{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T17:23:55Z","timestamp":1770744235718,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,8]],"date-time":"2017-06-08T00:00:00Z","timestamp":1496880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,8]]},"DOI":"10.1145\/3093742.3093912","type":"proceedings-article","created":{"date-parts":[[2017,6,8]],"date-time":"2017-06-08T14:42:54Z","timestamp":1496932974000},"page":"249-260","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["A Prototype for Credit Card Fraud Management"],"prefix":"10.1145","author":[{"given":"Alexander","family":"Artikis","sequence":"first","affiliation":[{"name":"University of Piraeus and NCSR Demokritos"}]},{"given":"Nikos","family":"Katzouris","sequence":"additional","affiliation":[{"name":"NCSR Demokritos, Athens, Greece"}]},{"given":"Ivo","family":"Correia","sequence":"additional","affiliation":[{"name":"Feedzai Lisbon, Portugal"}]},{"given":"Chris","family":"Baber","sequence":"additional","affiliation":[{"name":"University of Birmingham, UK"}]},{"given":"Natan","family":"Morar","sequence":"additional","affiliation":[{"name":"University of Birmingham, UK"}]},{"given":"Inna","family":"Skarbovsky","sequence":"additional","affiliation":[{"name":"IBM Research, Haifa, Israel"}]},{"given":"Fabiana","family":"Fournier","sequence":"additional","affiliation":[{"name":"IBM Research, Haifa, Israel"}]},{"given":"Georgios","family":"Paliouras","sequence":"additional","affiliation":[{"name":"NCSR Demokritos, Athens, Greece"}]}],"member":"320","published-online":{"date-parts":[[2017,6,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Card Fraud Losses Could Exceed 12B USD By","author":"Aitken R.","year":"2020","unstructured":"R. Aitken. 2016. U.S. Card Fraud Losses Could Exceed 12B USD By 2020. Forbes. (2016). http:\/\/www.forbes.com\/sites\/rogeraitken\/2016\/10\/26\/us-card-fraud-losses-could-exceed-12bn-by-2020\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2012.636616"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2014.2345131"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"A. Artikis O. Etzion Z. Feldman and F. Fournier. 2012. Event processing under uncertainty. In ACM DEBS. 32--43. 10.1145\/2335484.2335488","DOI":"10.1145\/2335484.2335488"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888912000264"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009867806624"},{"key":"e_1_3_2_1_7_1","unstructured":"C. Canudas de Wit F. Garin P. Grandinetti M. Keller J. Lygeros C. Ramesh and M. Schmitt. 2016. Decision-Making III. Deliverable D4.3 of SPEEDD http:\/\/speedd-project.eu\/sites\/default\/files\/D4.3.pdf. (2016)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025596"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"Ivo Correia Fabiana Fournier and Inna Skarbovsky. 2015. The uncertain case of credit card fraud detection. In ACM DEBS. 181--192. 10.1145\/2675743.2771877","DOI":"10.1145\/2675743.2771877"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","unstructured":"G. Cugola and A. Margara. TESLA: a formally defined event specification language. In ACM DEBS. 10.1145\/1827418.1827427","DOI":"10.1145\/1827418.1827427"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187671.2187677"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1202793"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2021068"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"Y. Engel O. Etzion and Z. Feldman. 2012. A Basic Model for Proactive Event-Driven Computing. In ACM DEBS. 107--118. 10.1145\/2335484.2335496","DOI":"10.1145\/2335484.2335496"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007638124237"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","unstructured":"O. Etzion and P. Niblett. 2010. Event Processing in Action. Manning Publication.","DOI":"10.5555\/1894960"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168931.2168943"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the Workshops of EDBT\/ICDT. 104--110","author":"Fournier Fabiana","year":"2015","unstructured":"Fabiana Fournier, Alexander Kofman, Inna Skarbovsky, and Anastasios Skarlatidis. 2015. Extending Event-Driven Architecture for Proactive Systems. In Proceedings of the Workshops of EDBT\/ICDT. 104--110. http:\/\/ceur-ws.org\/Vol-1330\/paper-19.pdf."