{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:20:10Z","timestamp":1774538410429,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2018,5,26]],"date-time":"2018-05-26T00:00:00Z","timestamp":1527292800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vietnam J Comput Sci"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s40595-018-0116-x","type":"journal-article","created":{"date-parts":[[2018,5,26]],"date-time":"2018-05-26T01:25:15Z","timestamp":1527297915000},"page":"205-217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A hybrid mobile call fraud detection model using optimized fuzzy C-means clustering and group method of data handling-based network"],"prefix":"10.1007","volume":"5","author":[{"given":"Sharmila","family":"Subudhi","sequence":"first","affiliation":[]},{"given":"Suvasini","family":"Panigrahi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,26]]},"reference":[{"issue":"6","key":"116_CR1","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1016\/j.jbi.2005.03.003","volume":"38","author":"R Abdel-Aal","year":"2005","unstructured":"Abdel-Aal, R.: Gmdh-based feature ranking and selection for improved classification of medical data. J. Biomed.Inf. 38(6), 456\u2013468 (2005)","journal-title":"J. Biomed.Inf."},{"key":"116_CR2","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1016\/j.asoc.2015.05.038","volume":"34","author":"SK Adhikari","year":"2015","unstructured":"Adhikari, S.K., Sing, J.K., Basu, D.K., Nasipuri, M.: Conditional spatial fuzzy c-means clustering algorithm for segmentation of mri images. Appl. Soft Comput. 34, 758\u2013769 (2015)","journal-title":"Appl. Soft Comput."},{"issue":"2","key":"116_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.19030\/jabr.v15i2.5675","volume":"15","author":"A Agarwal","year":"2011","unstructured":"Agarwal, A.: Abductive networks for two-group classification: a comparison with neural networks. J. Appl. Bus. Res. (JABR) 15(2), 1\u201312 (2011)","journal-title":"J. Appl. Bus. Res. (JABR)"},{"issue":"1","key":"116_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1162\/evco.1993.1.1.1","volume":"1","author":"T B\u00e4ck","year":"1993","unstructured":"B\u00e4ck, T., Schwefel, H.P.: An overview of evolutionary algorithms for parameter optimization. Evol. Comput. 1(1), 1\u201323 (1993)","journal-title":"Evol. Comput."},{"issue":"7","key":"116_CR5","doi-asserted-by":"crossref","first-page":"1731","DOI":"10.1016\/j.engappai.2013.03.008","volume":"26","author":"ZA Baig","year":"2013","unstructured":"Baig, Z.A., Sait, S.M., Shaheen, A.: Gmdh-based networks for intelligent intrusion detection. Eng. Appl. Artif. Intel. 26(7), 1731\u20131740 (2013)","journal-title":"Eng. Appl. Artif. Intel."},{"issue":"2","key":"116_CR6","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1137\/0140029","volume":"40","author":"JC Bezdek","year":"1981","unstructured":"Bezdek, J.C., Coray, C., Gunderson, R., Watson, J.: Detection and characterization of cluster substructure i. linear structure: fuzzy c-lines. SIAM J. Appl. Math. 40(2), 339\u2013357 (1981)","journal-title":"SIAM J. Appl. Math."},{"issue":"2","key":"116_CR7","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/0098-3004(84)90020-7","volume":"10","author":"JC Bezdek","year":"1984","unstructured":"Bezdek, J.C., Ehrlich, R., Full, W.: Fcm: The fuzzy c-means clustering algorithm. Comput. Geosci. 10(2), 191\u2013203 (1984)","journal-title":"Comput. Geosci."},{"key":"116_CR8","doi-asserted-by":"crossref","unstructured":"Bezdek, J.C., Hathaway, R.J.: Optimization of fuzzy clustering criteria using genetic algorithms. In: Evolutionary Computation, 1994. IEEE World Congress on Computational Intelligence., Proceedings of the First IEEE Conference on, pp. 589\u2013594. IEEE (1994)","DOI":"10.1109\/ICEC.1994.349993"},{"key":"116_CR9","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.ins.2013.02.041","volume":"237","author":"I Boussa\u00efD","year":"2013","unstructured":"Boussa\u00efD, I., Lepagnot, J., Siarry, P.: A survey on optimization metaheuristics. Inf. Sci. 237, 82\u2013117 (2013)","journal-title":"Inf. Sci."