{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:45:58Z","timestamp":1729626358717,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578773","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T17:11:25Z","timestamp":1377709885000},"page":"4-6","source":"Crossref","is-referenced-by-count":12,"title":["Occupational fraud detection through visualization"],"prefix":"10.1109","author":[{"given":"Evmorfia N.","family":"Argyriou","sequence":"first","affiliation":[]},{"given":"Aikaterini A.","family":"Sotiraki","sequence":"additional","affiliation":[]},{"given":"Antonios","family":"Symvonis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2007.4389007"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2013.6578773"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/288392.288399"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/0030-5073(81)90015-5"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/INFVIS.2001.963273"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/PACIFICVIS.2011.5742391"},{"key":"16","first-page":"799","article-title":"Vis4aui: Visual analysis of banking activity networks","author":"didimo","year":"2012","journal-title":"GRAPP\/IVAPP"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/IV.2009.23"},{"key":"14","first-page":"393","article-title":"Visual analysis of financial crimes: [System paper]","author":"giacomo","year":"2010","journal-title":"AVI"},{"journal-title":"Employee Fraud Detection under Real World Conditions","year":"2010","author":"luell","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ivs.9500172"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33191-6_29"},{"key":"3","article-title":"A comprehensive survey of data mining-based fraud detection research","author":"phua","year":"2010","journal-title":"CoRR"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2008.97"},{"key":"2","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1109\/ICNSC.2004.1297040","article-title":"Survey of fraud detection techniques","volume":"2","author":"kou","year":"2004","journal-title":"Proc 2004 IEEE Int Conf Networking Sensing Control"},{"key":"1","doi-asserted-by":"crossref","first-page":"2002","DOI":"10.1214\/ss\/1042727940","article-title":"Statistical fraud detection: A review","volume":"17","author":"bolton","year":"2002","journal-title":"Statistical Science"},{"key":"10","first-page":"143","article-title":"Law: A workbench for approximate pattern matching in relational data","author":"wolverton","year":"2003","journal-title":"IAAI"},{"key":"7","first-page":"1055","article-title":"The nasd regulation advanced detection system (ads)","author":"kirkland","year":"1998","journal-title":"AAAI '98\/IAAI '98"},{"key":"6","first-page":"21","article-title":"The financial crimes enforcement network ai system (fais) identifying potential money laundering from reports of large cash transactions","volume":"16","author":"senator","year":"1995","journal-title":"AI Magazine"},{"key":"5","first-page":"136","article-title":"Restructuring databases for knowledge discovery by consolidation and link formation","author":"goldberg","year":"1995","journal-title":"KDD"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/CIDM.2009.4938645"},{"key":"9","first-page":"363","article-title":"The nasd regulation advanced detection system: Integrating data mining and visualization for break detection in the","author":"senator","year":"0","journal-title":"Nasdaq Stock MarketSM"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/347090.347102"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2013,6,4]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578773.pdf?arnumber=6578773","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,4]],"date-time":"2022-03-04T20:48:59Z","timestamp":1646426939000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578773\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578773","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}