Publisher
Springer International Publishing
Reference14 articles.
1. Alves, R., et al.: Discovering telecom fraud situations through mining anomalous behavior patterns. In: Proceedings of the DMBA Workshop on the 12th ACM SIGKDD. Citeseer (2006)
2. Becker, R.A., Volinsky, C., Wilks, A.R.: Fraud detection in telecommunications: history and lessons learned. Technometrics 52(1), 20–33 (2010)
3. Hilas, C.S., Mastorocostas, P.A.: An application of supervised and unsupervised learning approaches to telecommunications fraud detection. Knowl. Based Syst. 21(7), 721–726 (2008)
4. Hoaglin, D.C., Iglewicz, B., Tukey, J.W.: Performance of some resistant rules for outlier labeling. J. Am. Statist. Assoc. 81(396), 991–999 (1986)
5. Ibrahim, I.A., Mohammed, I., Saidu, B.: Fraud management system in detecting fraud in cellular telephone networks. Int. J. Innov. Res. Comput. Sci. Technol. (IJIRCST) 3(3), 92–99 (2015)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献