{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:59:40Z","timestamp":1772643580000,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,8]]},"DOI":"10.1109\/ijcnn.2007.4371071","type":"proceedings-article","created":{"date-parts":[[2007,11,6]],"date-time":"2007-11-06T20:35:49Z","timestamp":1194381349000},"page":"863-868","source":"Crossref","is-referenced-by-count":19,"title":["Real Time Credit Card Fraud Detection using Computational Intelligence"],"prefix":"10.1109","author":[{"given":"Jon T. S.","family":"Quah","sequence":"first","affiliation":[]},{"given":"M.","family":"Sriganesh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/08839510050127588"},{"key":"ref11","article-title":"Strategies for Combating Online Fraud and Identity Theft","author":"penn","year":"0","journal-title":"Forrester Research"},{"key":"ref12","article-title":"Payment Card Fraud in a Chip Card World","author":"wihlem","year":"2003","journal-title":"FairIsaac"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/5.58325"},{"key":"ref14","first-page":"48","article-title":"Credit Card Fraud Detection Using Self-Organizing Maps","volume":"18","author":"strizhak","year":"2006","journal-title":"Information and Security"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/0167-9236(94)00046-1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/72.846731"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/0167-9236(95)00033-X"},{"key":"ref18","article-title":"Credit Scoring with a Data Mining Approach Based on Support Vector Machines","author":"huang","year":"2006","journal-title":"Expert Systems with Applications"},{"key":"ref19","first-page":"1092","article-title":"Real-Time Detection of Hidden Traffic Patterns","author":"kodialam lakshman","year":"2004","journal-title":"Proceedings of 12th IEEE Conference on Network Protocols"},{"key":"ref4","article-title":"Understanding Credit Card Frauds","author":"bhatla","year":"2003","journal-title":"Card Business Review"},{"key":"ref3","year":"0","journal-title":"Statistics for General and Online Fraud ePaynews com"},{"key":"ref6","year":"2003","journal-title":"Fraud Brief-AVS and CVM ClearCommerce Corporation"},{"key":"ref5","year":"0","journal-title":"Stock Analysis"},{"key":"ref8","year":"2002","journal-title":"ClearCommerce Fraud Prevention Guide ClearCommerce Corporation"},{"key":"ref7","year":"0","journal-title":"The Evolving Threat of Card Skimming FairIsaac"},{"key":"ref2","year":"0","journal-title":"Online Banking 2005 A Pew Internet Project Data Memo"},{"key":"ref1","year":"1999","journal-title":"Fighting Fraud on the Internet An Advanced Approach Meridian Research"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8640.00202"},{"key":"ref20","year":"0","journal-title":"Combating Money Laundering iFlex Consulting iFlex Solutions Ltd"},{"key":"ref22","year":"0","journal-title":"All Points Protection One Sure Strategy to Control Fraud FairIsaac"},{"key":"ref21","article-title":"The State of Messaging Security: From Email to VoIP","author":"schneck","year":"0","journal-title":"Strategic Development CipherTrust Inc"},{"key":"ref23","first-page":"369","article-title":"Cost-sensitive Classification: Empirical Evaluation of a Hybrid Genetic Decision Tree Induction Algorithm","author":"turney","year":"1995","journal-title":"Journal of AI Research 2"}],"event":{"name":"2007 International Joint Conference on Neural Networks","location":"Orlando, FL, USA","start":{"date-parts":[[2007,8,12]]},"end":{"date-parts":[[2007,8,17]]}},"container-title":["2007 International Joint Conference on Neural Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4370890\/4370891\/04371071.pdf?arnumber=4371071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T21:40:17Z","timestamp":1489614017000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4371071\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,8]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2007.4371071","relation":{},"ISSN":["1098-7576"],"issn-type":[{"value":"1098-7576","type":"print"}],"subject":[],"published":{"date-parts":[[2007,8]]}}}