ND-Sync: Detecting Synchronized Fraud Activities. Giatsoglou, M., Chatzakou, D., Shah, N., Beutel, A., Faloutsos, C., & Vakali, A. In Cao, T. H., Lim, E., Zhou, Z., Ho, T. B., Cheung, D. W., & Motoda, H., editors, Advances in Knowledge Discovery and Data Mining - 19th Pacific-Asia Conference, PAKDD 2015, Ho Chi Minh City, Vietnam, May 19-22, 2015, Proceedings, Part II, volume 9078, of Lecture Notes in Computer Science, pages 201–214, 2015. Springer.
Paper doi bibtex @inproceedings{DBLP:conf/pakdd/GiatsoglouCSBFV15,
author = {Maria Giatsoglou and
Despoina Chatzakou and
Neil Shah and
Alex Beutel and
Christos Faloutsos and
Athena Vakali},
editor = {Tru H. Cao and
Ee{-}Peng Lim and
Zhi{-}Hua Zhou and
Tu Bao Ho and
David Wai{-}Lok Cheung and
Hiroshi Motoda},
title = {ND-Sync: Detecting Synchronized Fraud Activities},
booktitle = {Advances in Knowledge Discovery and Data Mining - 19th Pacific-Asia
Conference, {PAKDD} 2015, Ho Chi Minh City, Vietnam, May 19-22, 2015,
Proceedings, Part {II}},
series = {Lecture Notes in Computer Science},
volume = {9078},
pages = {201--214},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-18032-8\_16},
doi = {10.1007/978-3-319-18032-8\_16},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/pakdd/GiatsoglouCSBFV15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"d3nrvjzfMKeY7D8hi","bibbaseid":"giatsoglou-chatzakou-shah-beutel-faloutsos-vakali-ndsyncdetectingsynchronizedfraudactivities-2015","author_short":["Giatsoglou, M.","Chatzakou, D.","Shah, N.","Beutel, A.","Faloutsos, C.","Vakali, A."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Maria"],"propositions":[],"lastnames":["Giatsoglou"],"suffixes":[]},{"firstnames":["Despoina"],"propositions":[],"lastnames":["Chatzakou"],"suffixes":[]},{"firstnames":["Neil"],"propositions":[],"lastnames":["Shah"],"suffixes":[]},{"firstnames":["Alex"],"propositions":[],"lastnames":["Beutel"],"suffixes":[]},{"firstnames":["Christos"],"propositions":[],"lastnames":["Faloutsos"],"suffixes":[]},{"firstnames":["Athena"],"propositions":[],"lastnames":["Vakali"],"suffixes":[]}],"editor":[{"firstnames":["Tru","H."],"propositions":[],"lastnames":["Cao"],"suffixes":[]},{"firstnames":["Ee-Peng"],"propositions":[],"lastnames":["Lim"],"suffixes":[]},{"firstnames":["Zhi-Hua"],"propositions":[],"lastnames":["Zhou"],"suffixes":[]},{"firstnames":["Tu","Bao"],"propositions":[],"lastnames":["Ho"],"suffixes":[]},{"firstnames":["David","Wai-Lok"],"propositions":[],"lastnames":["Cheung"],"suffixes":[]},{"firstnames":["Hiroshi"],"propositions":[],"lastnames":["Motoda"],"suffixes":[]}],"title":"ND-Sync: Detecting Synchronized Fraud Activities","booktitle":"Advances in Knowledge Discovery and Data Mining - 19th Pacific-Asia Conference, PAKDD 2015, Ho Chi Minh City, Vietnam, May 19-22, 2015, Proceedings, Part II","series":"Lecture Notes in Computer Science","volume":"9078","pages":"201–214","publisher":"Springer","year":"2015","url":"https://doi.org/10.1007/978-3-319-18032-8\\_16","doi":"10.1007/978-3-319-18032-8_16","timestamp":"Thu, 14 Oct 2021 01:00:00 +0200","biburl":"https://dblp.org/rec/conf/pakdd/GiatsoglouCSBFV15.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/pakdd/GiatsoglouCSBFV15,\n author = {Maria Giatsoglou and\n Despoina Chatzakou and\n Neil Shah and\n Alex Beutel and\n Christos Faloutsos and\n Athena Vakali},\n editor = {Tru H. Cao and\n Ee{-}Peng Lim and\n Zhi{-}Hua Zhou and\n Tu Bao Ho and\n David Wai{-}Lok Cheung and\n Hiroshi Motoda},\n title = {ND-Sync: Detecting Synchronized Fraud Activities},\n booktitle = {Advances in Knowledge Discovery and Data Mining - 19th Pacific-Asia\n Conference, {PAKDD} 2015, Ho Chi Minh City, Vietnam, May 19-22, 2015,\n Proceedings, Part {II}},\n series = {Lecture Notes in Computer Science},\n volume = {9078},\n pages = {201--214},\n publisher = {Springer},\n year = {2015},\n url = {https://doi.org/10.1007/978-3-319-18032-8\\_16},\n doi = {10.1007/978-3-319-18032-8\\_16},\n timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/pakdd/GiatsoglouCSBFV15.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Giatsoglou, M.","Chatzakou, D.","Shah, N.","Beutel, A.","Faloutsos, C.","Vakali, A."],"editor_short":["Cao, T. H.","Lim, E.","Zhou, Z.","Ho, T. B.","Cheung, D. W.","Motoda, H."],"key":"DBLP:conf/pakdd/GiatsoglouCSBFV15","id":"DBLP:conf/pakdd/GiatsoglouCSBFV15","bibbaseid":"giatsoglou-chatzakou-shah-beutel-faloutsos-vakali-ndsyncdetectingsynchronizedfraudactivities-2015","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-3-319-18032-8\\_16"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/f/CFaloutsos.bib","dataSources":["zM4wMHSu34vjmb6Cm"],"keywords":[],"search_terms":["sync","detecting","synchronized","fraud","activities","giatsoglou","chatzakou","shah","beutel","faloutsos","vakali"],"title":"ND-Sync: Detecting Synchronized Fraud Activities","year":2015}