Case study: Adaptive fraud detection. Fawcett, T. Case study: Adaptive fraud detection, pages 1-19. Oxford University Press, 1995. Paper bibtex @inBook{
title = {Case study: Adaptive fraud detection},
type = {inBook},
year = {1995},
pages = {1-19},
publisher = {Oxford University Press},
editors = {[object Object],[object Object]},
id = {85f3f86c-3f7b-3558-a3fa-95833d31ef5e},
created = {2009-08-18T04:21:53.000Z},
file_attached = {true},
profile_id = {7edb4dd2-367e-3b20-8e26-a7e1d668fa33},
last_modified = {2017-07-27T21:18:51.876Z},
read = {false},
starred = {false},
authored = {true},
confirmed = {true},
hidden = {false},
citation_key = {Fawcett-HDM},
private_publication = {false},
bibtype = {inBook},
author = {Fawcett, Tom},
book = {Handbook of Data Mining}
}
Downloads: 0
{"_id":"M5Qkjj5uc22N77sxW","bibbaseid":"fawcett-casestudyadaptivefrauddetection-1995","downloads":0,"creationDate":"2016-03-15T04:09:55.098Z","title":"Case study: Adaptive fraud detection","author_short":["Fawcett, T."],"year":1995,"bibtype":"inBook","biburl":null,"bibdata":{"title":"Case study: Adaptive fraud detection","type":"inBook","year":"1995","pages":"1-19","publisher":"Oxford University Press","editors":"[object Object],[object Object]","id":"85f3f86c-3f7b-3558-a3fa-95833d31ef5e","created":"2009-08-18T04:21:53.000Z","file_attached":"true","profile_id":"7edb4dd2-367e-3b20-8e26-a7e1d668fa33","last_modified":"2017-07-27T21:18:51.876Z","read":false,"starred":false,"authored":"true","confirmed":"true","hidden":false,"citation_key":"Fawcett-HDM","private_publication":false,"bibtype":"inBook","author":"Fawcett, Tom","book":"Handbook of Data Mining","bibtex":"@inBook{\n title = {Case study: Adaptive fraud detection},\n type = {inBook},\n year = {1995},\n pages = {1-19},\n publisher = {Oxford University Press},\n editors = {[object Object],[object Object]},\n id = {85f3f86c-3f7b-3558-a3fa-95833d31ef5e},\n created = {2009-08-18T04:21:53.000Z},\n file_attached = {true},\n profile_id = {7edb4dd2-367e-3b20-8e26-a7e1d668fa33},\n last_modified = {2017-07-27T21:18:51.876Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Fawcett-HDM},\n private_publication = {false},\n bibtype = {inBook},\n author = {Fawcett, Tom},\n book = {Handbook of Data Mining}\n}","author_short":["Fawcett, T."],"urls":{"Paper":"https://bibbase.org/service/mendeley/7edb4dd2-367e-3b20-8e26-a7e1d668fa33/file/164d643e-b548-d3b9-67c4-fda4b0531c54/1995-Case_study_Adaptive_fraud_detection.pdf.pdf"},"bibbaseid":"fawcett-casestudyadaptivefrauddetection-1995","role":"author","downloads":0},"search_terms":["case","study","adaptive","fraud","detection","fawcett"],"keywords":["1 project overview","2","a classic example of","applications","case studies","cellular cloning fraud is","classi cation","discussed","fraud detection","h1","in cellular cloning fraud","in section f2","legitimate cellular","superimposition fraud","the identity of a"],"authorIDs":[]}