共 85 条
[1]
Ai L., 2011, Journal of Financial Crime, V18, P268, DOI DOI 10.1108/13590791111147488
[2]
Alexandre C., 2017, RISTI PORTO, V25, P1, DOI [10.17013/risti.25.1-17, DOI 10.17013/RISTI.25.1-17]
[3]
[Anonymous], SOFTW ENG MOB APPL M
[4]
[Anonymous], 2019, BAS AML IND COUNTR R
[5]
Bernard K, 2011, 2011 IEEE SYSTEMS AND INFORMATION ENGINEERING DESIGN SYMPOSIUM (SIEDS), P158, DOI 10.1109/SIEDS.2011.5876870
[6]
Bershtein L.S., 2013, Proceedings of the 6th International Conference on Security of Information and Networks, P384, DOI DOI 10.1145/2523514.2523568
[7]
Camdessus M., 1988, P IMF PLEN M FIN ACT, P2
[8]
Finding Suspicious Activities in Financial Transactions and Distributed Ledgers
[J].
2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2017),
2017,
:787-796
[9]
Cao D.K., 2012, AS C INT INF DAT SYS
[10]
WireVis: Visualization of categorical, time-varying data from financial transactions
[J].
VAST: IEEE SYMPOSIUM ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY 2007, PROCEEDINGS,
2007,
:155-+