{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T06:10:09Z","timestamp":1751695809811,"version":"3.41.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319947785"},{"type":"electronic","value":"9783319947792"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-94779-2_10","type":"book-chapter","created":{"date-parts":[[2018,6,19]],"date-time":"2018-06-19T06:19:57Z","timestamp":1529389197000},"page":"105-115","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Agent-Based Model for Detection in Economic Networks"],"prefix":"10.1007","author":[{"given":"Jo\u00e3o","family":"Brito","sequence":"first","affiliation":[]},{"given":"Pedro","family":"Campos","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Leite","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,20]]},"reference":[{"key":"10_CR1","unstructured":"University of Houston system, Administrative Memorandum, 07.A.04 (2000). http:\/\/www.uh.edu\/af\/universityservices\/policies\/sam\/7InfoServices\/7A4.pdf"},{"issue":"3","key":"10_CR2","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1214\/ss\/1042727940","volume":"17","author":"RJ Bolton","year":"2002","unstructured":"Bolton, R.J., Hand, D.J., Provost, F., Breiman, L.: Statistical fraud detection: a review. Stat. Sci. 17(3), 235\u2013249 (2002)","journal-title":"Stat. Sci."},{"issue":"1","key":"10_CR3","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1108\/13590791211190731","volume":"19","author":"M Button","year":"2012","unstructured":"Button, M., Gee, J., Brooks, G.: Measuring the cost of fraud: an opportunity for the new competitive advantage. J. Financ. Crime 19(1), 65\u201375 (2012)","journal-title":"J. Financ. Crime"},{"issue":"8","key":"10_CR4","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1016\/j.cose.2011.08.004","volume":"30","author":"KKR Choo","year":"2011","unstructured":"Choo, K.K.R.: The cyber threat landscape: challenges and future research directions. Comput. Secur. 30(8), 719\u2013731 (2011)","journal-title":"Comput. Secur."},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.eswa.2016.09.029","volume":"67","author":"AF Colladon","year":"2017","unstructured":"Colladon, A.F., Remondi, E.: Using social network analysis to prevent money laundering. Expert Syst. Appl. 67, 49\u201358 (2017)","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"10_CR6","first-page":"126","volume":"2","author":"V Dheepa","year":"2009","unstructured":"Dheepa, V., Dhanapal, R.: Analysis of credit card fraud detection methods. Int. J. Recent Trends Eng. 2(3), 126\u2013128 (2009)","journal-title":"Int. J. Recent Trends Eng."},{"issue":"4","key":"10_CR7","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1016\/j.eswa.2005.06.024","volume":"29","author":"D Enke","year":"2005","unstructured":"Enke, D., Thawornwong, S.: The use of data mining and neural networks for forecasting stock market returns. Expert Syst. Appl. 29(4), 927\u2013940 (2005)","journal-title":"Expert Syst. Appl."},{"key":"10_CR8","unstructured":"Ezawa, K., Singh, M., Norton, S.: Learning goal-oriented Bayesian networks for telecommunications risk management. In: 13th International Conference on Machine Learning, pp. 139\u2013147 (1996)"},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1023\/A:1007465528199","volume":"29","author":"N Friedman","year":"1997","unstructured":"Friedman, N., Geiger, D., Goldszmidt, M., Provan, G., Langley, P., Smyth, P.: Bayesian network classifiers. Mach. Learn. 29, 131\u2013163 (1997)","journal-title":"Mach. Learn."},{"issue":"2","key":"10_CR10","first-page":"9","volume":"16","author":"RM Hogsett III","year":"1994","unstructured":"Hogsett III, R.M., Radig, W.J.: Employee rime: the cost and some control measures. Rev. Bus. 16(2), 9 (1994)","journal-title":"Rev. Bus."},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Huang, W., An, Y., Du, W.: A multi-agent-based distributed intrusion detection system. In: Advanced Computer Theory and Engineering (ICACTE), vol. 3, pp. 141\u2013143 (2010)","DOI":"10.1109\/ICACTE.2010.5579686"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Macal, C.M., North, M.J.: Tutorial on agent-based modeling and simulation. In: Proceedings of the 37th Conference on Winter Simulation, pp. 2\u201315 (2005)","DOI":"10.1109\/WSC.2006.323040"},{"key":"10_CR13","unstructured":"Institute of Internal Auditors: Managing the business risk of fraud: a practical guide (2008)"},{"issue":"4","key":"10_CR14","doi-asserted-by":"publisher","first-page":"963","DOI":"10.1111\/j.1539-6924.2005.00641.x","volume":"25","author":"M Neil","year":"2005","unstructured":"Neil, M., Fenton, N., Tailor, M.: Using Bayesian networks to model expected and unexpected operational losses. Risk Anal. 25(4), 963\u2013972 (2005)","journal-title":"Risk Anal."