Author:
Kirlidog Melih,Asuk Cuneyt
Reference9 articles.
1. Bigus, J.P. (1996). Data Mining with neural networks. New York: McGraw-Hill.
2. Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys, 41(3), 15/1-15/58.
3. Gill, K.M., Woolley, K.A., & Gill, M. (1994). Insurance fraud: The business as a victim. In M. Gill (Ed.), Crime at work, Vol 1. (pp. 73-82). Leicester: Perpetuity Press.
4. Gill, W. (2009). Fighting fraud with advanced analytics. Canadian Underwriter, September, 28-32.
5. Kumar, V. (2005). Parallel and distributed computing for cybersecurity. IEEE Distributed Systems Online, 6(10), 1-9.
Cited by
72 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献