“…The rule-based approach is successful for identifying fraudulent transactions that follow previously observed fraud patterns, but it lacks agility. Before a new rule is added to the existing rule set, a considerable number of fraudulent transactions matching that rule have typically already Gadi, Wang, & Lago, 2008aGadi, Wang, & Lago, 2008bPatil, Karad, Wadhai, Gokhale, & Halgaonkar, 2010Sherly & Nedunchezhian, 2010Bhattacharyya et al, 2011Sahin & Duman, 2011aAlowais & Soon, 2012 Neural networks (NN) Maes, Tuyls, Vanschoenwinkel, & Manderick, 1993Aleskerov, Freisleben, & Rao, 1997Gadi et al, 2008aGadi et al, 2008bSahin & Duman, 2011b Bayesian networks (BN) Maes et al, 1993Filippov, Mukhanov, & Shchukin, 2008Gadi et al, 2008aGadi et al, 2008b Naïve Bayes (NB) Filippov et al, 2008Gadi et al, 2008aGadi et al, 2008bAlowais & Soon, 2012 Support vector machines (SVM) Chen, Chen, Chien, & Yang, 2005Bhattacharyya et al, 2011Sahin & Duman, 2011aHejazi & Singh, 2012 Genetic algorithm (GA) Ma & Li, 2009Ozcelik, Isik, Duman, & Cevik, 2010Duman & Ozcelik, 2011 Artificial immune system (AIS) Gadi et al, 2008aGadi et al, 2008b Hidden Markov model (HMM) Bhusari & Patil, 2011Rani, Kumar, Mohan, & Shankar, 2011 occurred. A long delay is required before a rule can be added, during which time fraud strategies may change, making the rule obsolete (Krivko, 2010).…”