2012
DOI: 10.1016/j.knosys.2011.08.018
|View full text |Cite
|
Sign up to set email alerts
|

A probabilistic approach to fraud detection in telecommunications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0
1

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 59 publications
(23 citation statements)
references
References 16 publications
0
22
0
1
Order By: Relevance
“…A practical problem is the selection of the parameters in the model which should be addressed in the future. Furthermore, practical applications (such as [36][37][38][39][40]) are also interesting.…”
Section: Discussionmentioning
confidence: 99%
“…A practical problem is the selection of the parameters in the model which should be addressed in the future. Furthermore, practical applications (such as [36][37][38][39][40]) are also interesting.…”
Section: Discussionmentioning
confidence: 99%
“…Yusoff [16] proposed an approach using Gaussian mixed model (GMM), a probabilistic model which can not only be successfully applied to speech recognition problems but also fraud detection problems. Based on LDA, [9] detects the fraud using a threshold-type classification algorithm. Cahill et al [3] built an adaptive fraud detection framework [5] which used an event-driven approach that assigns fraud scores to detect fraud as it happens, and weighted recent mobile phone calls more heavily than earlier ones.…”
Section: Related Workmentioning
confidence: 99%
“…There have been numerous attempts to detect intrusions in computer systems Kudłacik 2013, 2014) and networks (Fiore et al 2013;Palmieri and Fiore 2010;Palmieri et al 2014;Salem et al 2008;Wang et al 2008) or frauds in telecommunication (Olszewski 2012) as it has also become an important part of human life.…”
Section: Related Work and Critical Remarksmentioning
confidence: 99%