{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T22:10:26Z","timestamp":1736460626277,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540360360"},{"type":"electronic","value":"9783540360377"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11790853_41","type":"book-chapter","created":{"date-parts":[[2006,7,12]],"date-time":"2006-07-12T08:22:02Z","timestamp":1152692522000},"page":"526-538","source":"Crossref","is-referenced-by-count":20,"title":["Establishing Fraud Detection Patterns Based on Signatures"],"prefix":"10.1007","author":[{"given":"Pedro","family":"Ferreira","sequence":"first","affiliation":[]},{"given":"Ronnie","family":"Alves","sequence":"additional","affiliation":[]},{"given":"Orlando","family":"Belo","sequence":"additional","affiliation":[]},{"given":"Lu\u00eds","family":"Cortes\u00e3o","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"41_CR1","first-page":"235","volume":"17","author":"R.J. Bolton","year":"2002","unstructured":"Bolton, R.J., David, J.: Hand Statistical. Statistical fraud detection: A review. Statistical Science\u00a017(3), 235\u2013255 (2002)","journal-title":"Statistical fraud detection: A review. Statistical Science"},{"key":"41_CR2","first-page":"91","volume-title":"Proceedings of the 2nd IEEE European Conference on Security and Detection","author":"P. Burge","year":"1997","unstructured":"Burge, P., Shawe-Taylor, J., Moreau, Y., Verrelst, H., Stoermann, C., Gosset, P.: Fraud detection and management in mobile telecommunications networks. In: Proceedings of the 2nd IEEE European Conference on Security and Detection, London, vol.\u00a0437, pp. 91\u201396. IEEE, Los Alamitos (1997)"},{"key":"41_CR3","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1007\/978-1-4615-0005-6_26","volume-title":"Handbook of massive data sets","author":"M. Cahill","year":"2002","unstructured":"Cahill, M., Lambert, D., Pinheiro, J., Sun, D.: Detecting fraud in the real world. In: Handbook of massive data sets, pp. 911\u2013929. Kluwer Academic Publishers, Norwell (2002)"},{"issue":"3","key":"41_CR4","doi-asserted-by":"crossref","first-page":"211","DOI":"10.3233\/IDA-2002-6302","volume":"6","author":"C. Cortes","year":"2002","unstructured":"Cortes, C., Pregibon, D., Volinsky, C.: Communities of interest. Intelligence Data Analysis\u00a06(3), 211\u2013219 (2002)","journal-title":"Intelligence Data Analysis"},{"key":"41_CR5","doi-asserted-by":"crossref","unstructured":"Cortes, C., Pregibon, D.: Signature-based methods for data streams. Data Mining and Knowledge Discovery\u00a0(5), 167\u2013182 (2001)","DOI":"10.1023\/A:1011464915332"},{"key":"41_CR6","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1145\/1014052.1014116","volume-title":"Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining","author":"K. Das","year":"2004","unstructured":"Das, K., Moore, A., Schneider, J.: Belief state approaches to signaling alarms in surveillance systems. In: Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 539\u2013544. ACM Press, New York (2004)"},{"key":"41_CR7","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/1014052.1014069","volume-title":"Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining","author":"W. Fan","year":"2004","unstructured":"Fan, W.: Systematic data selection to mine concept-drifting data streams. In: Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 128\u2013137. ACM Press, New York (2004)"},{"key":"41_CR8","first-page":"8","volume-title":"Proceedings on the Second International Conference on Knowledge Discovery and Data Mining","author":"T. Fawcett","year":"1996","unstructured":"Fawcett, T., Provost, F.: Combining data mining and machine learning for effective user profiling. In: Simoudis, Han, Fayyad (eds.) Proceedings on the Second International Conference on Knowledge Discovery and Data Mining, pp. 8\u201313. AAAI Press, Menlo Park (1996)"},{"key":"41_CR9","doi-asserted-by":"crossref","unstructured":"Fawcett, T., Provost, F.: Adaptative fraud detection. In: Data Mining and Knowledge Discovery, pp. 1\u201328 (1997)","DOI":"10.1023\/A:1009700419189"},{"issue":"2","key":"41_CR10","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"V. Hodge","year":"2004","unstructured":"Hodge, V., Austin, J.: A survey of outlier detection methodologies. Artificial Intelligence Review\u00a022(2), 