A Critical review of Credit Card Fraud Detection Techniques

被引:0
作者
Al Smadi, Baker [1 ]
Min, Manki [2 ]
机构
[1] Louisiana Tech Univ, Cyberspace Engn Program, Ruston, LA 71270 USA
[2] Louisiana Tech Univ, Comp Sci Program, Ruston, LA 71270 USA
来源
2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON) | 2020年
关键词
Fraud detection techniques; E-Commerce; Credit card fraud; Credit card; fraud detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Credit card fraud is one of the most important threats that affect people as well as companies across the world, particularly with the growing volume of financial transactions using credit cards every day. This puts the security of financial transactions at serious risk and calls for a fundamental solution. In this paper, we discuss various techniques of credit card fraud detection techniques that provide enhanced protection for credit card systems against a variety of frauds. We also compare these techniques in terms of accuracy, time, and cost, and outlined potential strengths and weaknesses to provide a guideline to choose the right technique.
引用
收藏
页码:732 / 736
页数:5
相关论文
共 21 条
[1]   CORPORATE DISTRESS DIAGNOSIS - COMPARISONS USING LINEAR DISCRIMINANT-ANALYSIS AND NEURAL NETWORKS (THE ITALIAN EXPERIENCE) [J].
ALTMAN, EI ;
MARCO, G ;
VARETTO, F .
JOURNAL OF BANKING & FINANCE, 1994, 18 (03) :505-529
[2]  
[Anonymous], 2012, International Journal of Computer Applications
[3]  
[Anonymous], 1994, SYST SCI 1994 P 27 H
[4]  
[Anonymous], tems: an introductory analysis with applications to biology
[5]  
[Anonymous], 2009, Banks and Bank systems
[6]  
BENTLEY PJ, 2000, 14 ANN FALL S KOR IN, V14
[7]  
Bhusari V, 2016, 2016 WORLD CONFERENCE ON FUTURISTIC TRENDS IN RESEARCH AND INNOVATION FOR SOCIAL WELFARE (STARTUP CONCLAVE)
[8]   Distributed data mining in credit card fraud detection [J].
Chan, PK ;
Fan, W ;
Prodromidis, AL ;
Stolfo, SJ .
IEEE INTELLIGENT SYSTEMS & THEIR APPLICATIONS, 1999, 14 (06) :67-74
[9]  
Chaudhary K., 2012, INT J COMPUTER APPL, V45, P39
[10]  
Dawson Ed, 2007, P 12 AUSTR C ACISP 2, V4586