{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T13:58:32Z","timestamp":1766066312654,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/cts.2013.6567225","type":"proceedings-article","created":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T16:13:02Z","timestamp":1375373582000},"page":"174-179","source":"Crossref","is-referenced-by-count":14,"title":["Synthetic logs generator for fraud detection in mobile transfer services"],"prefix":"10.1109","author":[{"given":"Chrystel","family":"Gaber","sequence":"first","affiliation":[]},{"given":"Baptiste","family":"Hemery","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Achemlal","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Pasquet","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Urien","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/978-4-431-73167-2_13"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47910-4_21"},{"key":"15","first-page":"235","article-title":"Statistical fraud detection: A review","author":"bolton","year":"2002","journal-title":"Statistical Science"},{"journal-title":"Understanding and Protecting Yourself Against Money Mule Schemes","year":"2011","author":"desantis","key":"16"},{"key":"13","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/3-540-44816-0_11","article-title":"Communities of interest","author":"cortes","year":"2001","journal-title":"Proceedings of the Fourth International Conference on Advances in Intelligent Data Analysis (IDA"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.008"},{"key":"11","first-page":"83","article-title":"Monetary theory and electronic money: Reflections on the kenyan experience","volume":"96 101","author":"jack","year":"2010","journal-title":"The Quarterly Journal of Economics"},{"key":"12","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/978-3-540-31966-5_7","article-title":"Analysis of communities of interest in data networks","author":"aiello","year":"2005","journal-title":"Volume 3431 of Lecture Notes in Computer Science"},{"journal-title":"Scenario Requirements","year":"2011","author":"achemlal","key":"3"},{"key":"2","article-title":"A comprehensive survey of data mining-based fraud detection research","author":"phua","year":"2005","journal-title":"Artificial Intelligence Review"},{"key":"1","article-title":"Unsupervised profiling methods for fraud detection","author":"bolton","year":"2001","journal-title":"Conference on Credit Scoring and Credit Control"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/KDEX.1997.629848"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081969"},{"key":"6","article-title":"Multi agent based simulation (mabs) of financial transactions for anti money laundering (aml)","author":"lopez-rojas","year":"2012","journal-title":"Proceedings of the 10th Nordic Conference on Secure IT Systems"},{"key":"5","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/3-540-36159-6_23","article-title":"A synthetic fraud data generation methodology","author":"lundin","year":"2002","journal-title":"Volume 2513 of Lecture Notes in Computer Science"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254343"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.235"},{"key":"8","volume":"248","author":"ferber","year":"1995","journal-title":"Multi-Agent Systems An Introduction to Distributed Artificial Intelligence"}],"event":{"name":"2013 International Conference on Collaboration Technologies and Systems (CTS)","start":{"date-parts":[[2013,5,20]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2013,5,24]]}},"container-title":["2013 International Conference on Collaboration Technologies and Systems (CTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6558543\/6567186\/06567225.pdf?arnumber=6567225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T13:14:24Z","timestamp":1498050864000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6567225\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/cts.2013.6567225","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}