参考文献
|
-
王俊程、邱垂鎮、葛煥元(2005)。以交易記錄的社會網絡結構建立線上拍賣哄抬評價的偵測指標。資訊管理學報,12(4),143-184。
連結:
-
National White Collar Crime Center(NW3C) (2009) , '2008 Internet Crime Report', available at http://www.ic3.gov/media/annualreport/2008_IC3Report.pdf (accessed 1 May 2014)
-
eBay Inc. (1995), 'How Feedback works' , available at http://pages.ebay.com/help/feedback/howitworks.html (accessed 30 December 2016 ).
-
eBay Inc. (2013), '2013 Quarterly Report ', available at http://investor.ebay.com/annuals.cfm (accessed 1 December 2013).
-
National White Collar Crime Center (NW3C) (2011), '2010 Internet Crime Report', Internet Crime Complaint Center, available at http://www.ic3.gov/media/annualreport/2010_IC3Report.pdf (accessed 1 May 2014)
-
DJ Project (2014), 'Java Web Browser', available at http://djproject.sourceforge.net/ns/ (accessed 1 May 2014).
-
National White Collar Crime Center(NW3C) (2012), '2011 Internet Crime Report', Internet Crime Complaint Center, available at http://www.ic3.gov/media/annualreport/2011_IC3Report.pdf (accessed 1 May 2014)
-
Weka (2014),'Weka 3 - Data Mining with Open Source Machine Learning Software in Java', available at http://www.cs.waikato.ac.nz/ml/weka (accessed 1 May 2014).
-
Agrawal, R.,Srikant, R.(1996).Mining Sequential Patterns: Generalizations and Performance improvements.Proceedings of the 5th Int. Conf. Extending Database Technology, EDBT, London, UK, March 25 - 29
-
Agrawal, R.,Srikant, R.(1995).Mining Sequential Patterns.Proceedings of International Conference on Data Engineering,Taipei, Taiwan:
-
Brown, D.E.,Oxford, R.B.(2001).Data Mining Time Series with Applications to Crime Analysis.Proceeding of the 2001 IEEE conference, Tucson, Arizona, USA., Oct.7-10
-
Chandola, V.,Banerjee, A.,Kumar, V.(2009).Anomaly Detection: A Survey.ACM Computing Surveys,41(3)
-
Chang, J.S.,Chang, W.H.(2009).An Early Fraud Detection Mechanism for Online Auctions Based on Phased Modeling.Proceeding the 2009 International Workshop on Mobile Systems E-commerce and Agent Technology (MSEAT 2009), Taipei, Taiwan, December 3-5
-
Chang, J.S.,Wong, H.J.(2011).Selecting appropriate sellers in online auctions through a multi-attribute reputation calculation method.Electronic Commerce Research and Applications,10(2),144-154.
-
Chang, W.,Chang, J.(2011).A Novel Two-Stage Phased Modeling Framework for Early Fraud Detection in Online Auctions.Expert System with Applications,38(9),11244-11260.
-
Chang, W.H.,Chang, J.S.(2010).A Multiple-Phased Modeling Method to Identify Potential Fraudsters in Online Auctions.Proceedings of the 2nd International Conference on Computer Research and Development (ICCRD 2010), Kuala Lumpur, Malaysia., May 7-10
-
Chang, W.H.,Chang, J.S.(2010).An Online Auction Fraud Screening Mechanism for Choosing Trading Partners.Proceeding of 2010 the 2nd International Conference on Education Technology and Computer (ICIEE 2010), Shanghai, China, June 22-24
-
Chang, W.H.,Chang, J.S.(2012).An Effective Early Fraud Detection Method for Online Auctions.Electronic Commerce Research and Applications,11(4),346-360.
-
Chau, D.,Pandit, S.,Faloutsos, C.(2006).Detecting Fraudulent Personalities in Networks of Online Auctioneers.Proceedings of the 10th European conference on Principle and Practice of Knowledge Discovery in Databases, Berlin, Germany, September 18-22
-
Chau, D.H.,Faloutsos, C.(2005).Fraud Detection in Electronic Auction.Proceedings of European Web Mining Forum (EWMF 2005) at ECML/PKDD 2005, Porto, Portugal, October 3-7
-
Chua, C.E.,Wareham, J.(2004).Fighting Internet Auction Fraud: An Assessment and Proposal.Computer,37(10),31-37.
