{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:58:21Z","timestamp":1760709501384},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/glocom.2017.8254499","type":"proceedings-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T22:50:54Z","timestamp":1516056654000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Invariant Diversity as a Proactive Fraud Detection Mechanism for Online Merchants"],"prefix":"10.1109","author":[{"given":"Roy","family":"Laurens","sequence":"first","affiliation":[]},{"given":"Jusak","family":"Jusak","sequence":"additional","affiliation":[]},{"given":"Cliff C.","family":"Zou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2010.5586154"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.04.110"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23436"},{"key":"ref13","article-title":"Unsupervised profiling methods for fraud detection","author":"bolton","year":"2001","journal-title":"Proc Credit Scoring and Credit Control VII"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70228"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0253"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/252797"},{"journal-title":"Device Fingerprinting","year":"2010","key":"ref17"},{"journal-title":"Friendly Fraud When the Thief is a Friend Family Member or Acquaintance","year":"2010","key":"ref18"},{"key":"ref19","article-title":"Fingerprinting information in JavaScript implementations","author":"mowery","year":"2011","journal-title":"Proceedings of W2SP 2011"},{"journal-title":"MATCH","year":"2016","key":"ref4"},{"journal-title":"Card-not-present fraud in a post-EMV environment combating the fraud spike","year":"2014","author":"conroy","key":"ref3"},{"year":"0","key":"ref6"},{"year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1994.323314"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-008-0116-z"},{"journal-title":"EMV and payment card fraud the impact of EMV on fraud trends","year":"2015","author":"neisen","key":"ref2"},{"journal-title":"2014 Consumer Payments Study","year":"2014","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.1999.809773"},{"journal-title":"Measuring Biological Diversity","year":"2003","author":"magurran","key":"ref20"},{"key":"ref21","article-title":"Using the Mean Absolute Percentage Error for Regression Models","author":"de myttenaere","year":"0","journal-title":"Machine Learning Computation & intelligence"}],"event":{"name":"2017 IEEE Global Communications Conference (GLOBECOM 2017)","start":{"date-parts":[[2017,12,4]]},"location":"Singapore","end":{"date-parts":[[2017,12,8]]}},"container-title":["GLOBECOM 2017 - 2017 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8253768\/8253909\/08254499.pdf?arnumber=8254499","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,20]],"date-time":"2018-02-20T00:15:04Z","timestamp":1519085704000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8254499\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/glocom.2017.8254499","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}