2015
DOI: 10.1007/978-3-319-20910-4_13
|View full text |Cite
|
Sign up to set email alerts
|

Generalized ATM Fraud Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Roy and George utilized DT, RF, and NB, with DT and RF performing best, to find vehicle insurance fraud. In order to detect automobile insurance fraud in the presence of unbalanced data, Subudhi and Panigrahi [4] developed an adaptive oversampling strategy, achieving a high rate of fraud detection using SVM and Decision Tree classifiers.…”
Section: G Decision Trees (Dt)mentioning
confidence: 99%
“…Roy and George utilized DT, RF, and NB, with DT and RF performing best, to find vehicle insurance fraud. In order to detect automobile insurance fraud in the presence of unbalanced data, Subudhi and Panigrahi [4] developed an adaptive oversampling strategy, achieving a high rate of fraud detection using SVM and Decision Tree classifiers.…”
Section: G Decision Trees (Dt)mentioning
confidence: 99%
“…A fairly comprehensive summary of ATM attacks and detection mechanisms are described by Priesterjahn et al in [25]. The prominent ATM attacks fall in to the following categories: card skimming, where the information in the inserted bank card is skimmed for later use; card trapping, where the bank card is trapped after the transaction is complete using an extraneous device by the attacker in order to steal it later; PIN capturing, where the user's PIN number is stolen while being used; cash trapping, where the cash dispensed is trapped by the attacker using an extraneous device in order to retrieve it later; brute force safe opening to steal the cash in ATM; and using malware to attack the ATM firmware [25]. There are several variations of a recent malware attack known as "jackpotting" [28], and all these variations seek to change the firmware processing of the ATM.…”
Section: Illustrative Examplementioning
confidence: 99%