{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:28:06Z","timestamp":1725517686845},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540855019"},{"type":"electronic","value":"9783540855026"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85502-6_38","type":"book-chapter","created":{"date-parts":[[2008,8,28]],"date-time":"2008-08-28T09:40:15Z","timestamp":1219916415000},"page":"562-572","source":"Crossref","is-referenced-by-count":1,"title":["Supporting Fraud Analysis in Mobile Telecommunications Using Case-Based Reasoning"],"prefix":"10.1007","author":[{"given":"Pedro","family":"Almeida","sequence":"first","affiliation":[]},{"given":"Marco","family":"Jorge","sequence":"additional","affiliation":[]},{"given":"Lu\u00eds","family":"Cortes\u00e3o","sequence":"additional","affiliation":[]},{"given":"Filipe","family":"Martins","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Gomes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","doi-asserted-by":"crossref","unstructured":"Burge, P., Shawe-Taylos, J., Cooke, C., Moreau, Y., Preneel, B., Stoermann, C.: Fraud detection and management in mobile telecommunications networks. In: ECSD (1997)","DOI":"10.1049\/cp:19970429"},{"key":"38_CR2","volume-title":"Machine Learning","author":"T.M. Mitchell","year":"1997","unstructured":"Mitchell, T.M.: Machine Learning. McGraw-Hill, New York (1997)"},{"issue":"1","key":"38_CR3","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/AIC-1994-7104","volume":"7","author":"A. Aamodt","year":"1994","unstructured":"Aamodt, A., Plaza, E.: Case\u2013based reasoning: Foundational issues, methodological variations, and system approaches. AI Communications\u00a07(1), 39\u201359 (1994)","journal-title":"AI Communications"},{"key":"38_CR4","volume-title":"Case-Based Reasoning","author":"J. Kolodner","year":"1993","unstructured":"Kolodner, J.: Case-Based Reasoning. Morgan Kaufman, San Francisco (1993)"},{"key":"38_CR5","unstructured":"Cortes\u00e3o, L., Martins, F., Rosa, A., Carvalho, P.: Fraud management systems in telecommunications: a practical approach. In: ICT (2005)"},{"issue":"2-3","key":"38_CR6","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/S0950-7051(00)00050-2","volume":"13","author":"R. Wheeler","year":"2000","unstructured":"Wheeler, R., Aitken, S.: Multiple Algorithms for Fraud Detection. Knowl.-Based Syst.\u00a013(2-3), 93\u201399 (2000)","journal-title":"Knowl.-Based Syst."},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Weiss, G.: Data mining in telecommunications (2005)","DOI":"10.1007\/978-0-387-34555-0"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Rosset, S., Murad, U., Neumann, E., Idan, Y., Pinkas, G.: Discovery of fraud rules for telecommunications challenges and solutions. In: ACM SIGKDD (1999)","DOI":"10.1145\/312129.312303"}],"container-title":["Lecture Notes in Computer Science","Advances in Case-Based Reasoning"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85502-6_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:25:52Z","timestamp":1606166752000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85502-6_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540855019","9783540855026"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85502-6_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}