参考文献
|
-
Elitzur, R.,Sai, , Y.(2010).A Laboratory Study Designed for Reducing the Gap between Information Security Knowledge and Implementation.International Journal of Electronic Commerce Studies,1(1),37-50.
連結:
-
(2015).Data mining and knowledge discovery handbook.Springer.
-
(2009).Encyclopedia of database systems.Springer.
-
NilsonReport. retrieved from: The Nilson Report: https://www.nilsonreport.com/upload/content promo/The Nilson Report 10-17-2016.pdf, October, 2016.
-
Bahnsen, A. C.,Aouada, D.,Stojanovic, A.,Ottersten, B.(2016).Feature engineering strategies for credit card fraud detection.Expert Systems with Applications,51,134-142.
-
Bhattacharyya, S.,Jha, S.,Tharakunnel, K.,Westland, C.(2011).Data mining for credit card fraud: A comparative study.Decision Support Systems,50(3),602-613.
-
Chaudhary, K.,Mallick, B.(2012).Exploration of Data mining techniques in Fraud. Detection: Credit Card.International Journal of Electronics and Computer Science Engineering,1(3),1765-1771.
-
Ganji, V. R.,Mannem, S. N. P.(2012).Credit card fraud detection using anti-k nearest neighbor algorithm.International Journal on Computer Science and Engineering,4(6),1035-1039.
-
Han, H.,Wang, W.,Mao, B.(2005).Borderline-SMOTE: a new over-sampling method in imbalanced datasets learning.Advances in intelligent computing,878-887.
-
Hand, D. J.,Mannila, H.,Smyth, P.(2001).Principles of data mining.MIT Press.
-
D. Jacobe and M. Jones, Consumers Spend More on Weekends, Payday Weeks; Average daily spending is lowest at beginning of work week, (Survey). Gallup Poll News Service, 2009.
-
Jha, S.,Westland, C.(2013).A Descriptive Study of Credit Card Fraud Pattern.Global Business Review,14(3),373-384.
-
Jiang, C.,Song, J.,Liu, G.,Zheng, L.,Luan, W.(2018).Credit Card Fraud Detection: A Novel Approach Using Aggregation Strategy and Feedback Mechanism.IEEE Internet of Things Journal
-
Jose, J.,Kannoorpatti, K.,Shanmugam, B.,Azam, S.,Yeo, K.(2017).A Critical Review of Bitcoins Usage by Cybercriminals.International Conference on Computer Communication and Informatics (ICCCI),India:
-
Kim, J.,Han, J.,Lee, J.(2016).Data Imbalance Problem solving for SMOTE Based Oversampling: Study on Fault Detection Prediction Model in Semiconductor Manufacturing Process.Advanced Science and Technology Letters (Information Technology and Computer Science),133,79-84.
-
Lepoivre, M. R.,Avanzini, C. O.,Bignon, G.,Legendre, L.,Piwele, A. K.(2016).Credit card fraud detection with unsupervised algorithms (Report).Journal of Advances in Information Technology,7(1),34.
-
Liñares-Zegarra, J. M.,Wilson, J. O. S.(2014).Credit card interest rates and risk: new evidence from US survey data.The European Journal of Finance,20(10),892-914.
-
Manlangit, S.,Azam, S.,Shanmugam, B.,Kannoorpatti, K.,Jonkman, M.,Balasubramaniam, A.(2018).An efficient method for detecting fraudulent transactions using classification algorithms on an anonymized credit card dataset.Intelligent Systems Design and Applications,736,418-429.
-
Nadarajan, S.,Ramanujam, B.(2016).Encountering imbalance in credit card fraud detection with metaheuristics.Advances in Natural and Applied Sciences,10(8),33-42.
-
Novaković, J.(2016).Toward optimal feature selection using ranking methods and classification algorithms.Yugoslav Journal of Operations Research,21(1),119-135.
-
Orange Data Mining. Linear Projection. Retrieved from: https://docs.orange.biolab.si/3/visual-programming/widgets/visualize/linearprojection.html
-
V. Powell, Principal Component Analysis. Retrieved from: http://setosa.io/ev/principal-component-analysis/, 2015.
-
Pozzolo, A. D.,Caelen, O.,Borgne, Y. L.,Waterschoot, S.,Bontempi, G.(2014).Learned lessons in credit card fraud detection from a practitioner perspective.Expert Systems with Applications,41(10),4915-4928.
-
Pozzolo, A. D.,Caelen, O.,Johnson, R. A.,Bontempi, G.(2015).Calibrating Probability with Undersampling for Unbalanced Classification.IEEE Symposium Series on Computational Intelligence
-
Prakash, A.,Chandrasekar, C.(2012).A Novel Hidden Markov Model for Credit Card Fraud Detection.International Journal of Computer Applications,59(3),35-41.
-
Prakash, A.,Chandrasekar, C.(2013).A parameter optimized approach for improving credit card fraud detection.International Journal of Computer Science Issues,10(1),360-366.
-
D. Roberts, Variance and Standard Deviation. Retrieved from: https://mathbitsnotebook.com/Algebra1/StatisticsData/STSD.html
-
D. Roberts, Mean Absolute Deviation. Retrieved from: https://mathbitsnotebook.com/Algebra1/StatisticsData/STMAD.html
-
Scott, D. W.(2009).Sturges' rule.Wiley Interdisciplinary Reviews: Computational Statistics,1(3),303-306.
-
Smith, L. I.(2002).,未出版
-
T. Srivastava, Introduction to k-nearest neighbours : Simplified. Retrieved from: https://www.analyticsvidhya.com/blog/2014/10/introduction-k neighbours algorithm-clustering/, 2014.
-
Statistica. e-Commerece. Retrieved from: https://www.statista.com/outlook/243/100/ecommerce/worldwide#, 2018.
-
Weiss, G.(2004).Mining with rarity: A unifying framework.SIGKDD Explorations,6(1),7-19.
-
R. West. Training Set vs. Test Set. Retrieved from: http://content.nexosis.com/blog/training-set-vs.-test-set, 2016.
-
Wold, S.,Esbensen, K.,Geladi, P.(1987).Principal component analysis.Chemometrics and intelligent laboratory systems,2(1-3),37-52.
|