},{"key":"116_CR10","doi-asserted-by":"crossref","unstructured":"Burge, P.: Novel techniques for profiling and fraud detection in mobile telecommunications. Bus. Appl. Neural Netw 113\u2013139 (2000)","DOI":"10.1142\/9789812813312_0008"},{"issue":"3","key":"116_CR11","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"issue":"3","key":"116_CR12","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1007\/s00521-015-2075-9","volume":"28","author":"K Demertzis","year":"2017","unstructured":"Demertzis, K., Iliadis, L., Avramidis, S., El-Kassaby, Y.A.: Machine learning use in predicting interior spruce wood density utilizing progeny test information. Neural Comput. Appl. 28(3), 505\u2013519 (2017)","journal-title":"Neural Comput. Appl."},{"issue":"4","key":"116_CR13","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/s00779-005-0046-3","volume":"10","author":"N Eagle","year":"2006","unstructured":"Eagle, N., Pentland, A.: Reality mining: sensing complex social systems. Person. Ubiquit. Comput. 10(4), 255\u2013268 (2006)","journal-title":"Person. Ubiquit. Comput."},{"issue":"7","key":"116_CR14","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1007\/s00265-009-0739-0","volume":"63","author":"N Eagle","year":"2009","unstructured":"Eagle, N., Pentland, A.S.: Eigenbehaviors: identifying structure in routine. Behav. Ecol. Sociobiol. 63(7), 1057\u20131066 (2009)","journal-title":"Behav. Ecol. Sociobiol."},{"key":"116_CR15","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1002\/9780470977811","volume-title":"Cluster Analysis","author":"B Everitt","year":"2011","unstructured":"Everitt, B., Landau, S., Leese, M., Stahl, D.: Cluster Analysis, p. 330. Wiley, New York (2011)"},{"issue":"4","key":"116_CR16","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1016\/j.pmcj.2012.04.002","volume":"9","author":"L Ferrari","year":"2013","unstructured":"Ferrari, L., Mamei, M.: Classification and prediction of whereabouts patterns from the reality mining dataset. Pervas. Mob. Comput. 9(4), 516\u2013527 (2013)","journal-title":"Pervas. Mob. Comput."},{"key":"116_CR17","doi-asserted-by":"crossref","unstructured":"Ficek, M., Kencl, L.: Spatial extension of the reality mining dataset. In: Mobile Adhoc and Sensor Systems (MASS), 2010 IEEE 7th International Conference on, pp. 666\u2013673. IEEE (2010)","DOI":"10.1109\/MASS.2010.5663788"},{"key":"116_CR18","unstructured":"Gosset, P., Hyland, M.: Classification, detection and prosecution of fraud in mobile networks. In: Proceedings of ACTS Mobile Summit, Sorrento, Italy (1999)"},{"issue":"1","key":"116_CR19","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/TSMC.1986.289288","volume":"16","author":"JJ Grefenstette","year":"1986","unstructured":"Grefenstette, J.J.: Optimization of control parameters for genetic algorithms. IEEE Trans. Syst. Man Cybernet. 16(1), 122\u2013128 (1986)","journal-title":"IEEE Trans. Syst. Man Cybernet."},{"key":"116_CR20","unstructured":"Hilas, C.S., Kazarlis, S.A., Rekanos, I.T., Mastorocostas, P.A.: A genetic programming approach to telecommunications fraud detection and classification. In: Proc. 2014 Int. Conf. Circuits, Syst. Signal Process. Commun. Comput, pp. 77\u201383 (2014)"},{"issue":"4","key":"116_CR21","first-page":"1709","volume":"9","author":"CS Hilas","year":"2015","unstructured":"Hilas, C.S., Mastorocostas, P.A., Rekanos, I.T.: Clustering of telecommunications user profiles for fraud detection and security enhancement in large corporate networks: a case study. Appl. Math. Inf. Sci. 9(4), 1709 (2015)","journal-title":"Appl. Math. Inf. Sci."},{"key":"116_CR22","volume-title":"Adaptation in Natural and Artificial Systems: an Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence","author":"JH Holland","year":"1975","unstructured":"Holland, J.H.: Adaptation in Natural and Artificial Systems: an Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence. Michigan Press, USA (1975)"},{"key":"116_CR23","unstructured":"Howell, J.: 2015 global fraud loss survey by cfca (communications fraud control association). http:\/\/cfca.org\/fraudlosssurvey\/2015.pdf (2016). Accessed: 04 Aug 2017"},{"issue":"2","key":"116_CR24","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/0005-1098(70)90092-0","volume":"6","author":"A Ivakhnenko","year":"1970","unstructured":"Ivakhnenko, A.: Heuristic self-organization in problems of engineering cybernetics. Automatica 