{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:24:13Z","timestamp":1766298253825},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770008"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77002-2_38","type":"book-chapter","created":{"date-parts":[[2007,11,16]],"date-time":"2007-11-16T10:22:54Z","timestamp":1195208574000},"page":"449-460","source":"Crossref","is-referenced-by-count":7,"title":["Resource-Bounded Fraud Detection"],"prefix":"10.1007","author":[{"given":"Luis","family":"Torgo","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","unstructured":"Acuna, E., Rodriguez, C.: dprep: Data preprocessing and visualization functions for classification. R package version 1.0"},{"key":"38_CR2","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"V. Hodge","year":"2004","unstructured":"Hodge, V., Austin, J.: A survey of outlier detection methodologies. Artificial Intelligence Review\u00a022, 85\u2013126 (2004)","journal-title":"Artificial Intelligence Review"},{"key":"38_CR3","unstructured":"Bolton, R.J., Hand, D.J.: Unsupervised profiling methods for fraud detection. In: Credit Scoring and Credit Control VII (2001)"},{"key":"38_CR4","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Reilly, D.: Credit card fraud detection with a neural network. In: Proc. of the 27th Annual Hawaii Intern. Conf. on System Science. DSS\/Knowledg-Based Systems, vol.\u00a03, pp. 621\u2013630 (1994)","DOI":"10.1109\/HICSS.1994.323314"},{"issue":"3","key":"38_CR5","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1214\/ss\/1042727940","volume":"17","author":"R.J. Bolton","year":"2002","unstructured":"Bolton, R.J., Hand, D.J.: Statistical fraud detection: A review. Statistical Science\u00a017(3), 235\u2013255 (2002)","journal-title":"Statistical Science"},{"key":"38_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-015-3994-4","volume-title":"Identification of Outliers","author":"D. Hawkins","year":"1980","unstructured":"Hawkins, D.: Identification of Outliers. Chapman & Hall, Sydney, Australia (1980)"},{"key":"38_CR7","series-title":"Wiley Series in Probability and Mathematical Statistics","volume-title":"Finding Groups in Data: an introduction to cluster analysis","year":"1990","unstructured":"Kaufman, L., Rousseeuw, P.: Finding Groups in Data: an introduction to cluster analysis. Wiley Series in Probability and Mathematical Statistics. Wiley, Chichester (1990)"},{"key":"38_CR8","first-page":"101","volume":"1","author":"F. Murtagh","year":"1984","unstructured":"Murtagh, F.: Complexities of hierarchic clustering algorithms: state of the art. Computational Statistics Quarterly\u00a01, 101\u2013113 (1984)","journal-title":"Computational Statistics Quarterly"},{"key":"38_CR9","volume-title":"COMPSTAT Lectures 4","author":"F. Murtagh","year":"1985","unstructured":"Murtagh, F.: Multidimensional clustering algorithms. In: COMPSTAT Lectures 4, Physica-Verlag, Wuerzburg (1985)"},{"key":"38_CR10","unstructured":"Knorr, E., Ng, R.: Algorithms for mining distance-based outliers in large datasets. In: Proc. 24th Int. Conf. Very Large Data Bases VLDB, pp. 392\u2013403 (1998)"},{"key":"38_CR11","unstructured":"Ng, R., Han, J.: Efficient and efective clustering method for spatial data mining. In: Proc. of VLDB 1994 (1994)"},{"key":"38_CR12","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1023\/A:1007692713085","volume":"39","author":"K. Nigam","year":"2000","unstructured":"Nigam, K., McCallum, A., Thrun, S., Mitchell, T.: Text classication from labeled and unlabeled documents using em. Machine Learning\u00a039, 103\u2013134 (2000)","journal-title":"Machine Learning"},{"key":"38_CR13","unstructured":"Phua, C., Lee, V., Smith, K., Gayler, R.: A comprehendive survey of data mining-based fraud detection research. Artificial Intelligence Review (submitted)"},{"key":"38_CR14","volume-title":"Computational Geometry: an introduction","author":"F. Preparata","year":"1988","unstructured":"Preparata, F., Shamos, M.: Computational Geometry: an introduction. Springer, Heidelberg (1988)"},{"issue":"3","key":"38_CR15","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1023\/A:1009700419189","volume":"1","author":"T. Fawcett","year":"1997","unstructured":"Fawcett, T., Provost, F.: Adaptive fraud detection. Data Mining and Knowledge Discovery\u00a01(3), 291\u2013316 (1997)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"38_CR16","unstructured":"R Development Core Team R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing (2007) ISBN 3-900051-07-0"},{"key":"38_CR17","doi-asserted-by":"crossref","unstructured":"Breunig, M., Kriegel, H., Ng, R., Sander, J.: Lof: identifying density-based local outliers. In: ACM Int. Conf. on Management of Data, pp. 93\u2013104 (2000)","DOI":"10.1145\/342009.335388"},{"key":"38_CR18","unstructured":"Torgo, L.: Repository of regression data sets, \n                    \n                      http:\/\/www.liaad.up.pt\/~ltorgo\/Regression\/DataSets.html"},{"key":"38_CR19","doi-asserted-by":"crossref","unstructured":"Ward, J.: Hierarchical grouping to optimize an objective function. Journal of the American Statistical Association\u00a058(236) (1963)","DOI":"10.1080\/01621459.1963.10500845"}],"container-title":["Lecture Notes in Computer Science","Progress in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77002-2_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:52:27Z","timestamp":1619506347000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77002-2_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540770008"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77002-2_38","relation":{},"subject":[]}}