Skip to main content
Erschienen in: Wireless Personal Communications 4/2021

10.04.2020

Designing a Locating Scams for Mobile Transaction with the Aid of Operational Activity Analysis in Cloud

verfasst von: Ramesh Chandran, S. Rakesh Kumar, N. Gayathri

Erschienen in: Wireless Personal Communications | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Regularly the scam threat entails intended scams performed for gaining profits and the goal is to focus on this domain of services aiding payments with the electronic money. Precisely the usage of tools for prognostic safety estimation at the time of execution monitors the operational performance with respect to payments within money payment service and attempts to equalize them with the anticipated performance offered by the operational framework. The assessment variations from the specified performance required for abnormalities representing probable mishandling of the services in terms of money laundering behaviours. The assessment of the applications in terms of the designed scheme offering calibrations based on estimation and detection behaviour of the prognostic safety estimator created employed real-time processing and assessed logs. The intention of the analysis is to locate the mishandling prototypes imitating given money laundering mechanism in an artificial operational performance based on the features seized from the real-time payment actions with cloud infrastructure.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bhattacharya, S., Jha, S., Tharakunnel, K., & Westland, C. J. (2010). Data mining for credit card fraud. Decision Support System, 50, 602–613.CrossRef Bhattacharya, S., Jha, S., Tharakunnel, K., & Westland, C. J. (2010). Data mining for credit card fraud. Decision Support System, 50, 602–613.CrossRef
2.
Zurück zum Zitat Cao, L., Zhang, H., Zhao, Y., Luo, D., & Zhang, C. (2011). Combined mining: Discovering informative knowledge in complex data. IEEE Transactions, 41(3), 699–712. Cao, L., Zhang, H., Zhao, Y., Luo, D., & Zhang, C. (2011). Combined mining: Discovering informative knowledge in complex data. IEEE Transactions, 41(3), 699–712.
3.
Zurück zum Zitat Chuang, K. T., Lin, K. P., & Chen, M. S. (2007). Quality aware sampling and its application in incremental data mining. IEEE Transactions on Knowledge and Data Engineering, 19(4), 468–484.CrossRef Chuang, K. T., Lin, K. P., & Chen, M. S. (2007). Quality aware sampling and its application in incremental data mining. IEEE Transactions on Knowledge and Data Engineering, 19(4), 468–484.CrossRef
4.
Zurück zum Zitat Cao, L. (2012). Social security and social welfare data mining: An overview. IEEE Transactions on Systems, Man and Cybernetics-Part C: Applications & Reviews, 42(6), 837–853.CrossRef Cao, L. (2012). Social security and social welfare data mining: An overview. IEEE Transactions on Systems, Man and Cybernetics-Part C: Applications & Reviews, 42(6), 837–853.CrossRef
5.
Zurück zum Zitat Chang, W. H., & Chang, J. S. (2012). An early fraud detection methods for online auctions. Electronic Commerce Research and Applications, 11, 346–360.CrossRef Chang, W. H., & Chang, J. S. (2012). An early fraud detection methods for online auctions. Electronic Commerce Research and Applications, 11, 346–360.CrossRef
7.
Zurück zum Zitat Dharwa, J. N., & Patel, A. R. (2011). A data mining with hybrid approach based transaction risk score generation method for fraud detection of online transaction. Journal of Computer Applications, 16(1), 18–25.CrossRef Dharwa, J. N., & Patel, A. R. (2011). A data mining with hybrid approach based transaction risk score generation method for fraud detection of online transaction. Journal of Computer Applications, 16(1), 18–25.CrossRef
8.
