{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T02:38:46Z","timestamp":1772159926036,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T00:00:00Z","timestamp":1614384000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T00:00:00Z","timestamp":1614384000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100007254","name":"Birla Institute of Scientific Research","doi-asserted-by":"publisher","award":["0012"],"award-info":[{"award-number":["0012"]}],"id":[{"id":"10.13039\/501100007254","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11277-021-08283-9","type":"journal-article","created":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T09:03:51Z","timestamp":1614416631000},"page":"1341-1367","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Fraud Prediction in Smart Societies Using Logistic Regression and k-fold Machine Learning Techniques"],"prefix":"10.1007","volume":"119","author":[{"given":"Kamta Nath","family":"Mishra","sequence":"first","affiliation":[]},{"given":"Subhash Chandra","family":"Pandey","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,27]]},"reference":[{"key":"8283_CR1","doi-asserted-by":"crossref","unstructured":"Aleskerov, E., Freisleben, B., & Rao, B. (1997). CARDWATCH: A neural network-based database mining system for credit card fraud detection. In Proceedings of the IEEE\/IAFE on computational intelligence for financial engineering (pp. 220\u2013226).","DOI":"10.1109\/CIFER.1997.618940"},{"key":"8283_CR2","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780199226405.001.0001","volume-title":"The credit scoring toolkit: Theory and practice for retail credit risk management and decision automation","author":"R Anderson","year":"2007","unstructured":"Anderson, R. (2007). The credit scoring toolkit: Theory and practice for retail credit risk management and decision automation. Oxford University Press."},{"key":"8283_CR3","unstructured":"APACS, Association for Payment Cleaning Services, no date. Card Fraud Facts and Figures. Retrieved February 2020, from http:\/\/www.apacs.org.uk\/resources_publications\/card_fraud_facts_and_figures.html."},{"key":"8283_CR4","unstructured":"Bellis, M. Who Invented Credit Cards-the History of Credit Cards. Retrieved February 2020, from http:\/\/inventors.about.com\/od\/cstartinventions\/a\/credit_cards.htm."},{"key":"8283_CR5","unstructured":"Retrieved March 2020, from http:\/\/mlg.ulb.ac.be."},{"key":"8283_CR6","first-page":"1","volume-title":"Investigate data mining for security and criminal detection","author":"J Mena","year":"2003","unstructured":"Mena, J. (2003). Investigate data mining for security and criminal detection (pp. 1\u2013272). Elsevier."},{"key":"8283_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2174\/266625581301200213094148","volume":"13","author":"S Ray","year":"2020","unstructured":"Ray, S., Mishra, K. N., & Dutta, S. (2020). Big data security issues from the perspective of IoT and cloud computing: a review. Recent Advances in Computer Science and Communications, Benthem Science Journal, 13, 1\u201325.","journal-title":"Recent Advances in Computer Science and Communications, Benthem Science Journal"},{"key":"8283_CR8","doi-asserted-by":"crossref","unstructured":"Chen, R., Chiu, M., Huang, Y., & Chen, L. (2004). Detecting credit card fraud by using questionnaire responded transaction model based on SVMs. In Proceedings of IDEAL2004 (pp. 800\u2013806).","DOI":"10.1007\/978-3-540-28651-6_119"},{"issue":"3","key":"8283_CR9","first-page":"235","volume":"28","author":"RJ Bolton","year":"2002","unstructured":"Bolton, R. J., & Hand, D. J. (2002). Statistical fraud detection: A review. Statistical Science, 28(3), 235\u2013255.","journal-title":"Statistical Science"},{"key":"8283_CR10","unstructured":"Kou, Y., Lu, C.-T., Sirwongwattana, S., & Huang, Y. P. (2004). Survey of fraud detection techniques. In Proceedings of the 2004 IEEE International Conference on Networking, Sensing and Control, Taipei (pp. 1\u20136)."