- Home
- Publications
- Publication Search
- Publication Details
Title
Nature-Inspired Techniques in the Context of Fraud Detection
Authors
Keywords
-
Journal
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND RE
Volume 42, Issue 6, Pages 1273-1290
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Online
2012-12-22
DOI
10.1109/tsmcc.2012.2215851
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Developing New Fitness Functions in Genetic Programming for Classification With Unbalanced Data
- (2011) U. Bhowan et al. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS
- An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming
- (2010) Shingo Mabu et al. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND RE
- The use of computational intelligence in intrusion detection systems: A review
- (2009) Shelly Xiaonan Wu et al. APPLIED SOFT COMPUTING
- A survey of learning-based techniques of email spam filtering
- (2009) Enrico Blanzieri et al. ARTIFICIAL INTELLIGENCE REVIEW
- A particle swarm based hybrid system for imbalanced medical data sampling
- (2009) Pengyi Yang et al. BMC GENOMICS
- Evolutionary Undersampling for Classification with Imbalanced Datasets: Proposals and Taxonomy
- (2009) Salvador García et al. EVOLUTIONARY COMPUTATION
- Medical Image Segmentation Using Genetic Algorithms
- (2009) U. Maulik IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE
- A Survey on the Application of Genetic Programming to Classification
- (2009) P.G. Espejo et al. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND RE
- Credit card fraud detection: A fusion approach using Dempster–Shafer theory and Bayesian learning
- (2009) Suvasini Panigrahi et al. Information Fusion
- Reducing internet auction fraud
- (2008) Bezalel Gavish et al. COMMUNICATIONS OF THE ACM
- Building network attack graph for alert causal correlation
- (2008) Shaojun Zhang et al. COMPUTERS & SECURITY
- Feedback linearization control of a two-link robot using a multi-crossover genetic algorithm
- (2008) Jian Liung Chen et al. EXPERT SYSTEMS WITH APPLICATIONS
- Application of artificial neural networks in the diagnosis of urological dysfunctions
- (2008) David Gil et al. EXPERT SYSTEMS WITH APPLICATIONS
- Association rules applied to credit card fraud detection
- (2008) D. Sánchez et al. EXPERT SYSTEMS WITH APPLICATIONS
- Credit Card Fraud Detection Using Hidden Markov Model
- (2008) A. Srivastava et al. IEEE Transactions on Dependable and Secure Computing
- AdaBoost-Based Algorithm for Network Intrusion Detection
- (2008) Weiming Hu et al. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS
- A hybrid artificial immune system and Self Organising Map for network intrusion detection
- (2008) Simon T. Powers et al. INFORMATION SCIENCES
- Using genetic algorithms to select most predictive protein features
- (2008) Andrew Kernytsky et al. PROTEINS-STRUCTURE FUNCTION AND BIOINFORMATICS
- Evolutionary rule-based systems for imbalanced data sets
- (2008) Albert Orriols-Puig et al. SOFT COMPUTING
- Financial time series prediction using polynomial pipelined neural networks
- (2007) Abir Jaafar Hussain et al. EXPERT SYSTEMS WITH APPLICATIONS
- A fast numerical algorithm for the estimation of diffusion model parameters
- (2007) Andreas Voss et al. JOURNAL OF MATHEMATICAL PSYCHOLOGY
- Intrusion detection in computer networks by a modular ensemble of one-class classifiers
- (2006) Giorgio Giacinto et al. Information Fusion
Add your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload NowBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started