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2414776"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855075"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"J. Gama and M. M. Gaber. 2007. Learning from data streams. Springer.","DOI":"10.1007\/3-540-73679-4"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1963.10500830"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2034117.2034124"},{"key":"e_1_3_2_1_24_1","first-page":"5","article-title":"Online learning of event definitions","volume":"16","author":"Katzouris Nikos","year":"2016","unstructured":"Nikos Katzouris, Alexander Artikis, and Georgios Paliouras. 2016. Online learning of event definitions. Theory and Practice of Logic Programming (TPLP) 16, 5--6 (2016), 817--833.","journal-title":"Theory and Practice of Logic Programming (TPLP)"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","unstructured":"Alessandro Margara Gianpaolo Cugola and Giordano Tamburrelli. 2014. Learning from the past: automated rule generation for complex event processing. In ACM DEBS. 47--58. 10.1145\/2611286.2611289","DOI":"10.1145\/2611286.2611289"},{"key":"e_1_3_2_1_26_1","volume-title":"Online Structure Learning for Traffic Management. International Conference on Inductive Logic Programming.","author":"Michelioudakis E.","year":"2017","unstructured":"E. Michelioudakis, A. Artikis, and G. Paliouras. 2017. Online Structure Learning for Traffic Management. International Conference on Inductive Logic Programming. (2017)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46128-1_15"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14778\/3007263.3007285"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF03037227"},{"key":"e_1_3_2_1_30_1","unstructured":"A. Paino. 2015. Large Scale Decision Forests: Lessons Learned. Sift Science. (2015). https:\/\/engineering.siftscience.com\/large-scale-decision-forests-lessons-learned\/."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.06.008"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-006-5833-1"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","unstructured":"D. S\u00e1nchez M.A. Vila L. Cerda and J. Serrano. 2009. Association rules applied to credit card fraud detection. Expert systems with applications 36 2 (2009) 3630--3640. 10.1016\/j.eswa.2008.02.001","DOI":"10.1016\/j.eswa.2008.02.001"},{"key":"e_1_3_2_1_34_1","first-page":"59","article-title":"Hybrid association rule learning and process mining for fraud detection","volume":"42","author":"Sarno R.","year":"2015","unstructured":"R. Sarno, R. Dustrial Dewandono, T. Ahmad, M. F. Naufal, and F. Sinaga. 2015. Hybrid association rule learning and process mining for fraud detection. IAENG International Journal of Computer Science 42, 2 (2015), 59--72.","journal-title":"IAENG International Journal of Computer Science"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1619258.1619264"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.204"},{"key":"e_1_3_2_1_37_1","first-page":"3","article-title":"Behaviour mining for fraud detection","volume":"39","author":"Xu J.","year":"2007","unstructured":"J. Xu, A. H. Sung, and Q. Liu. 2007. Behaviour mining for fraud detection. Journal of research and practice in Information Technology 39, 1 (2007), 3--18.","journal-title":"Journal of research and practice in Information Technology"}],"event":{"name":"DEBS '17: The 11th ACM International Conference on Distributed and Event-based Systems","location":"Barcelona Spain","acronym":"DEBS '17","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3093742.3093912","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3093742.3093912","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:15Z","timestamp":1750217415000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3093742.3093912"}},"subtitle":["Industry Paper"],"short-title":[],"issued":{"date-parts":[[2017,6,8]]},"references-count":37,"alternative-id":["10.1145\/3093742.3093912","10.1145\/3093742"],"URL":"https:\/\/doi.org\/10.1145\/3093742.3093912","relation":{},"subject":[],"published":{"date-parts":[[2017,6,8]]},"assertion":[{"value":"2017-06-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}