1. Barse, E., Kvarnström, H. and Jonsson, E. (2003), “Synthesizing test data for fraud detection systems”, Proceedings of the 19th Annual Computer Security Applications Conference, pp. 384‐95.
2. Chau, M., Xu, J. and Chen, H. (2002), “Extracting meaningful entities from police narrative reports”, Proceedings of the National Conference on Digital Government Research, Los Angeles, CA, pp. 271‐5.
3. Chen, H. and Lynch, K.J. (1992), “Automatic construction of networks of concepts characterizing document databases”, IEEE Trans. Syst. Man Cybernet, Vol. 22, pp. 885‐902.
4. Chinchor, N.A. (1998), “Overview of MUC‐7/MET‐2”, Proceedings of the Seventh Message Understanding Conference (MUC‐7).
5. Fan, W., Yu, P.S. and Wang, H. (2004), “Mining extremely skewed trading anomalies”, in Bertino, E. et al. (Eds), EDBT 2004, LNCS,Vol. 2992, Springer, Berlin, pp. 801‐10.