參考文獻 |
[1] Agrawal, Rakesh and Ramakrishnan Srikant, “Fast Algorithms for Mining Association Rules,” Proc. of the 20th VLDB Conference Santiago, Chile, 1994.
[2] Agrawal, Rakesh and R. Srikant, “Mining Sequential Patterns,” Proc. of the Int’l Conference on Data Engineering, Taipei, Taiwan, March 1995.
[2] Agrawal, Rakesh and R. Srikant, “Mining Sequential Patterns,” Proc. of the Int’l Conference on Data Engineering, Taipei, Taiwan, March 1995.
[2] Agrawal, Rakesh and R. Srikant, “Mining Sequential Patterns,” Proc. of the Int’l Conference on Data Engineering, Taipei, Taiwan, March 1995.
[2] Agrawal, Rakesh and R. Srikant, “Mining Sequential Patterns,” Proc. of the Int’l Conference on Data Engineering, Taipei, Taiwan, March 1995.
[2] Agrawal, Rakesh and R. Srikant, “Mining Sequential Patterns,” Proc. of the Int’l Conference on Data Engineering, Taipei, Taiwan, March 1995.
[7] Fawcett, T. and F. Provost, “Adaptive Fraud Detection,” Data Mining and Knowledge Discovery, Vol. 1, No. 1, pp. 291-316, 1997.
[8] Fawcett, T. and F. Provost, “Robust Classification Systems for Imprecise Environments,” Proc. Fifteenth Int. Conference on Artificial Intelligence (AAAI-98), 1998
[8] Fawcett, T. and F. Provost, “Robust Classification Systems for Imprecise Environments,” Proc. Fifteenth Int. Conference on Artificial Intelligence (AAAI-98), 1998
[10] Gary, Jim, Adam Bosworth, Andrew Layman and Hamid Pirahesh, “Data Cube: A Relational Aggregation Operator Generalizing Group-By, Cross-Tab, and Sub-Totals,” IEEE 1996.
[10] Gary, Jim, Adam Bosworth, Andrew Layman and Hamid Pirahesh, “Data Cube: A Relational Aggregation Operator Generalizing Group-By, Cross-Tab, and Sub-Totals,” IEEE 1996.
[10] Gary, Jim, Adam Bosworth, Andrew Layman and Hamid Pirahesh, “Data Cube: A Relational Aggregation Operator Generalizing Group-By, Cross-Tab, and Sub-Totals,” IEEE 1996.
[10] Gary, Jim, Adam Bosworth, Andrew Layman and Hamid Pirahesh, “Data Cube: A Relational Aggregation Operator Generalizing Group-By, Cross-Tab, and Sub-Totals,” IEEE 1996.
[14] Howker, Keith, John Shawe-Taylor and Peter Burge, “Detection of Fraud in Mobile Telecommunications,” Information Security Technical Report, Vol. 4, No. 1, 1999, pp. 16-28.
[15] Han, Jiawei and Yongjian Fu, “Discovery of Multiple-Level Association Rules from Large Databases,” Proc. of the 21st VLDB Conference Zurich, Swizerland, 1995.
[16] Kaufman, L. and P. J. rousseeuw, “Finding Groups in Data : An Introduction to Cluster Analysis,” John Wiley and Sons, 1990.
[17] Li, C. S., P. S. Yu, and V. Castelli, “Hierarchy Scan: A Hierarchical Similarity Search Algorithm for Database of Large Sequences,” Proc. 12th Inte’l Conf. Data Eng., Feb. 1996.
[17] Li, C. S., P. S. Yu, and V. Castelli, “Hierarchy Scan: A Hierarchical Similarity Search Algorithm for Database of Large Sequences,” Proc. 12th Inte’l Conf. Data Eng., Feb. 1996.
[20] Quinlan, J. Ross, “Induction of Decision Trees,” Machine learning, Vol.1, pp.81, 1986, pp. 81-106.
[21] Quinlan, J. Ross, “Simplifying Decision Trees,” Int. J. Man-Machine Studies, 27, 1987, pp. 221-234.
[22] Srikant, R. and R. Agrawal, “Mining Quantitative Association Rules in Large Relational Tables,” SIGMOD 1996, pp.1-12.
[23] Stolfo, S., D. Fan, W. Lee, A. Prodromidis and P. Chan, “Credit Card Fraud Detection Using Meta-learning: Issues and Initial Results,” Working Notes AAAI-97, 1997.
[23] Stolfo, S., D. Fan, W. Lee, A. Prodromidis and P. Chan, “Credit Card Fraud Detection Using Meta-learning: Issues and Initial Results,” Working Notes AAAI-97, 1997.
[25] Wheeler, R., S. Aitken, “Multiple algorithms for fraud detection,” Knowledge-Based Systems, Volume: 13, Issue: 2-3, April, 2000, pp. 93-99. |