., Chauhan, S.: Neural networks in data mining. Journal of Theoretical and Applied Information Technology\u00a05(6), 37\u201342 (2005-2009)","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"17_CR4","unstructured":"Khyati, C., Bhawna, M.: Exploration of data mining techniques in fraud detection: credit-card. International Journal of Electronics and Computer Science Engineering\u00a0I(3), 1765\u20131771"},{"issue":"3","key":"17_CR5","first-page":"126","volume":"2","author":"V. Dhecpa","year":"2009","unstructured":"Dhecpa, V., Dhanapal, R.: Analysis of credit-card fraud detection methods. International Journal of Recent Trends in Engineering\u00a02(3), 126\u2013128 (2009)","journal-title":"International Journal of Recent Trends in Engineering"},{"issue":"I","key":"17_CR6","first-page":"39","volume":"45","author":"C. Khyati","year":"2012","unstructured":"Khyati, C., Jyoti, Y., Bhawna, M.: A review of fraud detection techniques: credit-card. International Journal of Computer Applications\u00a045(I), 39\u201344 (2012)","journal-title":"International Journal of Computer Applications"},{"key":"17_CR7","unstructured":"Sam, M., Karl, T., Bram, V.: Credit-card Fraud Detection Using Bayesian and Neural Networks, \n                  \n                    http:\/\/www.personeel.unimaas.nl\/k-tuylslpublicationslpaperslmaenf02.pdf\n                  \n                  \n                 (accessed December 12, 2012)"},{"key":"17_CR8","unstructured":"Hacker (computer security) : Wikipedia, the free encyclopedia, \n                  \n                    http:\/\/en.wikipedia.org\/wiki\/Hacker_computer_security\n                  \n                  \n                 (accessed December 12, 2012)"},{"key":"17_CR9","unstructured":"Cybercrime: protecting against the growing threat Global Economic Crime Survey \u2013 PWC Global Economic, \n                  \n                    http:\/\/www.pwc.com\/en_GX\/gx\/economic-crime-survey\/assets\/GECS_GLOBAL_REPORT.pdf\n                  \n                  \n                 (accessed December 12, 2012)"},{"key":"17_CR10","unstructured":"Anomaly Detection: Wikipedia, the free encyclopedia, \n                  \n                    http:\/\/en.wikipedia.org\/wiki\/Anomaly_detection\n                  \n                  \n                 (accessed December 12, 2012)"},{"key":"17_CR11","unstructured":"Data Analysis Techniques for Fraud Detection, \n                  \n                    http:\/\/en.wikipedia.org\/wiki\/Data_Analysis_Techniques_for_Fraud_Detection\n                  \n                  \n                 (accessed December 12, 2012)"},{"key":"17_CR12","unstructured":"Preventing Credit Card Abuse: Anti-Fraud Strategies, \n                  \n                    http:\/\/www.lawzilla.com\/content\/fed-bus-12301.shtml?&lang=en_us&output=json&session-id=3cd3dad0fc218a1ad59460ff032578fd\n                  \n                  \n                 (accessed December 12, 2012)"},{"key":"17_CR13","unstructured":"Precautions for internet traders to prevent fraudulent credit card, \n                  \n                    http:\/\/www.technade.com\/2007\/02\/precautions-for-internet-traders-to_25.html?&lang=en_us&output=json&session-id=3cd3dad0fc218a12578fd\n                  \n                  \n                 (accessed December 12, 2012)"}],"container-title":["Lecture Notes in Computer Science","Advances in Data Mining. Applications and Theoretical Aspects"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39736-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T14:23:19Z","timestamp":1557930199000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39736-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642397356","9783642397363"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39736-3_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}