-
Fawcett, T.,Provost, F.(1999).Activity monitoring: noticing interesting changes in behavior.Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,San Diego, California, USA:
-
Gavish, B.,Tucci, C.(2008).Reducing Internet Auction Fraud.Communications of the ACM,51(5),89-97.
-
Goes, P.,Tu, Y.,Tung, A.(2009).Online Auctions Hidden Metrics.Communications of the ACM,52(4),147-149.
-
Ishioka, T.(2005).An expansion of x-means for automatically determining the optimal number of clusters-progressive iterations of k-means and merging of the clusters.Proceedings of fourth IASTED international conference computational intelleigence,Calgery, Alberta, Canada:
-
Kaszuba, T.,Hupa, A.,Wierzbicki, A.(2010).Advanced Feedback Management for Internet Auction Reputation Systems.IEEE Internet Computing,14(5),31-37.
-
Kobayashi, M.,Ito, T.(2007).A transactional relationship visualization system in internet auctions.IEEE Computer Society,248-251.
-
Kobayashi, M.,Ito, T.(2008).A Transactional Relationship Visualization System in Internet Auctions.Electronic Commerce - Studies in Computational Intelligence,110,87-99.
-
Levenshtein, V.I.(1965).Binary codes capable of correcting deletions, insertions, and reversals.Soviet Physics Dokl.,10,707-710.
-
Pandit, S.,Chau, D.,Wang, S.,Faloutsos, C.(2007).Netprobe: a fast and scalable system for fraud detection in online auction networks.Proceedings of the 16th international conference on World Wide Web, Banff, Alberta, Canada, May 8-12
-
Pavlou, P.,Dimoka, A.(2006).The nature and role of feedback text comments in online marketplaces: implications for trust building, price premiums, and seller differentiation.Information Systems Research,17(4),392-414.
-
Pei, J.(2001).PrefixSpan: Mining sequential patterns efficiently by prefixprojected pattern growth.Proceedings of Int. Conf. Data Engineering (ICDE '01), Heidelberg, Germany, April 2-6
-
Pei, J.,Han, J.,Wang, W.(2002).Mining Sequential Patterns with Constraints in Large Databases.Proceedings of the eleventh international conference on Information and knowledge management, McLean, Virginia, USA, Nov. 4-9
-
Pelleg, D.,Moore, A.(2000).X-means: Extending K-means with Efficient Estimation of the Number of Clusters.Proceedings of the 17th International Conference on Machine Learning, San Francisco, CA, USA, June 29-July 2
-
Quinlan, J.R.(1993).C4.5 Programs for machine learning.San Francisco, CA, USA:Morgan Kaufmann.
-
Quinlan, J.R.(1986).Induction of Decision Trees.Machine Learning,1(1),81-106.
-
Schmidt, S.,Steele, R.,Dillon, T.,Chang, E.(2007).Fuzzy trust evaluation and credibility development in multi-agent systems.Applied Soft Computing,7(2),492-505.
-
Selvaraj, C.,Anand, S.(2012).A Survey on Security Issues of reputation Management Systems for Peer-to-Peer Networks.Computer Science Review,6,145-160.
-
Sherchan, Wanita,Nepal, Surya,Paris, C.(2013).A Survey of Trust in Social Networks.ACM Computing Survey,45(4)
-
Tavakolifard, M.,Almeroth, K.C.(2012).Social Computing: An Intersection of recommender Systems, Trust/Reputation Systems, and Social Network.IEEE Network,26(4),53-58.
-
Wang, J.,Chiu, C.(2005).Detecting Online Auction Inflated-Reputation Behaviors using Social Network Analysis.Proceedings of NAACSOS Conference, Indiana, USA, June 26-28
-
Witten, I.,Frank, E.(2005).Data mining: practical machine learning tools and techniques.San Francisco, CA, USA:Mogan Kaufmann.
-
Yu, L.,Liu, H.(2004).Efficient Feature Selection via Analysis of Relevance and Redundancy.Journal of Machine Learning Research,5,1205-1224.
-
Zhang, B.,Zhou, Y.,Faloutsos, C.(2008).Toward a comprehensive model in Internet auction fraud detection.Proceedings of the 41st Annual Hawaii International Conference on System Science, Waikoloa, USA, Jan 7-10
|