6(2), 207\u2013219 (1970)","journal-title":"Automatica"},{"key":"116_CR25","doi-asserted-by":"crossref","unstructured":"Klawonn, F., Keller, A.: Fuzzy clustering based on modified distance measures. In: International Symposium on Intelligent Data Analysis, pp. 291\u2013301. Springer (1999)","DOI":"10.1007\/3-540-48412-4_25"},{"key":"116_CR26","doi-asserted-by":"crossref","unstructured":"Ko, M.M., Thwin, M.M.S.: Anomalous behavior detection in mobile network. In: Genetic and Evolutionary Computing, pp. 147\u2013155. Springer (2015)","DOI":"10.1007\/978-3-319-23207-2_15"},{"key":"116_CR27","unstructured":"Kosmides, M.: Telephone fraud on rise in UK, study finds. http:\/\/www.counter-fraud.com\/fraud-types-n-z\/telecoms-fraud\/telephone-fraud-on-rise-in-uk-study-finds--1.htm (2014). Accessed 30 Jan 2016"},{"issue":"1","key":"116_CR28","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/TEVC.2005.860765","volume":"10","author":"VK Koumousis","year":"2006","unstructured":"Koumousis, V.K., Katsaras, C.P.: A saw-tooth genetic algorithm combining the effects of variable population size and reinitialization to enhance performance. IEEE Trans. Evol. Comput. 10(1), 19\u201328 (2006)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"116_CR29","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1016\/j.neucom.2017.01.017","volume":"237","author":"T Li","year":"2017","unstructured":"Li, T., Zhang, L., Lu, W., Hou, H., Liu, X., Pedrycz, W., Zhong, C.: Interval kernel fuzzy c-means clustering of incomplete data. Neurocomputing 237, 316\u2013331 (2017)","journal-title":"Neurocomputing"},{"issue":"6","key":"116_CR30","doi-asserted-by":"crossref","first-page":"923","DOI":"10.1007\/s13042-015-0367-0","volume":"6","author":"SA Ludwig","year":"2015","unstructured":"Ludwig, S.A.: Mapreduce-based fuzzy c-means clustering algorithm: implementation and scalability. Int J. Mach. Learn. Cybernet. 6(6), 923\u2013934 (2015)","journal-title":"Int J. Mach. Learn. Cybernet."},{"key":"116_CR31","unstructured":"Mehra, R.: Group method of data handling (gmdh): review and experience. In: Decision and Control including the 16th Symposium on Adaptive Processes and A Special Symposium on Fuzzy Set Theory and Applications, 1977 IEEE Conference on, pp. 29\u201334. IEEE (1977)"},{"key":"116_CR32","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1016\/j.knosys.2011.08.018","volume":"26","author":"D Olszewski","year":"2012","unstructured":"Olszewski, D.: A probabilistic approach to fraud detection in telecommunications. Knowl. Based Syst. 26, 246\u2013258 (2012)","journal-title":"Knowl. Based Syst."},{"key":"116_CR33","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1016\/j.knosys.2014.07.008","volume":"70","author":"D Olszewski","year":"2014","unstructured":"Olszewski, D.: Fraud detection using self-organizing map visualizing the user profiles. Knowl. Based Syst. 70, 324\u2013334 (2014)","journal-title":"Knowl. Based Syst."},{"issue":"8","key":"116_CR34","doi-asserted-by":"crossref","first-page":"823","DOI":"10.1016\/j.knosys.2010.05.007","volume":"23","author":"P Ravisankar","year":"2010","unstructured":"Ravisankar, P., Ravi, V.: Financial distress prediction in banks using group method of data handling neural network, counter propagation neural network and fuzzy artmap. Knowl. Based Syst. 23(8), 823\u2013831 (2010)","journal-title":"Knowl. Based Syst."},{"key":"116_CR35","doi-asserted-by":"crossref","unstructured":"Refaeilzadeh, P., Tang, L., Liu, H.: Cross-validation. In: Encyclopedia of database systems, pp. 532\u2013538. Springer (2009)","DOI":"10.1007\/978-0-387-39940-9_565"},{"key":"116_CR36","unstructured":"Sharma, A., Onwubolu, G.C.: Intrusion detection system using hybrid differential evolution and group method of data handling approach. In: 2nd International Conference on Inductive Modelling Proceedings, pp. 255\u2013262. International Research and Training Center for Information Technologies and Systems (2008)"},{"issue":"C","key":"116_CR37","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1016\/j.ins.2015.04.050","volume":"317","author":"LH Son","year":"2015","unstructured":"Son, L.H.: A novel kernel fuzzy clustering algorithm for geo-demographic analysis. Inf. Sci. Int. J. 317(C), 202\u2013223 (2015)","journal-title":"Inf. Sci. Int. J."