{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T14:01:35Z","timestamp":1725631295464},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/fskd.2011.6019676","type":"proceedings-article","created":{"date-parts":[[2011,9,22]],"date-time":"2011-09-22T15:43:18Z","timestamp":1316706198000},"page":"801-805","source":"Crossref","is-referenced-by-count":4,"title":["Applying fuzzy decision tree to infer abnormal accessing of insurance customer data"],"prefix":"10.1109","author":[{"given":"Chih-Cheng","family":"Lien","sequence":"first","affiliation":[]},{"given":"Chi-Chuan","family":"Ho","sequence":"additional","affiliation":[]},{"given":"Yu-Ming","family":"Tsai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-908-3"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-005-0032-4"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2005.1548565"},{"journal-title":"A Comparative Study of Three Decision Tree Algorithms Id3 Fuzzy id3 and Probabilistic Fuzzy id3","year":"2005","author":"liang","key":"15"},{"journal-title":"Machine Learning Group","year":"2011","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(94)00229-Z"},{"journal-title":"Why Fuzzy Decision Trees are Good Rankers","year":"2009","author":"hullermeier","key":"14"},{"journal-title":"Risk Management and Insurance","year":"2004","author":"baranoff","key":"11"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.21236\/ADA470450","author":"caralli","year":"2007","journal-title":"Introducing OCTAVE Allegro Improving the Information Security Risk Assessment Process"},{"year":"0","key":"3"},{"journal-title":"Advanced Data Mining Techniques","year":"2008","author":"david","key":"20"},{"journal-title":"C4 5 Programs for Machine Learning","year":"1993","author":"quinlan","key":"2"},{"journal-title":"Mastering Insurance Marketing Insurance Marketing Is Changing Dramatically","year":"2010","author":"kravitz","key":"1"},{"key":"10","article-title":"Applications of data mining methods in the evaluation of client credibility","author":"yang","year":"2008","journal-title":"Applications of Data Mining in E-Business and Finance"},{"key":"7","first-page":"645","article-title":"Information security issue of enterprises adopting the application of cloud computing","author":"tsai","year":"0","journal-title":"Networked Computing and Advanced Information Management (NCM) 2010 Sixth International Conference On 2010"},{"journal-title":"Software Security Technologies A Programmatic Approach","year":"2008","author":"sinn","key":"6"},{"key":"5","article-title":"Deriving candidate technical controls and indicators of insider attack from socio-technical models and data","author":"hanley","year":"0","journal-title":"Software Engineering Institute Technical Report"},{"journal-title":"Data Mining Techniques For Marketing Sales and Customer Relationship Management","year":"2004","author":"michael","key":"4"},{"journal-title":"Applications of Data Mining in E-Business and Finance","year":"2008","author":"soares","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1002\/9780470745830"}],"event":{"name":"2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2011)","start":{"date-parts":[[2011,7,26]]},"location":"Shanghai","end":{"date-parts":[[2011,7,28]]}},"container-title":["2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6012258\/6019624\/06019676.pdf?arnumber=6019676","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,16]],"date-time":"2019-06-16T02:24:58Z","timestamp":1560651898000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6019676\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/fskd.2011.6019676","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}