},{"key":"8283_CR11","first-page":"1","volume":"29","author":"C Phua","year":"2005","unstructured":"Phua, C., Lee, V., Smith, K., & Gayler, R. (2005). A comprehensive survey of data mining-based fraud detection research. Artificial Intelligence Review, 24, 1\u201314.","journal-title":"Artificial Intelligence Review"},{"key":"8283_CR12","doi-asserted-by":"crossref","unstructured":"Sahin, Y., & Duman, E. (2011). Detecting credit card fraud by ANN and logistic regression. In International symposium on innovations in intelligent systems and applications (pp. 315\u2013319).","DOI":"10.1109\/INISTA.2011.5946108"},{"issue":"20","key":"8283_CR13","first-page":"825","volume":"118","author":"K Navanshu","year":"2018","unstructured":"Navanshu, K., & Saad, Y. S. (2018). Credit card fraud detection using machine learning models and collating machine learning models. International Journal of Pure and Applied Mathematics, 118(20), 825\u2013837.","journal-title":"International Journal of Pure and Applied Mathematics"},{"key":"8283_CR14","first-page":"261","volume-title":"Interactive image-guided neurosurgery","author":"S Maes","year":"1993","unstructured":"Maes, S., Tuyls, K., Vanschoenwinkel, B., & Manderick, B. (1993). Credit card fraud detection using Baysian and Neural Network. In R. J. Maciunas (Ed.), Interactive image-guided neurosurgery (pp. 261\u2013270). American Association Neurological Surgeons."},{"key":"8283_CR15","doi-asserted-by":"crossref","unstructured":"Kundu, A., Sural, S., & Majumdar, A. (2006). Two-stage credit card fraud detection using sequence alignment. In International conference on information systems security, LNCS (pp. 260\u2013275).","DOI":"10.1007\/11961635_18"},{"key":"8283_CR16","doi-asserted-by":"crossref","unstructured":"Seyedhossein, L., & Hashemi, M. R. (2010). Mining information from credit card time series for timelier fraud detection. In Telecommunications (IST), 5th international symposium on IEEE (pp. 619\u2013624).","DOI":"10.1109\/ISTEL.2010.5734099"},{"issue":"2","key":"8283_CR17","doi-asserted-by":"publisher","first-page":"3630","DOI":"10.1016\/j.eswa.2008.02.001","volume":"36","author":"D S\u00e1nchez","year":"2009","unstructured":"S\u00e1nchez, D., et al. (2009). Association rules applied to credit card fraud detection. Expert Systems with Applications, 36(2), 3630\u20133640.","journal-title":"Expert Systems with Applications"},{"issue":"4","key":"8283_CR18","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1016\/j.inffus.2008.04.001","volume":"10","author":"S Panigrahi","year":"2009","unstructured":"Panigrahi, S., et al. (2009). Credit card fraud detection: A fusion approach using Dempster\u2013Shafer theory and Bayesian learning. Information Fusion, 10(4), 354\u2013363.","journal-title":"Information Fusion"},{"issue":"3","key":"8283_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/en11030596","volume":"11","author":"SN Fallah","year":"2018","unstructured":"Fallah, S. N., Deo, R. C., Shojafar, M., Conti, M., & Shamshirband, S. (2018). Computational intelligence approaches for energy load forecasting in smart energy management grids: state of the art, future challenges, and research directions. Energies, 11(3), 1\u201331.","journal-title":"Energies"},{"key":"8283_CR20","doi-asserted-by":"crossref","unstructured":"Chen, R.-C., et al. (2004). Detecting credit card fraud by using questionnaire-responded transaction model based on support vector machines. In Intelligent data engineering and automated learning\u2013IDEAL (pp. 800\u2013806).","DOI":"10.1007\/978-3-540-28651-6_119"},{"issue":"1","key":"8283_CR21","doi-asserted-by":"publisher","first-page":"62","DOI":"10.4156\/jcit.vol6.issue1.8","volume":"6","author":"Q Lu","year":"2011","unstructured":"Lu, Q., & Ju, C. (2011). Research on credit card fraud detection model based on class weighted support vector machine. Journal of Convergence Information Technology, 6(1), 62\u201368.","journal-title":"Journal of Convergence Information Technology"},{"key":"8283_CR22","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.procs.2018.05.199","volume":"132","author":"S Patil","year":"2018","unstructured":"Patil, S., Nemade, V., & Soni, P. K. (2018). Predictive modelling for credit card fraud detection using data analytics. Procedia Computer Science, 132, 385\u2013395.","journal-title":"Procedia Computer Science"},{"key":"8283_CR23","doi-asserted-by":"crossref","unstructured":"Ghosh, S., & Reilly, D. L. (1994). Credit card fraud detection with a neural-network. In Proceedings of 27th annual conference on system science (pp. 621\u2013630).","DOI":"10.1109\/HICSS.1994.323314"},{"issue":"3","key":"8283_CR24","doi-asserted-by":"publisher","first-page":"35","DOI":"10.5120\/8184-1538","volume":"52","author":"M Zareapoor","year":"2012","unstructured":"Zareapoor, M., Seeja, K. R., & Alam, M. A. (2012). Analysis of credit card fraud detection techniques: Based on certain design criteria. International Journal of Computer Applications, 52(3), 35\u201342.","journal-title":"International Journal of Computer Applications"},{"key":"8283_CR25","doi-asserted-by":"crossref","unstructured":"Syeda, M., Zhang, Y.