{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:35:28Z","timestamp":1730295328933,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,23]]},"DOI":"10.1109\/seeda-cecnsm57760.2022.9932910","type":"proceedings-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:41:14Z","timestamp":1667526074000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Automated identification of fraudulent financial statements by analyzing data traces"],"prefix":"10.1109","author":[{"given":"Evangelos","family":"Hytis","sequence":"first","affiliation":[{"name":"University of Ioannina,Department of Accounting and Finance,Preveza,Greece"}]},{"given":"Vasileios","family":"Nastos","sequence":"additional","affiliation":[{"name":"University of Ioannina,Department of Informatics and Telecommunications,Arta,Greece"}]},{"given":"Christos","family":"Gogos","sequence":"additional","affiliation":[{"name":"University of Ioannina,Department of Informatics and Telecommunications,Arta,Greece"}]},{"given":"Angelos","family":"Dimitsas","sequence":"additional","affiliation":[{"name":"University of Ioannina,Department of Informatics and Telecommunications,Arta,Greece"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intacc.2011.07.001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S1045-2354(03)00072-8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.21511\/imfi.14(3).2017.10"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1108\/S1475-148820200000023004"},{"issue":"1","key":"ref5","article-title":"Preventing the unpleasant: Fraudulent financial statement detection using financial ratios","volume":"17","author":"Pazarskis","year":"2021","journal-title":"Journal of Operational Risk"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100402"},{"issue":"2","key":"ref7","first-page":"104","article-title":"Forecasting fraudulent financial statements using data mining","volume":"3","author":"Kotsiantis","year":"2006","journal-title":"International journal of computational intelligence"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2018.07.014"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.02.016"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.08.011"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/s40064-016-1707-6"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.05.001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3176288"},{"key":"ref14","first-page":"39","article-title":"Efficiency of machine learning techniques in bankruptcy prediction","volume-title":"2nd International Conference on Enterprise Systems and Accounting","author":"Kotsiantis"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1504\/IJRAM.2008.019309"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.accfor.2013.09.002"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3846\/jbem.2021.13911"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/isaf.303"},{"issue":"6","key":"ref19","first-page":"73","article-title":"Using ants to detect fraudulent financial statements","volume":"2","author":"Katsis","year":"2012","journal-title":"Journal of applied finance and banking"},{"issue":"81","key":"ref20","first-page":"33","article-title":"Evaluation of filter and wrapper methods for feature selection in supervised machine learning","volume":"21","author":"Nnamoko","year":"2014","journal-title":"Age"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1162\/NECO_a_00793"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.26438\/ijcse\/v6i10.7478"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/5254.708428"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.21037\/atm.2016.03.37"},{"key":"ref26","first-page":"403","article-title":"Bayes\u2019 theorem and naive bayes classifier","author":"Berrar","year":"2018","journal-title":"Encyclopedia of Bioinformatics and Computational Biology: ABC of Bioinformatics"},{"issue":"2","key":"ref27","first-page":"128","article-title":"Machine learning classification based on random forest algorithm: A review","volume":"5","author":"Abdulkareem","year":"2021","journal-title":"International Journal of Science and Business"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7161(04)24011-1"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41136-6_5"},{"key":"ref30","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"}],"event":{"name":"2022 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)","start":{"date-parts":[[2022,9,23]]},"location":"Ioannina, Greece","end":{"date-parts":[[2022,9,25]]}},"container-title":["2022 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9932892\/9932894\/09932910.pdf?arnumber=9932910","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T03:54:50Z","timestamp":1706068490000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9932910\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,23]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/seeda-cecnsm57760.2022.9932910","relation":{},"subject":[],"published":{"date-parts":[[2022,9,23]]}}}