{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:30:34Z","timestamp":1743064234303,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":12,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789400758599"},{"type":"electronic","value":"9789400758605"}],"license":[{"start":{"date-parts":[[2012,12,11]],"date-time":"2012-12-11T00:00:00Z","timestamp":1355184000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,12,11]],"date-time":"2012-12-11T00:00:00Z","timestamp":1355184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-94-007-5860-5_69","type":"book-chapter","created":{"date-parts":[[2012,12,10]],"date-time":"2012-12-10T12:00:32Z","timestamp":1355140832000},"page":"575-582","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Detecting SIM Box Fraud Using Neural Network"],"prefix":"10.1007","author":[{"given":"Abdikarim Hussein","family":"Elmi","sequence":"first","affiliation":[]},{"given":"Subariah","family":"Ibrahim","sequence":"additional","affiliation":[]},{"given":"Roselina","family":"Sallehuddin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,12,11]]},"reference":[{"key":"69_CR1","doi-asserted-by":"crossref","unstructured":"Taniguchi M, Haft M, Hollmen J, Tresp V (1998) Fraud detection in communications networks using neural and probabilistic methods. In: Proceedings of the 1998 IEEE international conference on acoustics speech and signal processing, vol 2. IEEE, Los Alamitos, pp 1241\u20131244","DOI":"10.1109\/ICASSP.1998.675496"},{"issue":"7","key":"69_CR2","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1016\/j.knosys.2008.03.026","volume":"21","author":"C Hilas","year":"2008","unstructured":"Hilas C, Mastorocostas P (2008) An application of supervised and unsupervised learning approaches to telecommunications fraud detection. Knowl Based Syst 21(7):721\u2013726","journal-title":"Knowl Based Syst"},{"key":"69_CR3","doi-asserted-by":"crossref","unstructured":"Azgomi NL (2009) A taxonomy of frauds and fraud detection techniques. In: Proceedings of CISTM 2009, Ghaziabad, India, pp 256\u2013267","DOI":"10.1007\/978-3-642-00405-6_28"},{"key":"69_CR4","unstructured":"Telenor GS (2010) Global SIM box detection"},{"key":"69_CR5","unstructured":"Nokia Siemens Neworks Corporation (2008). Battling illegal call operations with fraud management systems"},{"key":"69_CR6","unstructured":"Larose DT (2005) Discovering knowledge in data. John Wiley and Sons, Inc., Hoboken"},{"issue":"7","key":"69_CR7","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/S1361-3723(10)70082-8","volume":"2010","author":"M Ghosh","year":"2010","unstructured":"Ghosh M (2010) Telecoms fraud. Comput Fraud Secur 2010(7):14\u201317","journal-title":"Comput Fraud Secur"},{"key":"69_CR8","volume-title":"Data mining with Microsoft SQL Server 2008","author":"J MacLennan","year":"2009","unstructured":"MacLennan J (2009) Data mining with Microsoft SQL Server 2008. Wiley Publishing Inc, Indianapolis"},{"key":"69_CR9","volume-title":"Java data mining strategy, standard, and practice","author":"EM Mark","year":"2007","unstructured":"Mark EM, Venkayala S (2007) Java data mining strategy, standard, and practice. Diane Cerra, San Francisco"},{"key":"69_CR10","unstructured":"Cortesao L, Martins F, Rosa A, Carvalho P (2005) Fraud management systems in telecommunications: a practical approach. In: Proceeding of ICT, 2005"},{"key":"69_CR11","unstructured":"Pablo A, Este\u2032vez CM, Claudio AP (2005) Subscription fraud prevention in telecommunications using fuzzy rules and neural networks. In: Proceedings of the expert systems with applications. Santiago, Chile, 2005"},{"issue":"7","key":"69_CR12","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1016\/j.knosys.2008.03.026","volume":"21","author":"C Hilas","year":"2008","unstructured":"Hilas C, Mastorocostas P (2008) An application of supervised and unsupervised learning approaches to telecommunications fraud detection. Knowl Based Syst 21(7):721\u2013726","journal-title":"Knowl Based Syst"}],"container-title":["Lecture Notes in Electrical Engineering","IT Convergence and Security 2012"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-5860-5_69","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T08:13:41Z","timestamp":1676794421000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-007-5860-5_69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,11]]},"ISBN":["9789400758599","9789400758605"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-5860-5_69","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2012,12,11]]},"assertion":[{"value":"11 December 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}