[1]AGRAWAL A,KUMAR S,MISHRA A K.Implementation of novel approach for credit card fraud detection[C]//Proceedings of International Conference on Computing for Sustainable Global Development.Washington D.C.,USA:IEEE Press,2015:8-11.
[2]BHATTACHARYYA S,JHA S,THARAKUNNEL K,et al.Data mining for credit card fraud:a comparative study[J].Decision Support Systems,2011,50(3):602-613.
[3]SEEJA K R,ZAREAPOOR M.FraudMiner:a novel credit card fraud detection model based on frequent itemset mining[J].Scientific World Journal,2014(2014):1-10.
[4]NATH D M,JAMI S,JOG D.Credit card fraud detection using neural network[J].International Journal of Students Research in Technology & Management,2014,2(2):84-88.
[5]SRIVASTAVA A,KUNDU A,SURAL S,et al.Credit card fraud detection using hidden markov model[J].IEEE Transactions on Dependable and Secure Computing,2007,5(1):37-48.
[6]冯冲.统计方法信息抽取中的若干关键技术研究[D].北京:中国科学技术大学,2005.
[7]朱莎莎,刘宗田,付剑锋,等.基于条件随机场的中文时间短语识别[J].计算机工程,2011,37(15):164-167.
[8]古勇,苏宏业,褚健.循环神经网络建模在非线性预测控制中的应用[J].控制与决策,2000,15(2):254-256.
[9]QUAH J T S,SRIGANESH M.Real-time credit card fraud detection using computational intelligence[J].Expert Systems with Applications,2008,35(4):1721-1732.
[10]谭小彬,王卫平,奚宏生,殷保群.基于隐马尔可夫模型的异常检测[J].小型微型计算机系统,2004,25(8):1546-1549.
[11]AGRAWAL R,GEHRKE J,GINOUULOS D,et al.Automatic subspace clustering of high dimensional data[J].Data Mining and Knowledge Discovery,2005,11(1):25-33.
[12]BHUSARI V,PATIL S.Application of hidden Markov model in credit card fraud detection[J].International Journal of Distributed & Parallel Systems,2011,2(6):33-36.
[13]CHEN Y,TU L.Density-based clustering for real-time stream data[C]//Proceedings of ACM Sigkdd Inter-national Conference on Knowledge Discovery & Data Mining.New York,USA:ACM Press,2007:133-142.
[14]ALI M H,SUNDUS A,QAISER W,et al.Applicative implementation of d-stream clustering algorithm for the real-time data of telecom sector[C]//Proceedings of International Conference on Computer Networks & Information Technology.Washington D.C.,USA:IEEE Press,2011:293-297.
[15]CAVALIN P R,SABOURIN R C,SUEN Y,et al.Evaluation of incremental learning algorithms for HMM in the recognition of alphanumeric characters[J].Pattern Recognition,2009,42(12):3241-3253.
[16]FLOREZ-LARRAHONDO G,BRIDGES S,HANESAN E A.Incremental estimation of discrete hidden Markov models based on a new backward procedure[C]//Proceedings of IEEE National Conference on Artificial Intelligence.Washington D.C.,USA:IEEE Press,2005:758-763.
[17]LEE W,STOLFO S J,MOK K W.A data mining framework for building intrusion detection models[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,1999:120-132.
|