},{"issue":"4","key":"10_CR15","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1016\/j.inffus.2008.04.001","volume":"10","author":"S Panigrahi","year":"2009","unstructured":"Panigrahi, S., Kundu, A., Sural, S., Majumdar, A.K.: Credit card fraud detection: a fusion approach using Dempster-Shafer theory and Bayesian learning. Inf. Fusion 10(4), 354\u2013363 (2009)","journal-title":"Inf. Fusion"},{"key":"10_CR16","unstructured":"Phua, C., Lee, V., Smith, K., Gayler, R.: A comprehensive survey of data mining-based fraud detection research. Monash University (2010)"},{"key":"10_CR17","unstructured":"Prodromidis, A.L., Stolfo, S.J.: Agent-based distributed learning applied to fraud detection. In: Sixteenth National Conference on Artificial Intelligence (1999)"},{"issue":"7","key":"10_CR18","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1002\/smj.330","volume":"24","author":"K Schnatterly","year":"2003","unstructured":"Schnatterly, K.: Increasing firm value through detection and prevention of white-collar crime. Strateg. Manag. J. 24(7), 587\u2013614 (2003)","journal-title":"Strateg. Manag. J."},{"issue":"9","key":"10_CR19","doi-asserted-by":"publisher","first-page":"2105","DOI":"10.1016\/j.engappai.2013.04.010","volume":"26","author":"S Shamshirband","year":"2013","unstructured":"Shamshirband, S., Anuar, N.B., Kiah, M.L.M., Patel, A.: An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique. Eng. Appl. Artif. Intell. 26(9), 2105\u20132127 (2013)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"2","key":"10_CR20","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1016\/j.ejor.2006.04.019","volume":"180","author":"L Sun","year":"2007","unstructured":"Sun, L., Shenoy, P.P.: Using Bayesian networks for bankruptcy prediction: some methodological issues. Eur. J. Oper. Res. 180(2), 738\u2013753 (2007)","journal-title":"Eur. J. Oper. Res."},{"key":"10_CR21","unstructured":"Tuyls, K., Maes, S., Vanschoenwinkel, B.: Credit card fraud detection using Bayesian and neural networks. In: Proceedings of the 1st International NAISO Congress on Neuro Fuzzy Technologies, pp. 261\u2013270 (2002)"},{"issue":"3","key":"10_CR22","first-page":"56","volume":"28","author":"M Vatis","year":"2006","unstructured":"Vatis, M.: The next battlefield. Harv. Int. Rev. 28(3), 56 (2006)","journal-title":"Harv. Int. Rev."},{"key":"10_CR23","first-page":"1013","volume-title":"Handbook of Computational Economics","author":"A Wilhite","year":"2006","unstructured":"Wilhite, A.: Economic activity on fixed networks. In: Tesfatsion, L., Judd, K.L. (eds.) Handbook of Computational Economics, vol. 2, pp. 1013\u20131045. Elsevier, Amsterdam (2006)"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Zhu, X.D., Huang, Z.Q., Zhou, H.: Design of a multi-agent based intelligent intrusion detection system. In: 2006 Proceedings of the 1st International Symposium on Pervasive Computing and Applications, pp. 290\u2013295 (2006)","DOI":"10.1109\/SPCA.2006.297585"},{"key":"10_CR25","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198708285.001.0001","volume-title":"Agent-Based Modelling and Network Dynamics","author":"A Namatame","year":"2016","unstructured":"Namatame, A., Chen, S.H.: Agent-Based Modelling and Network Dynamics. Oxford University Press, Oxford (2016)"},{"key":"10_CR26","unstructured":"Wilensky, U.: NetLogo. http:\/\/ccl.northwestern.edu\/netlogo\/. Center for Connected Learning and Computer-Based Modeling, Northwestern University, Evanston, IL (1999)"}],"container-title":["Communications in Computer and Information Science","Highlights of Practical Applications of Agents, Multi-Agent Systems, and Complexity: The PAAMS Collection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-94779-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T05:51:57Z","timestamp":1751694717000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-94779-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319947785","9783319947792"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-94779-2_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"20 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAAMS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Practical Applications of Agents and Multi-Agent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toledo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"paams2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.paams.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}