Analysis on Credit Card Fraud Detection Methods
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 1
Abstract
Due to the theatrical increase of fraud which results in loss of dollars worldwide each year, several modern techniques in detecting fraud are persistently evolved and applied to many business fields. Fraud detection involves monitoring the activities of populations of users in order to estimate, perceive or avoid undesirable behavior. Undesirable behavior is a broad term including delinquency, fraud, intrusion, and account defaulting. This paper presents a survey of current techniques used in credit card fraud detection and telecommunication fraud. The goal of this paper is to provide a comprehensive review of different techniques to detect fraud.
Authors and Affiliations
Renu , Suman
New Julia and Mandelbrot Sets for Jungck Ishikawa Iterates
The generation of fractals and study of the dynamics of polynomials is one of the emerging and interesting field of research nowadays. We introduce in this paper the dynamics of polynomials z n - z + c = 0 for n 2 and ap...
Block Motion Based Dynamic Texture Analysis: A Review
Dynamic texture refers to image sequences of non-rigid objects that exhibit some regularity in their movement. Videos of smoke, fire etc. fall under the category of dynamic texture. Researchers have investigated differen...
Security Protection Mechanism for Social Networking Websites Based on Real-Time Proxy
During the last two decades Information technology has grown tremendously and became the main source of knowledge. In past few years the world getting closer and closer this is only because of Social networking websites...
Effective User Navigation in Dynamic Website
Constructing a well structured website to aide or assist user navigation are the problem now a days .A main primary cause is that web developers may understanding of how a web site should be design can be different from...
Data Flow for Effective Data Leakage Prevention using Elliptic Curve Digital Signature Algorithm
Sensitive data is leaked in software firm, government sectors and also from the web. To prevent this leakage, data allocation strategies are used. Data allocation Strategy improves the probability of identifying leakages...