{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:57:39Z","timestamp":1730224659885,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/his.2014.7086178","type":"proceedings-article","created":{"date-parts":[[2015,4,16]],"date-time":"2015-04-16T19:17:39Z","timestamp":1429211859000},"page":"91-96","source":"Crossref","is-referenced-by-count":3,"title":["Research of customer behavior anomalies in big financial data"],"prefix":"10.1109","author":[{"given":"Dalia","family":"Kriksciuniene","sequence":"first","affiliation":[]},{"given":"Marius","family":"Liutvinavicius","sequence":"additional","affiliation":[]},{"given":"Virgilijus","family":"Sakalauskas","sequence":"additional","affiliation":[]},{"given":"Darius","family":"Tamasauskas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Gartner IT Glossary","year":"2013","key":"3"},{"journal-title":"Fraud Detection","year":"0","key":"2"},{"journal-title":"Banking Trends","article-title":"The financial brand","year":"2013","key":"10"},{"journal-title":"Study of Anomaly Identification Techniques in Large Scale Systems","year":"2012","author":"devi","key":"1"},{"journal-title":"Data Mining in Banking and Finance A Note for Bankers-Technical Note","year":"2006","author":"rajanish","key":"7"},{"journal-title":"Data Mining Concepts and Techniques","year":"2006","author":"han","key":"6"},{"journal-title":"A Practical Guide to Anomaly Detection Implications of Meeting New FFIEC Minimum Expectations for Layered Security","year":"2011","key":"5"},{"journal-title":"Google Trends","year":"2014","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41687-3_5"},{"key":"8","first-page":"263","volume":"5","author":"shaikh","year":"2012","journal-title":"Review on Financial Forecasting Using Neural Network and Data Mining Technique"}],"event":{"name":"2014 14th International Conference on Hybrid Intelligent Systems (HIS)","start":{"date-parts":[[2014,12,14]]},"location":"Kuwait, Kuwait","end":{"date-parts":[[2014,12,16]]}},"container-title":["2014 14th International Conference on Hybrid Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7076842\/7086162\/07086178.pdf?arnumber=7086178","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T18:18:54Z","timestamp":1490379534000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7086178\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/his.2014.7086178","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}