85\u2013126 (2004)","journal-title":"Artificial Intelligence Review"},{"key":"41_CR11","volume-title":"Proceedings of 2004 IEEE International Conference on Networking, Sensing and Control","author":"Y. Kou","year":"2004","unstructured":"Kou, Y., Lu, T., Sirwongwattana, S., Huang, Y.: Survey of fraud detection techniques. In: Proceedings of 2004 IEEE International Conference on Networking, Sensing and Control, Taipei, Taiwan. IEEE, Los Alamitos (2004)"},{"issue":"9","key":"41_CR12","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.1109\/TKDE.2004.43","volume":"16","author":"T. Leckie","year":"2004","unstructured":"Leckie, T., Yasinsac, A.: Metadata for anomaly-based security protocol attack deduction. IEEE Trans. Knowl. Data Eng.\u00a016(9), 1157\u20131168 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"41_CR13","first-page":"405","volume":"53","author":"T.F. Lunt","year":"1999","unstructured":"Lunt, T.F.: A survey of intrusion detection techniques. Computer and Security\u00a0(53), 405\u2013418 (1999)","journal-title":"Computer and Security"},{"issue":"8","key":"41_CR14","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/345124.345152","volume":"43","author":"J. McCarthy","year":"2000","unstructured":"McCarthy, J.: Phenomenal data mining. Commun. ACM\u00a043(8), 75\u201379 (2000)","journal-title":"Commun. ACM"},{"key":"41_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1007\/BFb0020294","volume-title":"Artificial Neural Networks - ICANN\u201997","author":"Y. Moreau","year":"1997","unstructured":"Moreau, Y., Verrelst, H., Vandewalle, J.: Detection of mobile phone fraud using supervised neural networks: A first prototype. In: Gerstner, W., Hasler, M., Germond, A., Nicoud, J.-D. (eds.) ICANN 1997. LNCS, vol.\u00a01327, pp. 1065\u20131070. Springer, Heidelberg (1997)"},{"key":"41_CR16","unstructured":"Myers, Myers: Probability and Statistics for Engineers and Scientists, 6th edn. Prentice Hall, Englewood Cliffs"},{"key":"41_CR17","unstructured":"Pedrosa, A., Gama, S.: Introdu\u00e7\u00e3o Computacional a Probabilidade e Estatistica, Porto Editora (2004)"},{"key":"41_CR18","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1145\/312129.312303","volume-title":"Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining","author":"S. Rosset","year":"1999","unstructured":"Rosset, S., Murad, U., Neumann, E., Idan, Y., Pinkas, G.: Discovery of fraud rules for telecommunications challenges and solutions. In: Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 409\u2013413. ACM Press, New York (1999)"},{"key":"41_CR19","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1142\/9789812813312_0008","volume-title":"Business Applications of Neural Networks","author":"J. Shawe-Taylor","year":"2000","unstructured":"Shawe-Taylor, J., Howker, K., Gosset, P., Hyland, M., Verrelst, H., Moreau, Y., Stoermann, C., Burge, P.: Novel techniques for profiling and fraud detection in mobile telecommunications. In: Business Applications of Neural Networks, pp. 113\u2013139. World Scientific, Singapore (2000)"},{"key":"41_CR20","doi-asserted-by":"crossref","unstructured":"Taniguchi, M., Haft, M., Hollmen, J., Tresp, V.: Fraud detection in communications networks using neural and probabilistic methods. In: Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 1998), vol.\u00a02, pp. 1241\u20131244 (1998)","DOI":"10.1109\/ICASSP.1998.675496"},{"key":"41_CR21","volume-title":"Data Mining in Telecommunications","author":"G.M. Weiss","year":"2004","unstructured":"Weiss, G.M.: Data Mining in Telecommunications. Kluwer, Dordrecht (2004)"},{"key":"41_CR22","unstructured":"Weisstein, E.W.: Poisson distribution. From MathWorld\u2013A Wolfram Web Resource (2006), http:\/\/mathworld.wolfram.com\/PoissonDistribution.html"}],"container-title":["Lecture Notes in Computer Science","Advances in Data Mining. Applications in Medicine, Web Mining, Marketing, Image and Signal Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11790853_41.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T21:38:07Z","timestamp":1736458687000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11790853_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540360360","9783540360377"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/11790853_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}