CRO-Guide-to-Machine-Learning

ABOUT THE AUTHOR

Jarryd-lee Mandy is Business Development Manager for Proveni r in the US. He has 6 years of experience in the Financial Technology domain, and holds a business degree in Business Economics and Technology. He has a passion for travel, science, and tech, and on occasion known to be partial to a good whisky on the rocks.

SOURCES 1 Barclays' Security in Payments: A Look into Fraud, Fraud Prevention, & the Future, May 22, 2015 2 https://www.ftc.gov/system/files/documents/reports/consumer-sentinel-network-data-book-january- december-2014/sentinel-cy2014-1.pdf 3 Murdoch, S. Drimer, S. Anderson, R. Bond, M. (2010). Chip and Pin is Broken. Available: http://www.cl.cam.ac.uk/research/security/banking/nopi n/oakland10chipbroken.pdf . 4 Widder, A. Ammon, R. Schaeffer, P. Wolff, C (2008). Combining Discriminant Analysis and Neural networks for Fraud Detection on the Base of Complex Event Processing. In: GECCO , march 04-06, Gaithersburg, USA. pp.n/a. 5 https://www.frbservices.org/files/communications/pdf/research/2013_payment s_study_summary.pdf 6 http://www.infovis-wiki.net/index.php?title=Knowledge_Discovery_in_Databases_(KDD) 7 Bolton, R. Hand, D. (2002): “Statistical fraud detection: A review.(Unsupervised profiling methods for fraud detection)”, Statistical Science, vol. 17 (3): 235-255. 8 G.K. Palshikar, The Hidden Truth – Frauds and Their Control: A Critical Application for Business Intelligence, Intelligent Enterprise, vol. 5, no. 9, 28 May 2002, pp. 46–51. 9 Trybula WJ (1997). "Data mining and knowledge discovery". Annual Review of information Science and Technology 32: 197-229. 10 Decker P (1998). "Data mining's hidden dangers". Banking Strategies, 74(2): 6-14. 11 Tafti, H. A .M. Nikbakht, E. (1993). Neural Networks and Expert Systems: New Horizons in Business Finance Applications. Information Management & Computer Security . 1 (1), 22-28. 12 Jordan, M. I. Bishop, C. M. (1997) 03:1996. In Tucker, A. B. (Ed.) . The Computer Science and Engineering Handbook: CRC Press. 13 Jans, M. Lybaert, N. Vanhoof, K. (2009). A framework for internal fraud risk reduction at IT intergrating business processes: The IFR2 Framework. The International Journal of Digital Accounting Research . 9 (1), 1- 29. 14 Widder, A. Ammon, R. Schaeffer, P. Wolff, C (2008). Combining Discriminant Analysis and Neural networks for Fraud Detection on the Base of Complex Event Processing. In: GECCO , march 04-06, Gaithersburg, USA. pp.n/a. 15 Roberts, S. Penny, W. (1997). Neural Networks: Friend or Foes?. Sensor Review . 17 (1), 64-70. 16 Zadeh, L. (1965). “Fuzzy Sets”, Information and Control, Vol. 8 No. 3, pp 338-353 17 Gonzalez, F. Dasgupta, D (2002). D. An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation, 6(3):281-291 18 Zimmermann, H. (2001). Fuzzy Set Theory and its Applications , Springer. 19 Griesser, J.W. (1992). "Experts among Us", Business Horizons, Vol.35 No. 3, May-June, 77-80. 20 Barr, A. Feigenbaum, E.A. (1982). The Handbook of Artificial Intelligence, WilliamKaufman, Menlo Park, CA, Vol. 2. 21 ACI Worldwide [online]. (2008). Available from: http://www.aciworldwide.com/downloads/EN- NeuralNetworks.pdf. 22 Neal, R. M. (1996) Bayesian Learning for Neural Networks , Lecture Notes in Statistics No. 118 23 Buntine, W. L. Weigend, A. S. (1991) "Bayesian back-propagation", Complex Systems, 5, 603-643. 24 Maes, S. Tuyls, K., Vanschoenwinkel, B. Manderick, B. (2002). Credit Card Fraud Detection using Bayesian and Neural Networks, Proc. of the 1st International NAISO Congress on Neuro Fuzzy Technologies. 25 Phua, C., Alahakoon, D., & V Lee. 2004. ‘Minority Report in Fraud Detection: Classification of Skewed Data’. ACM SIGKDD Explorations: Special Issue on Imbalanced Data Sets , 6; 50-59. 26 http://dl.acm.org/citation.cfm?id=1712801

Made with FlippingBook Digital Publishing Software