Reference5 articles.
1. Becker RA, Volinsky C, Wilks AR (2010) Fraud detection at AT&T: a historical perspective. Technometrics 52(1):20–33
2. Cortes C, Pregibon D (2001) Signature-based methods for data streams. Data Min Knowl Discov 5(3):167–182
3. Hill S, Agarwal D, Bell R, Volinsky C (2006) Building an effective representation for dynamic networks. J Comput Graph Stat 15(3):584–608
4. Isaacson W (2011) Steve Jobs: the exclusive biography. Little Brown Book, London
5. Phua C, Lee V, Smith K, Gayler R (2005) A comprehensive survey of data mining-based fraud detection research. Artif Intell Rev
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献