Fraud Detection Using Social Network Analysis: A Case Study. Chau, D. H. & Faloutsos, C. In Alhajj, R. & Rokne, J. G., editors, Encyclopedia of Social Network Analysis and Mining, 2nd Edition. Springer, 2018.
Paper doi bibtex @incollection{DBLP:reference/snam/ChauF18,
author = {Duen Horng Chau and
Christos Faloutsos},
editor = {Reda Alhajj and
Jon G. Rokne},
title = {Fraud Detection Using Social Network Analysis: {A} Case Study},
booktitle = {Encyclopedia of Social Network Analysis and Mining, 2nd Edition},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-1-4939-7131-2\_284},
doi = {10.1007/978-1-4939-7131-2\_284},
timestamp = {Wed, 04 May 2022 13:01:02 +0200},
biburl = {https://dblp.org/rec/reference/snam/ChauF18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"fwfWmmxaTs7gSScxW","bibbaseid":"chau-faloutsos-frauddetectionusingsocialnetworkanalysisacasestudy-2018","author_short":["Chau, D. H.","Faloutsos, C."],"bibdata":{"bibtype":"incollection","type":"incollection","author":[{"firstnames":["Duen","Horng"],"propositions":[],"lastnames":["Chau"],"suffixes":[]},{"firstnames":["Christos"],"propositions":[],"lastnames":["Faloutsos"],"suffixes":[]}],"editor":[{"firstnames":["Reda"],"propositions":[],"lastnames":["Alhajj"],"suffixes":[]},{"firstnames":["Jon","G."],"propositions":[],"lastnames":["Rokne"],"suffixes":[]}],"title":"Fraud Detection Using Social Network Analysis: A Case Study","booktitle":"Encyclopedia of Social Network Analysis and Mining, 2nd Edition","publisher":"Springer","year":"2018","url":"https://doi.org/10.1007/978-1-4939-7131-2\\_284","doi":"10.1007/978-1-4939-7131-2_284","timestamp":"Wed, 04 May 2022 13:01:02 +0200","biburl":"https://dblp.org/rec/reference/snam/ChauF18.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@incollection{DBLP:reference/snam/ChauF18,\n author = {Duen Horng Chau and\n Christos Faloutsos},\n editor = {Reda Alhajj and\n Jon G. Rokne},\n title = {Fraud Detection Using Social Network Analysis: {A} Case Study},\n booktitle = {Encyclopedia of Social Network Analysis and Mining, 2nd Edition},\n publisher = {Springer},\n year = {2018},\n url = {https://doi.org/10.1007/978-1-4939-7131-2\\_284},\n doi = {10.1007/978-1-4939-7131-2\\_284},\n timestamp = {Wed, 04 May 2022 13:01:02 +0200},\n biburl = {https://dblp.org/rec/reference/snam/ChauF18.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Chau, D. H.","Faloutsos, C."],"editor_short":["Alhajj, R.","Rokne, J. G."],"key":"DBLP:reference/snam/ChauF18","id":"DBLP:reference/snam/ChauF18","bibbaseid":"chau-faloutsos-frauddetectionusingsocialnetworkanalysisacasestudy-2018","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-1-4939-7131-2\\_284"},"metadata":{"authorlinks":{}}},"bibtype":"incollection","biburl":"https://dblp.org/pid/f/CFaloutsos.bib","dataSources":["zM4wMHSu34vjmb6Cm"],"keywords":[],"search_terms":["fraud","detection","using","social","network","analysis","case","study","chau","faloutsos"],"title":"Fraud Detection Using Social Network Analysis: A Case Study","year":2018}