2018
DOI: 10.1109/tcss.2018.2856910
|View full text |Cite
|
Sign up to set email alerts
|

Transaction Fraud Detection Based on Total Order Relation and Behavior Diversity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 72 publications
(26 citation statements)
references
References 22 publications
0
25
0
1
Order By: Relevance
“…Background transaction security processing is illustrated in Figure 7 and Figure 8. The risk model refers to the random forest algorithm in the literature [19] and the neural network model of transaction fraud detection, as well as behavior detection algorithm [20]. The specific algorithm part will not be analyzed in detail in this article.…”
Section: Business Transaction Security Analysismentioning
confidence: 99%
“…Background transaction security processing is illustrated in Figure 7 and Figure 8. The risk model refers to the random forest algorithm in the literature [19] and the neural network model of transaction fraud detection, as well as behavior detection algorithm [20]. The specific algorithm part will not be analyzed in detail in this article.…”
Section: Business Transaction Security Analysismentioning
confidence: 99%
“…Mengingat maraknya penipuan pada situs e-commerce yang dapat mengakibatkan kerugian finansial yang cukup besar, sebagai konsumen perlu adanya pengetahuan mengenai jenis penipuan yang umum terjadi dan metode pencegahan yang digunakan untuk mendeteksi penipuan agar terhindar dari berbagai kerugian. Beberapa penelitian sebelumnya hanya membahas tentang identifikasi dan metode pencegahan penipuan e-commerce ( Makarti, 2011;Chang & Chang, 2012;Syed & Shabbir, 2013;Valentin, 2013;Caldeira, Brandao, & Pereira, 2014;Leung, Lai, Chen, & Wan, 2014;Massa & Valverde, 2014;Hwang & Lai, 2015;JRana & Baria, 2015;Singh & Singh, 2015;Abdallah, Maarof, & Zainal, 2016;Beránek, Nýdl, & Remeš, 2016;Gerlach, Pavlovic, & Gerlach, 2016;Lima & Pereira, 2016;Yang et al, 2016;Ramadhan & Amelia, 2016;Sun et al, 2017;Prisha, Neo, Ong, & Teo, 2017;Raghava-Raju, 2017;Shaji & Panchal, 2017;Wiralestari, 2017;Renjith, 2018;Weng et al, 2018;Zhao et al, 2018;Zheng et al, 2018); Amasiatu Amiruddin et al, 2019;Carta et al, 2019;Raghavan & Gayar, 2019;Shah et al, 2019;Soomro et al, 2019. Sementara penelitian lainnya lebih fokus pada penipuan sistem pembayaran dan penipuan terkait dengan pelanggan (Keraf & Hidup, 2010;Rofiq & Mula, 2010;Raj & Portia, 2011;Hu, Liu, & Sambamurthy, 2011;…”
Section: Pendahuluanunclassified
“…Zheng et al [30] demonstrate how user's behavior profile can be represented in a form of a graph, where vertexes represent different values of certain transaction feature and weighted edges represent the correlation between them, i.e. how likely value of one attribute would be present if the value of another is.…”
Section: Fraud Discovery Approachesmentioning
confidence: 99%