{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T13:55:41Z","timestamp":1752674141257,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T00:00:00Z","timestamp":1614211200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,2,25]]},"DOI":"10.1145\/3452383.3452397","type":"proceedings-article","created":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T18:03:18Z","timestamp":1619460198000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A design methodology for web-based services to detect fraudulent transactions in credit card"],"prefix":"10.1145","author":[{"given":"Debachudamani","family":"Prusti","sequence":"first","affiliation":[{"name":"National Institute of Technology, India"}]},{"given":"Abhishek","family":"Kumar","sequence":"additional","affiliation":[{"name":"National Institute of Technology, India"}]},{"given":"Ingole Shubham","family":"Purusottam","sequence":"additional","affiliation":[{"name":"National Institute of Technology, India"}]},{"given":"Santanu Kumar","family":"Rath","sequence":"additional","affiliation":[{"name":"National Institute of Technology, India"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"2343","article-title":"Unsupervised learning for credit card fraud detection","volume":"4","author":"Agaskar Vikrant","year":"2017","unstructured":"Vikrant Agaskar, Megha Babariya, Shruthi Chandran, and Namrata Giri. 2017. Unsupervised learning for credit card fraud detection. International Research Journal of Engineering and Technology (IRJET) 4, 3(2017), 2343\u20132346.","journal-title":"International Research Journal of Engineering and Technology (IRJET)"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIW.2010.33"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNI.2017.8123782"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/IACC.2017.0038"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.12.030"},{"key":"e_1_3_2_2_6_1","volume-title":"Data mining for credit card fraud: A comparative study. Decision support systems 50, 3","author":"Bhattacharyya Siddhartha","year":"2011","unstructured":"Siddhartha Bhattacharyya, Sanjeev Jha, Kurian Tharakunnel, and J\u00a0Christopher Westland. 2011. Data mining for credit card fraud: A comparative study. Decision support systems 50, 3 (2011), 602\u2013613."},{"key":"e_1_3_2_2_7_1","volume-title":"Proceedings 11th International Conference on Tools with Artificial Intelligence. IEEE, 103\u2013106","author":"Brause R\u00fcdiger","year":"1999","unstructured":"R\u00fcdiger Brause, T Langsdorf, and Michael Hepp. 1999. Neural data mining for credit card fraud detection. In Proceedings 11th International Conference on Tools with Artificial Intelligence. IEEE, 103\u2013106."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/5254.809570"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/987681.987809"},{"key":"e_1_3_2_2_10_1","first-page":"12","article-title":"Machine learning based approach to financial fraud detection process in mobile payment system","volume":"5","author":"Choi Dahee","year":"2017","unstructured":"Dahee Choi and Kyungho Lee. 2017. Machine learning based approach to financial fraud detection process in mobile payment system. IT CoNvergence PRActice (INPRA) 5, 4 (2017), 12\u201324.","journal-title":"IT CoNvergence PRActice (INPRA)"},{"key":"e_1_3_2_2_11_1","volume-title":"WSDL, and UDDI","author":"Curbera Francisco","year":"2002","unstructured":"Francisco Curbera, Matthew Duftler, Rania Khalaf, William Nagy, Nirmal Mukhi, and Sanjiva Weerawarana. 2002. Unraveling the Web services web: an introduction to SOAP, WSDL, and UDDI. IEEE Internet computing 6, 2 (2002), 86\u201393."},{"key":"e_1_3_2_2_12_1","volume-title":"Credit card fraud detection: a realistic modeling and a novel learning strategy","author":"Dal\u00a0Pozzolo Andrea","year":"2017","unstructured":"Andrea Dal\u00a0Pozzolo, Giacomo Boracchi, Olivier Caelen, Cesare Alippi, and Gianluca Bontempi. 2017. Credit card fraud detection: a realistic modeling and a novel learning strategy. IEEE transactions on neural networks and learning systems 29, 8(2017), 3784\u20133797."},{"key":"e_1_3_2_2_13_1","first-page":"176","article-title":"Credit card fraud detection using SVM and Reduction of false alarms","volume":"7","author":"Demla N","year":"2016","unstructured":"N Demla and A Aggarwal. 