Establishing fraud detection patterns based on signatures

22Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

All over the world we have been assisting to a significant increase of the telecommunication systems usage. People are faced day after day with strong marketing campaigns seeking their attention to new telecommunication products and services. Telecommunication companies struggle in a high competitive business arena. It seems that their efforts were well done, because customers are strongly adopting the new trends and use (and abuse) systematically communication services in their quotidian. Although fraud situations are rare, they are increasing and they correspond to a large amount of money that telecommunication companies lose every year. In this work, we studied the problem of fraud detection in telecommunication systems, especially the cases of superimposed fraud, providing an anomaly detection technique, supported by a signature schema. Our main goal is to detect deviate behaviors in useful time, giving better basis to fraud analysts to be more accurate in their decisions in the establishment of potential fraud situations. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Ferreira, P., Alves, R., Belo, O., & Cortesão, L. (2006). Establishing fraud detection patterns based on signatures. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4065 LNAI, pp. 526–538). Springer Verlag. https://doi.org/10.1007/11790853_41

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free