2011
DOI: 10.2139/ssrn.1910468
|View full text |Cite
|
Sign up to set email alerts
|

Application of Anomaly Detection Techniques to Identify Fraudulent Refunds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
1

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 19 publications
0
9
0
1
Order By: Relevance
“…1. Support Vector Machine (SVM): SVMs are familiar with the domain containing ordinary occasions utilizing a single class learning technique (Issa & Vasarhelyi, 2011). It is generally used in one class to detect the anomaly.…”
Section: Classification-basedmentioning
confidence: 99%
See 1 more Smart Citation
“…1. Support Vector Machine (SVM): SVMs are familiar with the domain containing ordinary occasions utilizing a single class learning technique (Issa & Vasarhelyi, 2011). It is generally used in one class to detect the anomaly.…”
Section: Classification-basedmentioning
confidence: 99%
“…The initial stage is to prepare a neural system on the named information occasions and becomes familiar with the typical classes, and afterward, new cases are presented. In any case, the occurrence is dismissed by the neural system, then it is named anomaly (Issa & Vasarhelyi, 2011).…”
Section: Clustering-basedmentioning
confidence: 99%
“…Various aspects of anti-money laundering are currently being investigated. For example, the study of bank risk management (Bauer & Ryser, 2004), the study of the risk theory features (John H. Boyd & Gianni De Nicolo, 2005), consideration of bitcoin user identification in terms of identifying shortcomings in identification and transaction history (Reid & Harrigan, 2011), and studying the algorithms for detecting anomalies in customers' transactions in the field of banking and detecting illegal cash flows (Issa & Vasarhelyi, 2011). Improving public administration in the field of combating money laundering is an area of research for public administration and law professionals (Baranov, 2015;Bashtannyk, 2011).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Its neural network consisted of a hidden layer and the same number of input and output neurons. Outlier detection, classification and clustering methods were discussed in [24].…”
Section: Literature Reviewmentioning
confidence: 99%