1 |
Digieco,http://www.digieco.co.kr/KTFront/report/report_issue_trend_view.action?board_seq=10712&board_id=issue_ trend, Jan. 2016.
|
2 |
BNK Finance Research Institute, http://www.bnkfg.com/download?seq=3632, Sep. 2015.
|
3 |
Kyung Wook Min, http://blog.naver.com/minkyungwook/220800480732, Aug. 2016.
|
4 |
Byung Do Min, http://bdmin.net/220449860352?Redirect=Log&from=postView, Aug. 2015.
|
5 |
Tseng, V.S., Ying, J.C., Huang, C.W., Kao, Y., and Chen, K.T, "FrauDetector: A Graph-Mining-based Framework for Fraudulent Phone Call Detection," Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 2157-2166, Aug. 2015.
|
6 |
Seong Hoon Jeong, Hana Kim, Youngsang Shin, Taejin Lee, and Huy Kang Kim, "A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique," Journal of the Korea Institute of Information Security and Cryptology, vol. 25, no. 6, pp. 1525-1540, Dec. 2015.
DOI
|
7 |
Hilas, Constantinos S., Paris A. Mastorocostas, and Ioannis T. Rekanos. "Clustering of Telecommunications User Profiles for Fraud Detection and Security Enhancement in Large Corporate Networks: A case Study," Applied Mathematics & Information Sciences, vol. 9, no. 4, pp. 1709-1718, Jul. 2015.
|
8 |
Subudhi, Sharmila, and Suvasini Panigrahi. "Quarter-Sphere Support Vector Machine for Fraud Detection in Mobile Telecommunication Networks," Procedia Computer Science, vol. 48, pp. 353-359, 2015.
DOI
|
9 |
Hee Yeon Min, Jin Hyung Park, Dong Hoon Lee, and In Seok Kim, "Outlier Detection Method for Mobile Banking with User Input Pattern and E-finance Transaction Pattern," Journal of Internet Computing and Services, vol. 15, no. 1, pp. 157-170, Fab. 2014.
DOI
|
10 |
Seung-Hyun Kim, Huy Kang Kim, and Eun jin Kim. "A Study on the Improvement of FDS Effectiveness over the Case Analysis on E-commerce Credit-card Fraud-to-sales," Journal of Knowledge Information Technology and Systems (JKITS), vol. 10, no. 6, pp. 723-734, Dec. 2015.
|
11 |
Chengwei Liu, Yixiang Chan, Syed Hasnain Alam Kazmi, and Hao Fu, "Financial Fraud Detection Model: Based on Random Forest," International journal of economics and finance, vol. 7, no. 7, pp. 178-188, Jun. 2015.
DOI
|
12 |
Prakash, A., and C. Chandrasekar, "An optimized multiple semi-hidden markov model for credit card fraud detection," Indian Journal of Science and Technology, vol. 8, no. 2, pp. 165-171, Jan. 2015.
|
13 |
Sahin Yusuf, Serol Bulkan, and Ekrem Duman, "A cost-sensitive decision tree approach for fraud detection," Expert Systems with Applications, vol. 40, no. 15, pp. 5916-5923, 2013.
DOI
|
14 |
RamaKalyani, K., and D. UmaDevi, "Fraud detection of credit card payment system by genetic algorithm," International Journal of Scientific & Engineering Research, vol. 3, no. 7, Jul. 2012.
|
15 |
Vadoodparast, Massoud, and Abdul Razak Hamdan, "Fraudulent Electronic Transaction Detection Using Dynamic KDA Model," International Journal of Computer Science and Information Security, vol. 13, no 3. pp. 90-99, Mar. 2015.
|
16 |
Jae Hoon Park, Huy Kang Kim, and Eun jin Kim, "Effective Normalization Method for Fraud Detection Using a Decision Tree," Journal of The Korea Institute of Information Security & Cryptology, vol. 25, no. 1, pp. 133-146, Feb. 2015.
DOI
|
17 |
Hall. M., Frank. E., Holmes. G., Pfahringer. B., Reutemann. P., and Witten. I.H., "The WEKA data mining software: an update," ACM SIGKDD explorations newsletter, vol. 11, no. 1, pp. 10-18, Jun. 2009.
DOI
|
18 |
The Fact, http://news.tf.co.kr/read/life/1399255.htm, Aug. 2014
|