},{"key":"116_CR38","unstructured":"Stokes, R.: Telecom fraud losses to top US $46bn in 2013. http:\/\/www.counter-fraud.com\/fraud-types-n-z\/telecoms-fraud\/telecom-fraud-losses-to-top-us46bn-in-2013-93232.htm (2013). Accessed 30 Jan 2016"},{"key":"116_CR39","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1016\/j.procs.2015.04.193","volume":"48","author":"S Subudhi","year":"2015","unstructured":"Subudhi, S., Panigrahi, S.: Quarter-sphere support vector machine for fraud detection in mobile telecommunication networks. Proc. Comput. Sci. 48, 353\u2013359 (2015)","journal-title":"Proc. Comput. Sci."},{"issue":"1\u20132","key":"116_CR40","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1504\/IJSN.2016.075069","volume":"11","author":"S Subudhi","year":"2016","unstructured":"Subudhi, S., Panigrahi, S.: Use of fuzzy clustering and support vector machine for detecting fraud in mobile telecommunication networks. Int. J. Secur. Netw. 11(1\u20132), 3\u201311 (2016)","journal-title":"Int. J. Secur. Netw."},{"issue":"2","key":"116_CR41","doi-asserted-by":"crossref","first-page":"23","DOI":"10.4018\/IJSE.2016070102","volume":"7","author":"S Subudhi","year":"2016","unstructured":"Subudhi, S., Panigrahi, S., Behera, T.K.: Detection of mobile phone fraud using possibilistic fuzzy c-means clustering and hidden markov model. Int. J. Synth. Emot. (IJSE) 7(2), 23\u201344 (2016)","journal-title":"Int. J. Synth. Emot. (IJSE)"},{"issue":"9","key":"116_CR42","doi-asserted-by":"crossref","first-page":"3549","DOI":"10.1007\/s00500-015-1712-7","volume":"20","author":"PH Thong","year":"2016","unstructured":"Thong, P.H., et al.: Picture fuzzy clustering: a new computational intelligence method. Soft Comput. 20(9), 3549\u20133562 (2016)","journal-title":"Soft Comput."},{"key":"116_CR43","unstructured":"Tukey, J.W.: Exploratory data analysis. Addison-Wesley Series in Behavioral Science: Quantitative Methods. Addison-Wesley, Reading (1977)"},{"issue":"19","key":"116_CR44","doi-asserted-by":"crossref","first-page":"2095","DOI":"10.1016\/j.fss.2007.03.004","volume":"158","author":"W Wang","year":"2007","unstructured":"Wang, W., Zhang, Y.: On fuzzy cluster validity indices. Fuzzy Sets Syst. 158(19), 2095\u20132117 (2007)","journal-title":"Fuzzy Sets Syst."},{"issue":"6","key":"116_CR45","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1016\/j.conengprac.2005.04.007","volume":"14","author":"M Witczak","year":"2006","unstructured":"Witczak, M., Korbicz, J., Mrugalski, M., Patton, R.J.: A gmdh neural network-based approach to robust fault diagnosis: application to the damadics benchmark problem. Control Eng. Pract. 14(6), 671\u2013683 (2006)","journal-title":"Control Eng. Pract."},{"key":"116_CR46","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.patcog.2017.05.017","volume":"71","author":"MS Yang","year":"2017","unstructured":"Yang, M.S., Nataliani, Y.: Robust-learning fuzzy c-means clustering algorithm with unknown number of clusters. Pattern Recogn. 71, 45\u201359 (2017)","journal-title":"Pattern Recogn."},{"issue":"2","key":"116_CR47","doi-asserted-by":"crossref","first-page":"961","DOI":"10.3233\/IFS-141378","volume":"28","author":"Y Zheng","year":"2015","unstructured":"Zheng, Y., Jeon, B., Xu, D., Wu, Q., Zhang, H.: Image segmentation by generalized hierarchical fuzzy c-means algorithm. J. Intel. Fuzzy Syst. 28(2), 961\u2013973 (2015)","journal-title":"J. Intel. Fuzzy Syst."}],"container-title":["Vietnam Journal of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40595-018-0116-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40595-018-0116-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40595-018-0116-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T19:38:32Z","timestamp":1751657912000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40595-018-0116-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,26]]},"references-count":47,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["116"],"URL":"https:\/\/doi.org\/10.1007\/s40595-018-0116-x","relation":{},"ISSN":["2196-8888","2196-8896"],"issn-type":[{"value":"2196-8888","type":"print"},{"value":"2196-8896","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,26]]}}}