2016. Credit card fraud detection using SVM and Reduction of false alarms. International Journal of Innovations in Engineering and Technology 7, 2(2016), 176\u2013182.","journal-title":"International Journal of Innovations in Engineering and Technology"},{"key":"e_1_3_2_2_14_1","first-page":"1060","article-title":"Credit card fraud detection using local outlier factor and isolation forest","volume":"7","author":"John Hyder","year":"2019","unstructured":"Hyder John and Sameena Naaz. 2019. Credit card fraud detection using local outlier factor and isolation forest. Int. J. Comput. Sci. Eng. 7, 4 (2019), 1060\u20131064.","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"e_1_3_2_2_15_1","unstructured":"Matjaz\u00a0B Juric. 2010. WS-BPEL 2.0 for SOA Composite applications with oracle SOA Suite 11g. Packt Publishing Ltd."},{"key":"e_1_3_2_2_16_1","volume-title":"Matthew Wiener","author":"Liaw Andy","year":"2002","unstructured":"Andy Liaw, Matthew Wiener, 2002. Classification and regression by randomForest. R news 2, 3 (2002), 18\u201322."},{"key":"e_1_3_2_2_17_1","volume-title":"Proceedings of the 1st international naiso congress on neuro fuzzy technologies. 261\u2013270","author":"Maes Sam","year":"2002","unstructured":"Sam Maes, Karl Tuyls, Bram Vanschoenwinkel, and Bernard Manderick. 2002. Credit card fraud detection using Bayesian and neural networks. In Proceedings of the 1st international naiso congress on neuro fuzzy technologies. 261\u2013270."},{"key":"e_1_3_2_2_18_1","volume-title":"Proceeding of the Fourth International Conference on Knowledge Discovery and Data Mining. 164\u2013168","author":"Philip K","year":"1998","unstructured":"K Philip and SJS Chan. 1998. Toward scalable learning with non-uniform class and cost distributions: A case study in credit card fraud detection. In Proceeding of the Fourth International Conference on Knowledge Discovery and Data Mining. 164\u2013168."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2019.8929372"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"Apapan Pumsirirat and Liu Yan. 2018. Credit card fraud detection using deep learning based on auto-encoder and restricted boltzmann machine. International Journal of advanced computer science and applications 9 1(2018) 18\u201325.","DOI":"10.14569\/IJACSA.2018.090103"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2806420"},{"key":"e_1_3_2_2_22_1","volume-title":"AAAI-97 Workshop on Fraud Detection and Risk Management. 83\u201390","author":"Stolfo Salvatore","year":"1997","unstructured":"Salvatore Stolfo, David\u00a0W Fan, Wenke Lee, Andreas Prodromidis, and P Chan. 1997. Credit card fraud detection using meta-learning: Issues and initial results. In AAAI-97 Workshop on Fraud Detection and Risk Management. 83\u201390."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799979.2800039"},{"volume-title":"the web services specification reference book","author":"Walsh E","key":"e_1_3_2_2_24_1","unstructured":"Aaron\u00a0E Walsh. 2002. Uddi, Soap, and WSDL: the web services specification reference book. Prentice Hall Professional Technical Reference."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0465-0_14"},{"volume-title":"Oracle SOA suite developer\u2019s guide","author":"Wright Matt","key":"e_1_3_2_2_26_1","unstructured":"Matt Wright and Antony Reynolds. 2009. Oracle SOA suite developer\u2019s guide. Packt Publishing Ltd."}],"event":{"name":"ISEC 2021: 14th Innovations in Software Engineering Conference","acronym":"ISEC 2021","location":"Bhubaneswar, Odisha India"},"container-title":["Proceedings of the 14th Innovations in Software Engineering Conference (formerly known as India Software Engineering Conference)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3452383.3452397","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3452383.3452397","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:40Z","timestamp":1750191460000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3452383.3452397"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,25]]},"references-count":26,"alternative-id":["10.1145\/3452383.3452397","10.1145\/3452383"],"URL":"https:\/\/doi.org\/10.1145\/3452383.3452397","relation":{},"subject":[],"published":{"date-parts":[[2021,2,25]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}