Zurück zum Zitat Drezewski, R., Spielak, J., & Filipowski, W. (2012). System supporting money laundering detection. Digital Investigations, 9, 8–21.CrossRef Drezewski, R., Spielak, J., & Filipowski, W. (2012). System supporting money laundering detection. Digital Investigations, 9, 8–21.CrossRef
9.
Zurück zum Zitat Duman, E., & Ozcelik, H. M. (2011). Detecting credit card fraud by genetic algorithm and scatter search. Expert System with Applications, 38, 13057–13063.CrossRef Duman, E., & Ozcelik, H. M. (2011). Detecting credit card fraud by genetic algorithm and scatter search. Expert System with Applications, 38, 13057–13063.CrossRef
10.
Zurück zum Zitat Edge, E. M., & Sampaio, F. P. R. (2012). The design of FFML: A rule-based policy modeling language for proactive fraud management in financial data streams. Expert System with Applications, 39, 9966–9985.CrossRef Edge, E. M., & Sampaio, F. P. R. (2012). The design of FFML: A rule-based policy modeling language for proactive fraud management in financial data streams. Expert System with Applications, 39, 9966–9985.CrossRef
11.
Zurück zum Zitat Farvaresh, H., & Sepehri, M. M. (2010). A data mining framework for detecting subscription fraud in telecommunication. Engineering Applications of Artificial Intelligence, 24, 182–194.CrossRef Farvaresh, H., & Sepehri, M. M. (2010). A data mining framework for detecting subscription fraud in telecommunication. Engineering Applications of Artificial Intelligence, 24, 182–194.CrossRef
12.
Zurück zum Zitat He, Z., Xu, X., Huang, Z. J., & Deng, S. (2004). Mining class outliers: Concepts, algorithms and applications in CRM. Expert System with Applications, 27, 681–697.CrossRef He, Z., Xu, X., Huang, Z. J., & Deng, S. (2004). Mining class outliers: Concepts, algorithms and applications in CRM. Expert System with Applications, 27, 681–697.CrossRef
13.
Zurück zum Zitat Huang, R., Tawfik, H., & Nagar, A. K. (2012). A novel hybrid artificial immune inspired approach for online break-in fraud detection. In Proceedings of the International Conference on Computer Science (pp. 2733–2742). Huang, R., Tawfik, H., & Nagar, A. K. (2012). A novel hybrid artificial immune inspired approach for online break-in fraud detection. In Proceedings of the International Conference on Computer Science (pp. 2733–2742).
16.
Zurück zum Zitat Hajian, S., & Ferrer, J. D. (2013). A methodology for direct and indirect discrimination prevention in data mining. IEEE Transactions on Knowledge and Data Engineering., 25(7), 1445–1459.CrossRef Hajian, S., & Ferrer, J. D. (2013). A methodology for direct and indirect discrimination prevention in data mining. IEEE Transactions on Knowledge and Data Engineering., 25(7), 1445–1459.CrossRef
17.
Zurück zum Zitat Jha, S., Guillen, M., & Westland, C. J. (2012). Employing transaction aggregation strategy to detect fraud. Expert System with Applications, 39, 12650–12657.CrossRef Jha, S., Guillen, M., & Westland, C. J. (2012). Employing transaction aggregation strategy to detect fraud. Expert System with Applications, 39, 12650–12657.CrossRef
19.
Zurück zum Zitat Kumar, S., Rakesh, N., & Gayathri, B. B. (2019). Enhancing network lifetime through power-aware routing in MANET. International Journal of Internet Technology and Secured Transactions, 9(12), 96–111.CrossRef Kumar, S., Rakesh, N., & Gayathri, B. B. (2019). Enhancing network lifetime through power-aware routing in MANET. International Journal of Internet Technology and Secured Transactions, 9(12), 96–111.CrossRef
Metadaten
Titel
Designing a Locating Scams for Mobile Transaction with the Aid of Operational Activity Analysis in Cloud
verfasst von
Ramesh Chandran
S. Rakesh Kumar
N. Gayathri
Publikationsdatum
10.04.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07302-5

Weitere Artikel der Ausgabe 4/2021

Wireless Personal Communications 4/2021 Zur Ausgabe

Neuer Inhalt