{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T10:04:57Z","timestamp":1743156297304,"version":"3.40.3"},"publisher-location":"New Delhi","reference-count":12,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132216643"},{"type":"electronic","value":"9788132216650"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-81-322-1665-0_81","type":"book-chapter","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T10:47:18Z","timestamp":1387277238000},"page":"805-815","source":"Crossref","is-referenced-by-count":5,"title":["Online Hybrid Model for Online Fraud Prevention and Detection"],"prefix":"10.1007","author":[{"given":"Ankit","family":"Mundra","sequence":"first","affiliation":[]},{"given":"Nitin","family":"Rakesh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"81_CR1","first-page":"65","volume":"4","author":"B Prasad","year":"2003","unstructured":"Prasad, B.: Intelligent techniques for E-Commerce. J. Electron. Commer. Res. 4(2), 65\u201371 (2003)","journal-title":"J. Electron. Commer. Res."},{"key":"81_CR2","unstructured":"U.S. Commerce Department: Forrester Research, Internet Retailer, ComScore., http:\/\/www.statisticbrain.com\/total-online-sales\/"},{"issue":"4","key":"81_CR3","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.cosrev.2009.09.001","volume":"3","author":"F Donga","year":"2009","unstructured":"Donga, F., Shatza, S.M., Xub, H.: Combating online in-auction fraud: clues, techniques and challenges. Comput. Sci. Rev. 3(4), 245\u2013258 (2009)","journal-title":"Comput. Sci. Rev."},{"key":"81_CR4","unstructured":"National White Collar crime center: Report on Internet fraud, www.nw3c.org\/docs\/whitepapers\/internet_fraud.pdf?sfvrsn=7, June 2008"},{"key":"81_CR5","unstructured":"Chui, K., Xwick, R.: Auction on the Internet: A Preliminary Study, http:\/\/repository.ust.hk\/dspace\/handle\/1783.1\/1035, July 2008"},{"key":"81_CR6","unstructured":"Wang, W.L., Hidv\u00e8gi, Z., Whinston, A.B.: Shill Bidding in English Auctions, Technical report, Emory University, http:\/\/oz.stern.nyu.edu\/seminar\/fa01\/1108.pdf (2001)"},{"key":"81_CR7","unstructured":"Wang, W.L., Hidv\u00e8gi, Z., Whinston, A.B.: Shill Bidding in Multi-Round Online Auctions. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences, Jan 2002"},{"key":"81_CR8","unstructured":"Porter, R., Shoham, Y.: On cheating in sealed-bid auctions. J. Decis. Support Syst. Special issue of the fourth ACM Conference on Electronic Commerce, 39(1), 41\u201354 (2005)"},{"key":"81_CR9","doi-asserted-by":"crossref","unstructured":"Trevathan, J., Read, W.: Detecting Collusive Shill Bidding. In: Proceedings of International Conference on Information Technology: New Generations, pp. 799\u2013808 (2007)","DOI":"10.1109\/ITNG.2007.74"},{"issue":"3","key":"81_CR10","first-page":"62","volume":"3","author":"SP Singh","year":"2011","unstructured":"Singh, S.P., Shukla, S.S.P., Rakesh, N., Tyagi, V.: Problem reduction in online payment system using hybrid model. Int. J. Manag. Inf. Technol. 3(3), 62\u201371 (2011)","journal-title":"Int. J. Manag. Inf. Technol."},{"issue":"1","key":"81_CR11","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/TDSC.2007.70228","volume":"5","author":"A Srivastava","year":"2008","unstructured":"Srivastava, A., Kundu, A., Sural, S., Majumdar, A.K.: Credit card fraud detection using hidden Markov model. IEEE Trans. Dependable Secure Comput. 5(1), 1062\u20131066 (2008)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"81_CR12","unstructured":"Internet Crime Complain Center: Internet Crime Report, 2004\u20132011, http:\/\/www.ic3.gov\/media\/annualreports.aspx"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Computing, Networking, and Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-1665-0_81","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T10:20:14Z","timestamp":1605608414000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-81-322-1665-0_81"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9788132216643","9788132216650"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-1665-0_81","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}