-Q., & Pan, Y. (2002). Parallel granular neural networks for fast credit card fraud detection. In Proceedings of IEEE international conference (pp. 572\u2013577).","DOI":"10.1109\/FUZZ.2002.1005055"},{"key":"8283_CR26","unstructured":"Zojaji, Z., Atani, R. E., & Monadjemi, A. H. (2016). A survey of credit card fraud detection techniques: Data and technique oriented perspective, cryptography and security (pp. 1\u201310)."},{"issue":"9","key":"8283_CR27","doi-asserted-by":"publisher","first-page":"4521","DOI":"10.1016\/j.csda.2008.03.014","volume":"52","author":"P Juszczak","year":"2008","unstructured":"Juszczak, P., Adams, N. M., Hand, D. J., Whitrow, C., & Weston, D. J. (2008). Off-the-peg and bespoke classifiers for fraud detection. Computational Statistics & Data Analysis, 52(9), 4521\u20134532.","journal-title":"Computational Statistics & Data Analysis"},{"issue":"4","key":"8283_CR28","doi-asserted-by":"publisher","first-page":"1721","DOI":"10.1016\/j.eswa.2007.08.093","volume":"35","author":"JT Quah","year":"2008","unstructured":"Quah, J. T., & Sriganesh, M. (2008). Real-time credit card fraud detection using computational intelligence. Expert Systems with Applications, 35(4), 1721\u20131732.","journal-title":"Expert Systems with Applications"},{"key":"8283_CR29","first-page":"3221","volume":"9","author":"LJP van der Maaten","year":"2014","unstructured":"van der Maaten, L. J. P., & Hinton, G. E. (2014). Visualizing high-dimensional data using t-SNE. Journal of Machine Learning Research, 9, 3221\u20133245.","journal-title":"Journal of Machine Learning Research"},{"key":"8283_CR30","unstructured":"Machine Learning Group \u2014 ULB, Credit Card Fraud Detection. (2018). Kaggle, 3784\u20133797. Retrieved March 2020, from https:\/\/www.kaggle.com\/mlg-ulb\/creditcardfraud."},{"key":"8283_CR31","unstructured":"Japkowicz N (2000) Learning from imbalanced data sets: A comparison of various strategies. AAAI Technical Report WS-00\u201305"},{"issue":"2","key":"8283_CR32","first-page":"176","volume":"7","author":"N Dermala","year":"2016","unstructured":"Dermala, N., & Agrawal, A. N. (2016). Credit card fraud detection using SVM and reduction of false alarms. International Journal of Innovations in Engineering and Technology, 7(2), 176\u2013182.","journal-title":"International Journal of Innovations in Engineering and Technology"},{"key":"8283_CR33","doi-asserted-by":"crossref","unstructured":"Carneiro, E. M., Dias, L. A. V., Da Cunha, A. M., & Mialaret, L. F. S. (2015). Cluster analysis and artificial neural networks: A case study in credit card fraud detection. In 12th international conference on information technology new generations (pp. 122\u2013126).","DOI":"10.1109\/ITNG.2015.25"},{"issue":"3","key":"8283_CR34","first-page":"827","volume":"3","author":"MB Suman","year":"2014","unstructured":"Suman, M. B. (2014). Survey paper on credit card fraud detection. International Journal of Advanced Research in Computer Engineering & Technology, 3(3), 827\u2013832.","journal-title":"International Journal of Advanced Research in Computer Engineering & Technology"},{"key":"8283_CR35","doi-asserted-by":"crossref","unstructured":"Bahnsen, A.C., Stojanovic, A., Aouada, D., & Ottersten, B. (2013). Cost sensitive credit card fraud detection using Bayes minimum risk. In 12th international conference on machine learning and apps (ICMLA) (pp. 333\u2013338).","DOI":"10.1109\/ICMLA.2013.68"},{"key":"8283_CR36","doi-asserted-by":"crossref","unstructured":"Ozcelik, M. H., Duman, E., Isik, M., & Cevik, T. (2010). Improving a credit card fraud detection system using genetic algorithm. In International conference on information and network technologies (pp. 436\u2013440).","DOI":"10.1109\/ICNIT.2010.5508478"},{"key":"8283_CR37","doi-asserted-by":"publisher","first-page":"13057","DOI":"10.1016\/j.eswa.2011.04.110","volume":"Vol. 38, No. 10","author":"Ekrem Dumana","year":"2011","unstructured":"Dumana, Ekrem, & Hamdi Ozcelikb, M. (2011). Detecting credit card fraud by genetic algorithm and scatter search. Expert Systems with Applications, 38(10), 13057\u201313063.","journal-title":"Expert Systems with Applications"},{"issue":"4","key":"8283_CR38","doi-asserted-by":"publisher","first-page":"391","DOI":"10.21917\/ijsc.2012.0061","volume":"2","author":"V Dheepa","year":"2012","unstructured":"Dheepa, V., & Dhanapal, R. (2012). Behavior based credit card fraud detection using spport vectors machines. ICTACT Journal on Soft Computing, 2(4), 391\u2013397.","journal-title":"ICTACT Journal on Soft Computing"},{"key":"8283_CR39","doi-asserted-by":"crossref","unstructured":"Pandey, S. C. (2019). Security issues of internet of things in health-care sector: An analytical approach. In Book: advancement of machine intelligence in interactive medical image analysis (pp. 307\u2013329).","DOI":"10.1007\/978-981-15-1100-4_15"},{"key":"8283_CR40","first-page":"1","volume-title":"Mind, Machine, and Image Processing, Deep Learning and Image Processing","author":"SC Pandey","year":"2018","unstructured":"Pandey, S. C. (2018). Mind, Machine, and Image Processing, Deep Learning and Image Processing (pp. 1\u201326). IOS Press."