Vesselin Petkov IntroductionShort CVinsert short SV here Full profileThis is the longer CV, presenting education, work experience, etc. Publications Forrester, J.. World Dynamics. Cambridge, Massachusetts: Wright-Allen Press, 1971. Meadows, D., J. Randers, and D. Meadows. Limits to Growth: The 30-Year Update. Chelsea Green Publishing Company, 2004. CYREX 2018 Web Page., 2019. Gaydarski, I., P. Kutinchev, and Zlatogor Minchev. Modelling & Deployment of Data Protection Component of Information Security Systems In First International Interdisciplinary Conference on Information and Cyber Security-Global, ICICSG’2017. Istanbul, 2017. Li, Xingan, and Martti Juhola. "Country crime analysis using the self-organising map, with special regard to economic factors ." International Journal of Data Mining, Modelling and Management 7, no. 2 (2015). Li, Xingan, and Martti Juhola. "Crime and Its Social Context: Analysis Using the Self-Organizing Map." In European Intelligence and Security Informatics Conference. Uppsala, Sweden , 2013. Li, Xingan, Henry Joutsijoki, Jorma Laurikkala, Markku Siermala, and Martti Juhola. "Homicide and Its Social Context: Analysis Using the Self-Organizing Map." Applied Artificial Intelligence An International Journal 29, no. 4 (2015). Lebichot, Bertrand, Fabian Braun, Olivier Caelen, and Marco Saerens. A graph-based, semi-supervised, credit card fraud detection system In Complex Networks & Their Applications V. COMPLEX NETWORKS 2016. Studies in Computational Intelligence. Vol. 693. Cham: Springer, 2016. Sorournejad, Samaneh, Zahra Zojaji, Reza Ebrahimi Atani, and Amir Hassan Monadjemi. A Survey of Credit Card Fraud Detection Techniques: Data and Technique Oriented Perspective In Computer Science, Cryptography and Security. Cornell University , 2016. Li, Xingan, Henry Joutsijoki, Jorma Laurikkala, and Martti Juhola. "Crime vs. Demographic Factors Revisited: Application of Data Mining Methods." Webology 12, no. 1 (2015). Almendra, Vinicius da Silva, and Denis Enachescu. "Using Self-Organizing Maps for Fraud Prediction at Online Auction Sites." In 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing. Timisoara, Romania , 2013. Jeong, Seong Hoon, Hana Kim, Youngsang Shin, Taejin Lee, and Huy Kang Kim. "A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique (결제로그 분석 및 데이터 마이닝을 이용한 이상거래 탐지 연구 조사)." Journal of the Korea Institute of Information Security and Cryptology (정보보호학회논문지) 25, no. 6 (2015): 1525-1540. Mahmud, Mohammad Sultan, Phayung Meesad, and Sunantha Sodsee. "An evaluation of computational intelligence in credit card fraud detection." In International Computer Science and Engineering Conference (ICSEC). Chiang Mai, Thailand , 2016. Li, Xingan, Henry Joutsijoki, Jorma Laurikkala, and Martti Juhola. "GDP growth vs. criminal phenomena: data mining of Japan 1926–2013." AI & SOCIETY 33, no. 2 (2018): 261-274. Falaki, S. O., B. K. Alese, O. S. Adewale, J. O. Ayeni, G. A. Aderounmu, and W. O. Ismaila. "Probabilistic Credit Card Fraud Detection System in Online Transactions." International Journal of Software Engineering and Its Applications 6, no. 4 (2012). Almendra, Vinicius, and Denis Enachescu. "Using Self-Organizing Maps for Binary Classification With Highly Imbalanced Datasets." International Journal of Numerical Analysis and Modeling, Series B 5, no. 3 (2014): 238-254. Zanin, Massimiliano, Miguel Romance, Santiago Moral, and Regino Criado. "Credit Card Fraud Detection through Parenclitic Network Analysis." Complexity (2018). Sitek, Albert, and Zbigniew Kotulski. "POS-originated transaction traces as a source of contextual information for risk management systems in EFT transactions." EURASIP Journal on Information Security (2018). Zheng, Lutao, Guanjun Liu, Chungang Yan, and Changjun Jiang. "Transaction Fraud Detection Based on Total Order Relation and Behavior Diversity." IEEE Transactions on Computational Social Systems 5, no. 3 (2018). Taghva, Mohammad Reza, Taha Mansouri, Kamran Feiz, and Babak Akhgar4. "Fraud Detection in Credit Card Transactions; Using Parallel Processing of Anomalies in Big Data ." Journal of Information Technology Management 8, no. 3 (2016): 477-498. Barman, Subhas, Utpal Pal, Asif Sarfaraj, Biswajit Biswas, Animesh Mahata, and Palash Mandal. "A complete literature review on financial fraud detection applying data mining techniques ." International Journal of Trust Management in Computing and Communications (IJTMCC) 3, no. 4 (2016). Falaki, S. O., B. K. Alese, and W. O. Ismaila. "An update research on credit card on-line transactions." International Journal of Economic Development Research and Investment 1, no. 2 & 3 (2010). Malekpour, Milad, Maryam Khademi, and Behrouz Minae-Bidgoli. "A Hybrid Data Mining Method for Intrusion and Fraud Detection in E-Banking Systems." Journal of Computational Intelligence and Electronic Systems 3, no. 1–6 (2014). Jans, Mieke, Nadine Lybaert, and Koen Vanhoof. "Data Mining and Economic Crime Risk Management." In Data Mining: Concepts, Methodologies, Tools, and Applications., 2013. Triepels, Ron, Hennie Daniels, and Ronald Heijmans. Detection and Explanation of Anomalous Payment Behavior in Real-Time Gross Settlement Systems In Enterprise Information Systems, 19th International Conference, ICEIS 2017. Porto, Portugal, 2017. Pages« първа ‹ предишна … 350 351 352 353 354 355 356 357 358 … следваща › последна »