[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Xu et al., 2006 - Google Patents

Tree based behavior monitoring for adaptive fraud detection

Xu et al., 2006

View PDF
Document ID
11897929989923304716
Author
Xu J
Sung A
Liu Q
Publication year
Publication venue
18th International Conference on Pattern Recognition (ICPR'06)

External Links

Snippet

The general basis for anomaly detection and fraud detection is pattern recognition. An effective online fraud detection system should be able to discover both known and new attacks as early as possible. The detection process should be self-adjustable to allow the …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30533Other types of queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/12Computer systems based on biological models using genetic models
    • G06N3/126Genetic algorithms, i.e. information processing using digital simulations of the genetic system
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2216/00Indexing scheme relating to additional aspects of information retrieval not explicitly covered by G06F17/30 and subgroups
    • G06F2216/03Data mining
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computer systems based on specific mathematical models
    • G06N7/005Probabilistic networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Zhou et al. Deep learning approach for cyberattack detection
Saxena et al. Intrusion detection in KDD99 dataset using SVM-PSO and feature reduction with information gain
US20040128267A1 (en) Method and system for data classification in the presence of a temporal non-stationarity
CN109754258B (en) Online transaction fraud detection method based on individual behavior modeling
CN110348528A (en) Method is determined based on the user credit of multidimensional data mining
Wang et al. On sparse feature attacks in adversarial learning
CN105262715B (en) A kind of abnormal user detection method based on fuzzy time series association mode
Jayakumar et al. Intrusion detection using artificial neural networks with best set of features.
Hossain et al. A differentiate analysis for credit card fraud detection
Xu et al. Tree based behavior monitoring for adaptive fraud detection
Hlaing Feature selection and fuzzy decision tree for network intrusion detection
Sung et al. Behaviour mining for fraud detection
Kavitha et al. Emerging intuitionistic fuzzy classifiers for intrusion detection system
Prasenna et al. Network programming and mining classifier for intrusion detection using probability classification
Ravipati et al. A survey on different machine learning algorithms and weak classifiers based on KDD and NSL-KDD datasets
Venkatesan et al. A comprehensive study in data mining frameworks for intrusion detection
CN110347669A (en) Risk prevention method based on streaming big data analysis
Mathiyalagan et al. An efficient intrusion detection system using improved bias based convolutional neural network classifier
Brifcani et al. Intrusion detection and attack classifier based on three techniques: a comparative study
Thuraisingham et al. Dependable real-time data mining
Sagar et al. Online transaction fraud detection techniques: A review of data mining approaches
Abadeh et al. Computer intrusion detection using an iterative fuzzy rule learning approach
Baig et al. An AODE-based intrusion detection system for computer networks
Sadioura et al. Selection of sub-optimal feature set of network data to implement Machine Learning models to develop an efficient NIDS
Farid et al. Attribute weighting with adaptive NBTree for reducing false positives in intrusion detection