“…The detection of irregular users through computational intelligence has been treated by many authors with several approaches. The development of intelligent systems has been an alternative and such systems have included techniques as artificial neural networks (ANNs) (Markoč, Hlupić, & Basch, 2011;Zheng, Yang, Niu, Dai, & Zhou, 2018), principle component analysis (PCA) (Singh, Bose, & Joshi, 2017), fuzzy models (Viegas, & Viera, 2017;Nagi et al, 2011), data mining (Chen et al, 2014) and support vector machines (SVMs) (Nagi J. et al, 2010;Pereira et al, 2016).…”