User behavior analysis for detecting compromised user Accounts: A review paper

M Jurišić, I Tomičić, P Grd - Cybernetics and Information Technologies, 2023 - sciendo.com
The rise of online transactions has led to a corresponding increase in online criminal
activities. Account takeover attacks, in particular, are challenging to detect, and novel …

Modeling and state of health estimation of nickel–metal hydride battery using an EPSO-based fuzzy c-regression model

AJ Telmoudi, M Soltani, Y Ben Belgacem, A Chaari - Soft Computing, 2020 - Springer
The prognostic and health management of the batteries continued to attract interest from
automobile manufacturers as the key for lowering life-cycle costs, reducing unexpected …

What is financial inclusion?

R Prabhakar - Financial Inclusion, 2021 - bristoluniversitypressdigital.com
Financial inclusion has emerged as an important social policy agenda over the past 20
years (Collard, 2007; Mitton, 2008; Marron, 2013; World Bank, 2014; Berry, 2015; Financial …

A Supervised Embedding and Clustering Anomaly Detection method for classification of Mobile Network Faults

R Mosayebi, H Kia, AK Raki - arXiv preprint arXiv:2310.06779, 2023 - arxiv.org
The paper introduces Supervised Embedding and Clustering Anomaly Detection (SEMC-
AD), a method designed to efficiently identify faulty alarm logs in a mobile network and …

Massive scale streaming graphs: Evolving network analysis and mining

S Tabassum - 2020 - search.proquest.com
Abstract Social Network Analysis has become a core aspect of analyzing networks today. As
statistics blended with computer science gave rise to data mining in machine learning, so is …

Towards Explainable Machine Learning for Anomaly Detection in Real-World Contexts

A Barbado González - 2023 - oa.upm.es
Anomaly detection is a crucial task within many real-world applications since it can find
patterns in data that do not follow the expected behaviour. Consequently, it serves for …

Dynamic Behavior Pattern: Mining the Fraudsters in Telecom Network

D Li, L Zeng, R Hu, Z Huang, X Liang… - 2022 IEEE 24th Int Conf …, 2022 - ieeexplore.ieee.org
In telecom network fraud, the fraud method of the fraudsters varies significantly in different
periods. However, the traditional method of telecom fraud is to train the telecom fraud mining …