Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Li, Xingan
, and
Martti Juhola
.
"
Country crime analysis using the self-organising map, with special regard to economic factors
."
International Journal of Data Mining, Modelling and Management
7, no. 2 (2015).
Li, Xingan
, and
Martti Juhola
.
"
Crime and Its Social Context: Analysis Using the Self-Organizing Map
." In
European Intelligence and Security Informatics Conference
. Uppsala, Sweden , 2013.
Li, Xingan
,
Henry Joutsijoki
,
Jorma Laurikkala
,
Markku Siermala
, and
Martti Juhola
.
"
Homicide and Its Social Context: Analysis Using the Self-Organizing Map
."
Applied Artificial Intelligence An International Journal
29, no. 4 (2015).
Lebichot, Bertrand
,
Fabian Braun
,
Olivier Caelen
, and
Marco Saerens
.
A graph-based, semi-supervised, credit card fraud detection system
In
Complex Networks & Their Applications V. COMPLEX NETWORKS 2016. Studies in Computational Intelligence
. Vol. 693. Cham: Springer, 2016.
Sorournejad, Samaneh
,
Zahra Zojaji
,
Reza Ebrahimi Atani
, and
Amir Hassan Monadjemi
.
A Survey of Credit Card Fraud Detection Techniques: Data and Technique Oriented Perspective
In
Computer Science, Cryptography and Security
. Cornell University , 2016.
Li, Xingan
,
Henry Joutsijoki
,
Jorma Laurikkala
, and
Martti Juhola
.
"
Crime vs. Demographic Factors Revisited: Application of Data Mining Methods
."
Webology
12, no. 1 (2015).
Almendra, Vinicius da Silva
, and
Denis Enachescu
.
"
Using Self-Organizing Maps for Fraud Prediction at Online Auction Sites
." In
15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing
. Timisoara, Romania , 2013.
Jeong, Seong Hoon
,
Hana Kim
,
Youngsang Shin
,
Taejin Lee
, and
Huy Kang Kim
.
"
A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique (결제로그 분석 및 데이터 마이닝을 이용한 이상거래 탐지 연구 조사)
."
Journal of the Korea Institute of Information Security and Cryptology (정보보호학회논문지)
25, no. 6 (2015): 1525-1540.
Mahmud, Mohammad Sultan
,
Phayung Meesad
, and
Sunantha Sodsee
.
"
An evaluation of computational intelligence in credit card fraud detection
." In
International Computer Science and Engineering Conference (ICSEC)
. Chiang Mai, Thailand , 2016.
Li, Xingan
,
Henry Joutsijoki
,
Jorma Laurikkala
, and
Martti Juhola
.
"
GDP growth vs. criminal phenomena: data mining of Japan 1926–2013
."
AI & SOCIETY
33, no. 2 (2018): 261-274.
Falaki, S. O.
,
B. K. Alese
,
O. S. Adewale
,
J. O. Ayeni
,
G. A. Aderounmu
, and
W. O. Ismaila
.
"
Probabilistic Credit Card Fraud Detection System in Online Transactions
."
International Journal of Software Engineering and Its Applications
6, no. 4 (2012).
Almendra, Vinicius
, and
Denis Enachescu
.
"
Using Self-Organizing Maps for Binary Classification With Highly Imbalanced Datasets
."
International Journal of Numerical Analysis and Modeling, Series B
5, no. 3 (2014): 238-254.
Zanin, Massimiliano
,
Miguel Romance
,
Santiago Moral
, and
Regino Criado
.
"
Credit Card Fraud Detection through Parenclitic Network Analysis
."
Complexity
(2018).
Sitek, Albert
, and
Zbigniew Kotulski
.
"
POS-originated transaction traces as a source of contextual information for risk management systems in EFT transactions
."
EURASIP Journal on Information Security
(2018).
Zheng, Lutao
,
Guanjun Liu
,
Chungang Yan
, and
Changjun Jiang
.
"
Transaction Fraud Detection Based on Total Order Relation and Behavior Diversity
."
IEEE Transactions on Computational Social Systems
5, no. 3 (2018).
Taghva, Mohammad Reza
,
Taha Mansouri
,
Kamran Feiz
, and
Babak Akhgar4
.
"
Fraud Detection in Credit Card Transactions; Using Parallel Processing of Anomalies in Big Data
."
Journal of Information Technology Management
8, no. 3 (2016): 477-498.
Barman, Subhas
,
Utpal Pal
,
Asif Sarfaraj
,
Biswajit Biswas
,
Animesh Mahata
, and
Palash Mandal
.
"
A complete literature review on financial fraud detection applying data mining techniques
."
International Journal of Trust Management in Computing and Communications (IJTMCC)
3, no. 4 (2016).
Falaki, S. O.
,
B. K. Alese
, and
W. O. Ismaila
.
"
An update research on credit card on-line transactions
."
International Journal of Economic Development Research and Investment
1, no. 2 & 3 (2010).
Malekpour, Milad
,
Maryam Khademi
, and
Behrouz Minae-Bidgoli
.
"
A Hybrid Data Mining Method for Intrusion and Fraud Detection in E-Banking Systems
."
Journal of Computational Intelligence and Electronic Systems
3, no. 1–6 (2014).
Jans, Mieke
,
Nadine Lybaert
, and
Koen Vanhoof
.
"
Data Mining and Economic Crime Risk Management
." In
Data Mining: Concepts, Methodologies, Tools, and Applications
., 2013.
Triepels, Ron
,
Hennie Daniels
, and
Ronald Heijmans
.
Detection and Explanation of Anomalous Payment Behavior in Real-Time Gross Settlement Systems
In
Enterprise Information Systems, 19th International Conference, ICEIS 2017
. Porto, Portugal, 2017.
Gómez-Restrepo, Jackelyne
, and
Myladis R. Cogollo-Flórez
.
"
Detection of Fraudulent Transactions Through a Generalized Mixed Linear Models
."
Ingeniería y Ciencia
8, no. 16 (2012).
Zandian, Zahra Karimi
, and
Mohammadreza Keyvanpour
.
"
Systematic identification and analysis of different fraud detection approaches based on the strategy ahead
."
International Journal of Knowledge-based and Intelligent Engineering Systems
21, no. 2 (2017): 123-134.
Lebichot, Bertrand
.
Network analysis based on bag-of-paths: classification, node criticality and randomized policies
. Vol. Doctor of Engineering Science. Université catholique de Louvain, 2018.
Triepels, Ron
,
Hennie Daniels
, and
Ronald Heijmans
.
Anomaly Detection in Real-Time Gross Settlement Systems
In
Proceedings of the 19th International Conference on Enterprise Information Systems (ICEIS 2017)
. Vol. 1., 2017.
Pages
« първа
‹ предишна
…
350
351
352
353
354
355
356
357
358
…
следваща ›
последна »
470959 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all