Analysis on Credit Card Fraud Detection Methods
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 1
Abstract
Due to the theatrical increase of fraud which results in loss of dollars worldwide each year, several modern techniques in detecting fraud are persistently evolved and applied to many business fields. Fraud detection involves monitoring the activities of populations of users in order to estimate, perceive or avoid undesirable behavior. Undesirable behavior is a broad term including delinquency, fraud, intrusion, and account defaulting. This paper presents a survey of current techniques used in credit card fraud detection and telecommunication fraud. The goal of this paper is to provide a comprehensive review of different techniques to detect fraud.
Authors and Affiliations
Renu , Suman
ACO, Its Modification and Variants
Ant colony optimization (ACO) is a P based metaheuristic algorithm which has been proven as a successful technique and applied to a number of combinatorial optimization problems and is also applied to the Traveling sales...
Review of MANETS Using Distributed Public-key Cryptography
Ensuring security is something that is not easily done as many of the demands of network security conflict with the demands of mobile networks, majorly because of the nature of the mobile devices (e.g. low power consumpt...
A Survey of Machine Learning Algorithm in Network Traffic Classification
Network Traffic Classification is an emerging research area and now a day the research is widely used in various activities such as intrusion detection system and for security purpose. Many of the protocols and proposed...
Big Data : Overview
Big data is data that exceeds the processing capacity of traditional databases. The data is too big to be processed by a single machine. New and innovative methods are required to process and store such large volumes of...
Detecting and Localizing the Attackers in Multiple Networks
Spoofing attack which easily attack the network and reduce the performance of the network. In this Paper, Spoofing attacks are detected, Finding the number of attackers that masquerade the node identity, Localizing all t...