Number | Name | Date | Kind |
---|---|---|---|
4154983 | Pedersen | May 1979 | A |
4464543 | Kline et al. | Aug 1984 | A |
4805209 | Baker, Jr. et al. | Feb 1989 | A |
5003584 | Benyacar et al. | Mar 1991 | A |
5048079 | Harrington et al. | Sep 1991 | A |
5159698 | Harrington et al. | Oct 1992 | A |
5233642 | Renton | Aug 1993 | A |
5263120 | Bickel | Nov 1993 | A |
5291547 | Boatwright et al. | Mar 1994 | A |
5311572 | Friedes et al. | May 1994 | A |
5313641 | Simcoe et al. | May 1994 | A |
5325290 | Cauffman et al. | Jun 1994 | A |
5327144 | Stilp et al. | Jul 1994 | A |
5335278 | Matchett et al. | Aug 1994 | A |
5345595 | Johnson et al. | Sep 1994 | A |
5375244 | McNair | Dec 1994 | A |
5418844 | Morrisey et al. | May 1995 | A |
5432845 | Burd et al. | Jul 1995 | A |
5463681 | Vaios et al. | Oct 1995 | A |
5475746 | Miller et al. | Dec 1995 | A |
5495521 | Rangachar | Feb 1996 | A |
5504810 | McNair | Apr 1996 | A |
5506893 | Buscher et al. | Apr 1996 | A |
5515425 | Penzias et al. | May 1996 | A |
5515427 | Carlsen et al. | May 1996 | A |
5517555 | Amadon et al. | May 1996 | A |
5574782 | Baird et al. | Nov 1996 | A |
5586175 | Hogan et al. | Dec 1996 | A |
4002848 | Stein | Jan 1997 | A |
5592530 | Brockman et al. | Jan 1997 | A |
5596632 | Curtis et al. | Jan 1997 | A |
5602906 | Phelps | Feb 1997 | A |
5606600 | Elliot et al. | Feb 1997 | A |
5627886 | Bowman | May 1997 | A |
5640446 | Everett et al. | Jun 1997 | A |
5768354 | Lange et al. | Jun 1998 | A |
5790645 | Fawcett et al. | Aug 1998 | A |
5805686 | Moller et al. | Sep 1998 | A |
5854834 | Gottlieb et al. | Dec 1998 | A |
5875236 | Jankowitz et al. | Feb 1999 | A |
5907602 | Peel et al. | May 1999 | A |
5963625 | Kawecki et al. | Oct 1999 | A |
6208720 | Curtis et al. | Mar 2001 | B1 |
Number | Date | Country |
---|---|---|
9631043 | Oct 1996 | WO |
Entry |
---|
“Advanced Information Management”, META Group, Inc., Aug. 29, 1994. |
Calem, Robert E., “To Catch A Thief”, Forbes ASAP, pp. 44-45, date unknown. |
Curet, O., The application of case-based reasoning to assist accountant in identifying top management fraud; a study of the problem domain and the methodological issues in the development, implementation and evaluation of a case-based learning and reasoning tool, Case Based Reasoning: Prospects for Applications, IEE Colloquium on, 1995, pp. 8/1-8/4. |
Garner, B.; Chen, F., Hypothesis generation paradigm for fraud detection, TENCON '94 . IEEE Region 10's Ninth Annual International Conference. Theme: Frontiers of Computer Technology Proceedings of 1994, Aug. 22-26, pp. 197-201 vol. 1. |
Fawett, T., “Adaptive Fraud Detection”, Journal of Data Mining and Knowledge Discovery, Copyright 1997, Kluwer Academic Publishers, Norwell, MA, vol. 1 1997, pp. 291-316. |
Scarfe, R.T.; Shortland, R.J., Data Mining Applications in BT, Knowledge Discovery in Databases, [IEE Colloquium on], 1995, pp. 5/1-5/4. |
Sternberg, M.; Reynolds, R.G., Using cultural algorithms to support re-engineering of rule-based expert systems in dynamic performance environments: a case study in fraud detection, Evolutionary Computation, IEEE Transactions on, vol.: 14, Nov. 1997, pp.: 225-243. |
Watkins, P.R.; Lin, T.W.; O'Leary, D.E., AI integration for enchanced decision support, Systems Sciences, 1992. Proceedings of the Twenty-Fifth Hawaii International Conference on, vol.: III, Jan. 7-10, 1992, pp.: 133-144 vol. 3. |