34. تاضذ؟ هی الزم تقلة تطخیع ترای ُداد کالى چرا
33
- Ad-hoc querying and reporting
- Data mining techniques
- Structured data, typical sources
- Small to mid-size datasets
- Optimizations and predictive analytics
- Complex statistical analysis
- All types of data, and many sources
- Very large datasets
- More of a real-time
33
40. 39
هراجغ
J.P.Morgan . (2014) .2014 AFP Payments Fraud and Control Survey , Report of Survey Results
www.ismgcorp.com
کارت تقلة هذیریت ّایسیستن تررسی.کار ٍ کسة هٌْذسی ٍ فٌاٍری هذیریت–آرر اًفَرهاتیک خذهات ضرکت94
The Forrester Wave™: Enterprise Fraud Management, Forrester, 2013
2015 IBM Corporation Fraud Detection & Management System A real time actionable counter fraud decision management system Antonio
Dell’Olio – Senior IT Architect Barbara Camandone – Client IT Manager
Montazer, G. A., & ArabYarmohammadi, S. (2015). Detection of phishing attacks in Iranian e-banking using a fuzzy–rough hybrid system. Applied
Soft Computing, 35, 482-492. doi:10.1016/j.asoc.2015.05.059
Alcaraz, C., Cazorla, L., & Fernandez, G. (2014). Context-Awareness Using Anomaly-Based Detectors for Smart Grid Domains. In Risks and
Security of Internet and Systems (pp. 17-34). Springer International Publishing. doi: 10.1007/978-3-319-17127-2_2
Pfitzmann, B., Powers, C., & Waidner, M. (2007). IBM’s Unified Governance Framework (UGF) Initiative. IBM Research Division. Research Report
RZ, 3699(99709), 10.
Kaisler, S. H., Espinosa, J. A., Armour, F., & Money, W. H. (2014, January). Advanced Analytics--Issues and Challenges in a Global Environment. In
System Sciences (HICSS), 2014 47th Hawaii International Conference on (pp. 729-738). IEEE.
Katal, A., Wazid, M., & Goudar, R. H. (2013, August). Big data: Issues, challenges, tools and Good practices. In Contemporary Computing (IC3),
2013 Sixth International Conference on (pp. 404-409). IEEE.
Mohanty, S., Jagadeesh, M., & Srivatsa, H. (2013). Big Data Imperatives: Enterprise ‘Big Data’Warehouse,‘BI’Implementations and Analytics.
Apress.
Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 15.
Doi:10.1145/1541880.1541882
Kovach.S, Ruggiero. W.V. (2011). Online Banking Fraud Detection Based on Local and Global Behavior. The Fifth International Conference on
Digital Society
29-43). ACM.
Dean, J., & Ghemawat, S. (2008). MapReduce: simplified data processing on large clusters. Communications of the ACM, 51(1), 107-113.