2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS) 2020
DOI: 10.1109/snams52053.2020.9336578
|View full text |Cite
|
Sign up to set email alerts
|

Community Detection for Mobile Money Fraud Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…A node can simultaneously be part of multiple communities of different scopes and levels, such as family, friends, work, city, etc. [6]. Overlapping communities were studied in the literature in various contexts such as biology [7], e-commerce [8], mobile networks [2], etc.…”
Section: A Overlapping Communities Detectionmentioning
confidence: 99%
“…A node can simultaneously be part of multiple communities of different scopes and levels, such as family, friends, work, city, etc. [6]. Overlapping communities were studied in the literature in various contexts such as biology [7], e-commerce [8], mobile networks [2], etc.…”
Section: A Overlapping Communities Detectionmentioning
confidence: 99%
“…For such a service, transactions take place between customers for various reasons such as sending money for family, transfers between friends, salary payment, etc. Social network analysis has already been successfully used on banking and money transfer data to carry out socio-economic studies [5], uncover customer buying habits [6], fight fraud [7], etc.…”
Section: Context a Use Case Around Financial Datamentioning
confidence: 99%
“…The fraudster may gather information about the victim through various means, such as social engineering [8] or hacking [9]. Once a victim has been identified, the fraudster typically initiates a contact with them through a variety of means, such as email [10], phone [11], or social media [12]. The next step involves the fraudster tricking the victim into providing sensitive information or performing an action that benefits the fraudster, such as transferring funds or installing malicious content [13].…”
Section: Introductionmentioning
confidence: 99%