Open Access   Article Go Back

A Novel Approach for Detection of Fraud Using SOM

Swati Sucharita Barik1

Section:Research Paper, Product Type: Journal Paper
Volume-4 , Issue-5 , Page no. 42-46, May-2016

Online published on May 31, 2016

Copyright © Swati Sucharita Barik . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Swati Sucharita Barik, “A Novel Approach for Detection of Fraud Using SOM,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.5, pp.42-46, 2016.

MLA Style Citation: Swati Sucharita Barik "A Novel Approach for Detection of Fraud Using SOM." International Journal of Computer Sciences and Engineering 4.5 (2016): 42-46.

APA Style Citation: Swati Sucharita Barik, (2016). A Novel Approach for Detection of Fraud Using SOM. International Journal of Computer Sciences and Engineering, 4(5), 42-46.

BibTex Style Citation:
@article{Barik_2016,
author = {Swati Sucharita Barik},
title = {A Novel Approach for Detection of Fraud Using SOM},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2016},
volume = {4},
Issue = {5},
month = {5},
year = {2016},
issn = {2347-2693},
pages = {42-46},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=901},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=901
TI - A Novel Approach for Detection of Fraud Using SOM
T2 - International Journal of Computer Sciences and Engineering
AU - Swati Sucharita Barik
PY - 2016
DA - 2016/05/31
PB - IJCSE, Indore, INDIA
SP - 42-46
IS - 5
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1830 1529 downloads 1465 downloads
  
  
           

Abstract

Fraud refers to abuse of organization’s system illegally. Fraud is the crime or offense of deliberately deceiving in order to damage them to obtain property or services unjustly. Fraud can be accomplished through the aid of forged objects. The scope of this paper is to investigate whether data mining techniques can be used for detecting fraud.

Key-Words / Index Term

Fraud, Data Mining,Neural Computing,Self Organizing Map

References

[1] S. Ghosh and D.L Reilly,”Credit Card fraud detection with a neural network.”in proc. Of 27th Hawaii Int. conf. syst. Sci.,pp.621-630.
[2] K. Fanning ; K. O. Cogger ; R. Srivastava,”Detection of Management Fraud”, Publication Year: 1995, Page(s):220- 223
[3] G. C. Y. B. N. Grozavu, "Unsupervised Learning for Analyzing the Dynamic Behavior of Online Banking Fraud," International Conference on Data Mining Workshops IEEE, 2013.
[4] Using data mining to detect fraud.SPSS technical report.2000.
[5] Fuzail Misarwala, KausarMukadam, and Kiran Bhowmick, "Applications of Data Mining in Fraud Detection", International Journal of Computer Sciences and Engineering, Volume-03, Issue-11, Page No (45-53), Nov -2015, E-ISSN: 2347-2693.
[6] Philip K. Chan,Wei Fan and J Stolfo,1999,IEEE Distributed Data Mining in credit card fraud detection.
[7] L. A. V. D. A. M. d. C. F. S. M. Emanuel Mineda Carneiro, "Cluster Analysis and Artificial Neural Networks : A Case Study in Credit Card Fraud Detection," International Conference on Information Technology - New Generations IEEE, 2015.
[8] Teuvo Kohonen,”The Self-Organizing Map", Proceedings of the IEEE 78, no.9(sept 1990).
[9] Fanning, K. and K. Cogger (1998). Neural network detection of management fraud using published financial data. International Journal of Intelligent Systems in Accounting, Finance & Management 7, 21-41.
[10] Jiwei Han & Kamber,“Data Mining Concepts and Techniques".
[11] Yufeng Kou,Chang-Tien lu,Sirirat Sinvongwattana Yo-ping Huang,”Survey Of Fraud Detection Techniques "Proceedings Of 2004 IEEE Intern. Conf. On networking,Taipei,March 21-23,2004.
[12] K. Chikin and I. Shlyik, “Countering Illegal Transactions in Internet Purchasing Systems,” World of Cards 7 (2002): 15-21.
[13] Bhatla, Prabhu, and Dua, “Understanding Credit Card Frauds.”
[14] T. Kohonen, "An introduction to neural networks", Neural Networks, vol. 1, pp. 3-16, 1988