{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T16:47:39Z","timestamp":1725814059957},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319138190"},{"type":"electronic","value":"9783319138206"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13820-6_12","type":"book-chapter","created":{"date-parts":[[2014,12,15]],"date-time":"2014-12-15T05:04:51Z","timestamp":1418619891000},"page":"145-160","source":"Crossref","is-referenced-by-count":6,"title":["Detecting Frauds and Money Laundering: A Tutorial"],"prefix":"10.1007","author":[{"given":"Girish Keshav","family":"Palshikar","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1214\/ss\/1042727940","volume":"17","author":"R. Bolton","year":"2002","unstructured":"Bolton, R., Hand, D.: Statistical fraud detection: A review (with discussion). Statistical Science\u00a017, 235\u2013255 (2002)","journal-title":"Statistical Science"},{"key":"12_CR2","unstructured":"Phua, C., Lee, V., Smith, K., Gayler, R.: A comprehensive survey of data mining-based fraud detection research. In: Tech. Report, Clayton School of Information Technology, Monash University, 1\u201327 (2005)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Yue, D., Wu, X., Wang, Y., Li, Y., Chu, C.H.: A review of data mining-based financial fraud detection research. In: Int. Conference on Wireless Communications, Networking and Mobile Computing, pp. 5519\u20135522 (2007)","DOI":"10.1109\/WICOM.2007.1352"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Mantone, P.S.: Using Analytics to Detect Possible Fraud: Tools and Techniques. Wiley (2013)","DOI":"10.1002\/9781118715789"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Spann, D.: Fraud Analytics: Strategies and Methods for Detection and Prevention. Wiley (2013)","DOI":"10.1002\/9781118284049"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Subramanian, R.: Bank Fraud: Using Technology to Combat Losses. Wiley and SAS Business Series (2014)","DOI":"10.1002\/9781118886168"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Dorrell, D.D., Gadawski, G.A.: Financial Forensics Body of Knowledge. Wiley (2012)","DOI":"10.1002\/9781119200734"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Nigrini, M.: Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations. Wiley (2011)","DOI":"10.1002\/9781118386798"},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1111\/1539-6975.00023","volume":"69","author":"S. Viaene","year":"2002","unstructured":"Viaene, S., Derrig, R.A., Baesens, B., Dedene, G.: A comparison of state-of-the-art classification techniques for expert automobile insurance claim fraud detection. Journal of Risk and Insurance\u00a069, 373\u2013421 (2002)","journal-title":"Journal of Risk and Insurance"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1111\/1539-6975.00024","volume":"69","author":"S. Tennyson","year":"2002","unstructured":"Tennyson, S., Salsas-Forn, P.: Claims auditing in automobile insurance: Fraud detection and deterrence objectives. Journal of Risk and Insurance\u00a069, 289\u2013308 (2002)","journal-title":"Journal of Risk and Insurance"},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1109\/TKDE.2004.1277822","volume":"16","author":"S. Viaene","year":"2004","unstructured":"Viaene, S., Derrig, R., Dedene, G.: A case study of applying boosting naive bayes to claim fraud diagnosis. IEEE Transactions on Knowledge and Data Engineering\u00a016, 612\u2013620 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"12_CR12","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1007730.1007738","volume":"6","author":"C. Phua","year":"2004","unstructured":"Phua, C., Alahakoon, D., Lee, V.: Minority report in fraud detection: classification of skewed data. SIGKDD Explorations Newsletter\u00a06, 50\u201359 (2004)","journal-title":"SIGKDD Explorations Newsletter"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Donoho, S.: Early detection of insider trading in option markets. In: Proc. of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD04), pp. 420\u2013429 (2004)","DOI":"10.1145\/1014052.1014100"},{"key":"12_CR14","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s10618-007-0076-8","volume":"16","author":"G.K. Palshikar","year":"2008","unstructured":"Palshikar, G.K., Apte, M.: Collusion set detection using graph clustering. Data Mining and Knowledge Discovery\u00a016, 135\u2013164 (2008)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Huang, M.L., Liang, J., Nguyen, Q.V.: A visualization approach for frauds detection in financial market. In: Proc. 13th Int. Conference on Information Visualisation, pp. 197\u2013202 (2009)","DOI":"10.1109\/IV.2009.23"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Palshikar, G., Apte, M.: Financial security against money laundering: A survey. In: Akhgar, B., Arabnia, H.R. (eds.) Emerging Trends in Information and Communication Technologies Security,\u00a0ch. 36, pp. 577\u2013590. Elsevier (Morgan Kaufman) (2013)","DOI":"10.1016\/B978-0-12-411474-6.00036-0"},{"key":"12_CR17","unstructured":"Madinger, J.: Money Laundering: A guide for criminal investigators, 3\/e. CRC Press (2012)"},{"key":"12_CR18","unstructured":"Truman, E., Reuter, P.: Chasing dirty money: Progress on anti-money laundering. Peterson Institute (2004)"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Turner, J.E.: Money laundering prevention: Deterring, detecting, and resolving financial fraud. Wiley (2011)","DOI":"10.1002\/9781119200604"},{"key":"12_CR20","first-page":"21","volume":"16","author":"T.E. Senator","year":"1995","unstructured":"Senator, T.E., Goldberg, H.G., Wooton, J., Cottini, M.A., Khan, A.F.U., Klinger, C.D., et al.: The financial crimes enforcement network AI system (FAIS): Identifying potential money laundering from reports of large cash transactions. AI Magazine\u00a016, 21\u201339 (1995)","journal-title":"AI Magazine"},{"key":"12_CR21","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1198\/jasa.2009.ap07625","volume":"104","author":"X. Deng","year":"2009","unstructured":"Deng, X., Joseph, V.R., Sudjianto, A., Wu, J.: Active learning via sequential design with applications to detection of money laundering. Journal of American Statistics Association\u00a0104, 969\u2013981 (2009)","journal-title":"Journal of American Statistics Association"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Salerno, J.J., Yu, P.S.: Applying data mining in investigating money laundering crimes. In: Proc. SIGKDD 2003, pp. 747\u2013772 (2003)","DOI":"10.1145\/956841.956851"},{"key":"12_CR23","unstructured":"Michalak, K., Korczak, J.: Graph mining approach to suspicious transaction detection. In: Proc. Federated Conference on Computer Science and Information Systems, pp. 69\u201375 (2011)"},{"key":"12_CR24","unstructured":"Moll, L.: Anti money laundering under real world conditions-Finding relevant patterns. MS thesis, Department of Informatics: University of Zurich (2009)"},{"key":"12_CR25","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1057\/palgrave.ivs.9500172","volume":"7","author":"R. Chang","year":"2008","unstructured":"Chang, R., Lee, A., Ghoniem, M., Kosara, R., Ribarsky, W., Yang, J., et al.: Scalable and interactive visual analysis of financial wire transactions for fraud detection. Information Visualization\u00a07, 63\u201376 (2008)","journal-title":"Information Visualization"},{"key":"12_CR26","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/986213.986239","volume":"47","author":"J.S. Zdanowicz","year":"2004","unstructured":"Zdanowicz, J.S.: Detecting money laundering and terrorist financing via data mining. Communications of the ACM\u00a047, 53\u201355 (2004)","journal-title":"Communications of the ACM"},{"key":"12_CR27","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/MIS.2004.1","volume":"19","author":"J. Kingdon","year":"2004","unstructured":"Kingdon, J.: AI fights money laundering. IEEE Intellent Systems\u00a019, 87\u201389 (2004)","journal-title":"IEEE Intellent Systems"},{"key":"12_CR28","unstructured":"Bolton, R.J., Hand, D.J., David, J.H.: Unsupervised profiling methods for fraud detection. In: Proc. Credit Scoring and Credit Control VII, pp. 5\u20137 (2001)"},{"key":"12_CR29","unstructured":"Zengan, G.: Application of cluster based local outlier factor algorithm in anti money laundering. In: Proc. Int. Conference on Management and Service Science (MASS 2009), pp. 1\u20134 (2009)"},{"key":"12_CR30","doi-asserted-by":"crossref","unstructured":"Ju, C., Zheng, L.: Research on suspicious financial transactions recognition based on privacy preserving of classification algorithm. In: Proc. 1st Int. Workshop on Education Technology and Computer Science (ETCS 2009), pp. 525\u2013528 (2009)","DOI":"10.1109\/ETCS.2009.378"},{"key":"12_CR31","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1108\/13685200710746875","volume":"10","author":"Z. Gao","year":"2007","unstructured":"Gao, Z., Ye, M.: A framework for data mining-based anti-money laundering research. Journal of Money Laundering Control\u00a010, 170\u2013179 (2007)","journal-title":"Journal of Money Laundering Control"}],"container-title":["Lecture Notes in Computer Science","Big Data Analytics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13820-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T01:09:31Z","timestamp":1559092171000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-13820-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319138190","9783319138206"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13820-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}