},{"key":"8283_CR41","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-981-13-0550-4_10","volume-title":"Recent developments in big data analysis tools using apache spark, book on big data processing using spark in cloud","author":"SC Pandey","year":"2019","unstructured":"Pandey, S. C. (2019). Recent developments in big data analysis tools using apache spark, book on big data processing using spark in cloud (pp. 217\u2013236). Springer."},{"key":"8283_CR42","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.jocs.2013.11.005","volume":"5","author":"SC Pandey","year":"2015","unstructured":"Pandey, S. C., & Nandi, G. C. (2015). TSD based framework for mining the induction rules. Journal of Computational Science, 5, 184\u2013195.","journal-title":"Journal of Computational Science"},{"key":"8283_CR43","first-page":"19","volume-title":"A novel approach towards enhancing the quality of life in smart cities using clouds and iot based technologies, a book on digital twins technologies and smart cities","author":"KN Mishra","year":"2020","unstructured":"Mishra, K. N., & Chakraborty, C. (2020). A novel approach towards enhancing the quality of life in smart cities using clouds and iot based technologies, a book on digital twins technologies and smart cities (pp. 19\u201335). Springer."},{"key":"8283_CR44","first-page":"443","volume-title":"Importance of AADhar based smartcard systems\u2019s implementation in developing countries, a book on advances in soft computing and machine learning in image processing","author":"KN Mishra","year":"2018","unstructured":"Mishra, K. N. (2018). Importance of AADhar based smartcard systems\u2019s implementation in developing countries, a book on advances in soft computing and machine learning in image processing (pp. 443\u2013457). Springer."},{"key":"8283_CR45","first-page":"386","volume-title":"A novel mechanism for cloud data management in distributed environment, a book on data intensive computing applications for big data","author":"KN Mishra","year":"2018","unstructured":"Mishra, K. N. (2018). A novel mechanism for cloud data management in distributed environment, a book on data intensive computing applications for big data (pp. 386\u2013413). IOS Press."},{"key":"8283_CR46","doi-asserted-by":"crossref","unstructured":"Mishra K. N. (2016). AAdhar based smartcard system for security management in South Asia. In 2nd IEEE international conference on control computing communication and materials (IEEE ICCCCM\u20142016) (pp. 106\u2013111).","DOI":"10.1109\/ICCCCM.2016.7918256"},{"key":"8283_CR47","doi-asserted-by":"crossref","unstructured":"Singh I., Mishra K. N., Antonio M. Alberti, Singh D., and Singh M., (2015) A novel privacy and security framework for the cloud network services. In 17th IEEE international conference on advanced communication technologies (IEEE ICACT\u20142015) (pp. 363\u2013367).","DOI":"10.1109\/ICACT.2015.7224820"},{"issue":"1\u20136","key":"8283_CR48","first-page":"2020","volume":"43","author":"KN Mishra","year":"2020","unstructured":"Mishra, K. N., & Kumar, N. (2020). Muli \u2013 server multi-CS based deadlock prevention in distributed systems using voting and priority based approaches. Natl. Acad. Sci. Lett., 43(1\u20136), 2020.","journal-title":"Natl. Acad. Sci. Lett."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08283-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08283-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08283-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T23:43:12Z","timestamp":1724542992000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08283-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,27]]},"references-count":48,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["8283"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08283-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,27]]},"assertion":[{"value":"8 February 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The author declares that there is no conflict of interest with any person or organization in publishing this paper anywhere.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}