{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T06:04:51Z","timestamp":1725861891561},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811020520"},{"type":"electronic","value":"9789811020537"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-2053-7_9","type":"book-chapter","created":{"date-parts":[[2016,7,29]],"date-time":"2016-07-29T23:07:07Z","timestamp":1469833627000},"page":"87-95","source":"Crossref","is-referenced-by-count":0,"title":["A Real-Time Fraud Detection Algorithm Based on Usage Amount Forecast"],"prefix":"10.1007","author":[{"given":"Kun","family":"Niu","sequence":"first","affiliation":[]},{"given":"Zhipeng","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Kaile","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Nanjie","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Haizhen","family":"Jiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,31]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/S1361-3723(99)80006-2","volume":"2","author":"P Hoath","year":"1999","unstructured":"Hoath, P.: What\u2019s new in telecoms fraud. Comput. Fraud Secur. 2, 13\u201319 (1999)","journal-title":"Comput. Fraud Secur."},{"key":"9_CR2","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/S1361-3723(97)82712-1","volume":"20","author":"P Hoath","year":"1998","unstructured":"Hoath, P.: Telecoms fraud, the gory details. Comput. Fraud Secur. 20, 10\u201314 (1998)","journal-title":"Comput. Fraud Secur."},{"key":"9_CR3","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/S1361-3723(10)70082-8","volume":"2010","author":"M Ghosh","year":"2010","unstructured":"Ghosh, M.: Telecoms fraud. Comput. Fraud Secur. 2010, 14\u201317 (2010)","journal-title":"Comput. Fraud Secur."},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Rosset, S., Murad, U., Neumann, E., Idan, Y., Pinkas, G.: Discovery of fraud rules for telecommunications - challenges and solutions. In: International Conference on Management of Data and Symposium on Principles of Database Systems, pp. 409\u2013413. ACM, New York (1999)","DOI":"10.1145\/312129.312303"},{"key":"9_CR5","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1016\/j.eswa.2005.09.028","volume":"31","author":"PA Est\u00e9vez","year":"2006","unstructured":"Est\u00e9vez, P.A., Held, C.M., Perez, C.A.: Subscription fraud prevention in telecommunications using fuzzy rules and neural networks. Expert Syst. Appl. 31, 337\u2013344 (2006)","journal-title":"Expert Syst. Appl."},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1007\/978-3-540-73458-1_32","volume-title":"Information Security and Privacy","author":"S Panigrahi","year":"2007","unstructured":"Panigrahi, S., Kundu, A., Sural, S., Majumdar, A.: Use of dempster-shafer theory and bayesian inferencing for fraud detection in mobile communication networks. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 446\u2013460. Springer, Heidelberg (2007)"},{"key":"9_CR7","first-page":"2231","volume":"4","author":"D Gupta","year":"2014","unstructured":"Gupta, D., et al.: An analysis of telecommunication fraud using outlier detection model based on similar coefficient sum. Int. J. Soft Comput. Eng. (IJSCE) 4, 2231\u20132307 (2014)","journal-title":"Int. J. Soft Comput. Eng. (IJSCE)"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1007\/978-3-319-07617-1_11","volume-title":"Hybrid Artificial Intelligence Systems","author":"M C\u00e1rdenas-Montes","year":"2014","unstructured":"C\u00e1rdenas-Montes, M.: Depth-based outlier detection algorithm. In: Polycarpou, M., de Carvalho, A.C., Pan, J.-S., Wo\u017aniak, M., Quintian, H., Corchado, E. (eds.) HAIS 2014. LNCS, vol. 8480, pp. 122\u2013132. Springer, Heidelberg (2014)"},{"key":"9_CR9","first-page":"31","volume":"29","author":"J Hollm\u00e9n","year":"2000","unstructured":"Hollm\u00e9n, J.: User profiling and classification for fraud detection in mobile communications networks. Helsinki Univ. Technol. 29, 31\u201342 (2000)","journal-title":"Helsinki Univ. Technol."},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Zou, K., Sun, W., Hongzhi, Y.: ID3 decision tree in fraud detection application. In: 2012 International Conference on Computer Science and Electronics Engineering, pp. 399\u2013402. IEEE Press, Hangzhou (2012)","DOI":"10.1109\/ICCSEE.2012.241"},{"key":"9_CR11","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1016\/j.procs.2015.04.193","volume":"48","author":"S Subudhia","year":"2015","unstructured":"Subudhia, S., Panigrahib, S.: Quarter-sphere support vector machine for fraud detection in mobile telecommunication networks. Procedia Comput. Sci. 48, 353\u2013359 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1007\/BFb0020294","volume-title":"Artificial Neural Networks - ICANN\u201997","author":"Y Moreau","year":"1997","unstructured":"Moreau, Y., Verrelst, H., Vandewalle, J.: Detection of mobile phone fraud using supervised neural networks: a first prototype. In: Gerstner, W., Hasler, M., Germond, A., Nicoud, J.-D. (eds.) ICANN 1997. LNCS, vol. 1327, pp. 1065\u20131070. Springer, Heidelberg (1997)"},{"key":"9_CR13","doi-asserted-by":"crossref","first-page":"915","DOI":"10.1006\/jpdc.2000.1720","volume":"61","author":"P Burge","year":"2001","unstructured":"Burge, P., Shawe-Taylor, J.: An unsupervised neural network approach to profiling the behavior of mobile phone users for use in fraud detection. J. Parallel Distrib. Comput. 61, 915\u2013925 (2001)","journal-title":"J. Parallel Distrib. Comput."},{"key":"9_CR14","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1016\/j.knosys.2008.03.026","volume":"21","author":"CS Hilas","year":"2008","unstructured":"Hilas, C.S., Mastorocostas, P.A.: An application of supervised and unsupervised learning approaches to telecommunications fraud detection. Knowl. Based Syst. 21, 721\u2013726 (2008)","journal-title":"Knowl. Based Syst."},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Yufeng, K., Lu, C.-T., Sirwongwattana, S., Huang, Y.-P.: Survey of fraud detection techniques. In: 2004 IEEE International Conference on Networking. Sensing and Control, pp. 749\u2013754. IEEE Press, Taiwan (2004)","DOI":"10.1109\/ICNSC.2004.1297040"}],"container-title":["Communications in Computer and Information Science","Social Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-2053-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T15:33:13Z","timestamp":1498318393000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-2053-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811020520","9789811020537"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-2053-7_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]}}}