{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:37:28Z","timestamp":1730299048662,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/stc-csit.2019.8929827","type":"proceedings-article","created":{"date-parts":[[2019,12,13]],"date-time":"2019-12-13T02:11:21Z","timestamp":1576203081000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Intelligent information technology for fraud detection during mobile applications installation"],"prefix":"10.1109","author":[{"given":"Andrii","family":"Yarovyi","sequence":"first","affiliation":[]},{"given":"Tetiana","family":"Polhul","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Fraudlogix Ad Fraud Solutions for Exchanges Networks SSPs & DSPs","year":"0","key":"ref10"},{"journal-title":"Kraken Antibot","year":"0","key":"ref11"},{"journal-title":"AppsFlyer Measure In-App To Grow Your Mobile Business","year":"0","key":"ref12"},{"journal-title":"Adjust","year":"0","key":"ref13"},{"journal-title":"FraudScore FraudScore fights ad fraud using Machine Learning","year":"0","key":"ref14"},{"journal-title":"AppMetrica","year":"0","key":"ref15"},{"key":"ref16","first-page":"60","article-title":"The input data heterogeneities resolution method during mobile applications installation fraud detection","volume":"7","author":"polhul","year":"2018","journal-title":"Visnyk SNU named after V Dal&#x2019; - Severodonetsk SNU named after V Dal'"},{"key":"ref17","first-page":"25","article-title":"Development of an intelligent system for detecting mobile app install fraud","author":"polhul","year":"2019","journal-title":"Proceedings of the IRES 156th International Conference"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.15587\/1729-4061.2019.155060"},{"key":"ref19","first-page":"368","author":"segaran","year":"2008","journal-title":"Programming Collective Intelligence Building Smart Web 2 0 Applications"},{"key":"ref28","article-title":"Prohramnyi modul zboru danykh informatsiynoi tekhnolohiyi","author":"yarovyi","year":"2018","journal-title":"vyiavlennia shakhraistva pry instaliuvanni prohramnykh dodatkiv Cvidotstvo pro reiestratsiu avtorskoho prava na tvir"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342394"},{"key":"ref27","first-page":"320","article-title":"Introducing Data Science: Big data, machine learning, and more, using Python tools","author":"cielen","year":"2016","journal-title":"Manning"},{"journal-title":"ViceROI Catching Click-Spam in Search Ad Networks","year":"0","author":"dave","key":"ref3"},{"key":"ref6","first-page":"55","article-title":"Vyznachennia shakhraiskykh operatsiy pry vstanovlenni mobilnykh dodatkiv z vykorystanniam intelektualnoho analizu danykh","author":"polhul","year":"2016","journal-title":"Suchasni tendentsiyi rozvytku systemnoho prohramuvannia Tezy dopovidei Kyiv"},{"key":"ref29","article-title":"Kompiuterna prohrama &#x201C;Prohramnyi modul vyznachennia skhozhosti korystuvachiv informatsiynoi tekhnolohiyi vyiavlennia shakhraistva pry instaliuvanni prohramnykh dodatkiv","author":"yarovyi","year":"2018","journal-title":"Cvidotstvo pro reiestratsiu avtorskoho prava na tvir"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.31474\/1996-1588-2017-2-25-126-131"},{"journal-title":"Kochava Uncovers Global Ad Fraud Scam","year":"0","key":"ref8"},{"key":"ref7","article-title":"Vyznachennia shakhraiskykh operatsiy pry instaliatsiyi mobilnykh dodatkiv z vykorystanniam intelektualnoho analizu danykh","author":"polhul","year":"2017","journal-title":"Materialy XLVI naukovo-tekhnichnoi konferentsiyi pidrozdiliv VNTU"},{"journal-title":"Our take on mobile fraud detection","year":"0","key":"ref2"},{"journal-title":"TMC Attribution Analytics","year":"0","key":"ref9"},{"key":"ref1","article-title":"Rozrobka metodu vyiavlennia shakhraistva pry instaliuvanni mobilnykh dodatkiv z vykorystanniam intelektualnoho analizu danykh \/\/ Materialy konferentsiyi &#x00AB;XLVII Naukovo-tekhnichna konferentsiya pidrozdiliv Vinnytskoho natsionalnoho tekhnichnoho universytetu (2018)","author":"yarovyi","year":"2018","journal-title":"Vinnytsia"},{"key":"ref20","first-page":"226","article-title":"Matematychna model rekomendatsiynoho servisu na osnovi metodu kolaboratyvnoi filtratsiyi","author":"kiulian","year":"2012","journal-title":"Kompiuterni tekhnolohiyi ta Internet v informatsiynomu suspilstvi"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1117\/12.2501691"},{"key":"ref21","first-page":"400","author":"guido","year":"2016","journal-title":"Introduction to machine learning with Python a guide for data scientists"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886199"},{"key":"ref23","first-page":"574","article-title":"Hands-On Machine Learning with Scikit-Learn and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems","author":"g\u00e9ron","year":"2017","journal-title":"Aur&#x00E9;lien G&#x00E9;ron"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/STC-CSIT.2018.8526631"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.4316\/aece.2008.02010"}],"event":{"name":"2019 IEEE 14th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)","start":{"date-parts":[[2019,9,17]]},"location":"Lviv, Ukraine","end":{"date-parts":[[2019,9,20]]}},"container-title":["2019 IEEE 14th International Conference on Computer Sciences and Information Technologies (CSIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8910522\/8929733\/08929827.pdf?arnumber=8929827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:15:41Z","timestamp":1657854941000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8929827\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/stc-csit.2019.8929827","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}