SlideShare a Scribd company logo
Using graph
technologies to fight
fraud.
SAS founded in 2013 in Paris | http://linkurio.us | @linkurious
French startup specialized in graph-visualization.
CTO
Web-scale archiving
Université de
Technologie de
Compiègne
CMO
>5 years in consulting
Sciences Po + Ecole
de Guerre
Economique
Jean
Villedieu
Sébastien
Heymann
David
Rapin
CEO
Created Gephi
Phd in CS and
complex systems
from UPMC
What is a graph?
Father Of
Father Of
Siblings
A graph is a set of nodes and relationships.
This is a node
This is a
relationship
Father Of
Father Of
Siblings
Why graphs are important?
Rise of complex and connected data.
Increase in
volume
New processes, more
transactions, more social
devices, more devices, etc.
Increase in
connectedness
Customers, products,
processes and devices
interact with each other.
Relational DBS are not
good at relationships.
● Cannot model data and relationships without
complexity;
● Performance degrades with number and levels
of relationships, and database size;
● Adding new types of data and relationships
requires schema redesign.
Graph DBs unlock
connected data.
● Store graphs of billions of nodes and edges;
● Query the graph to find interesting patterns;
● Popularity of graph databases has increased
500% in the last 2 years;
● Recommendation, fraud detection, network
management, cybersecurity, health...
Why does it work well for
fraud?
Layer 1 Layer 2 Layer 3 Layer 4 Layer 5
Endpoint-
centric
Navigation-
centric
Analysis of users
and their
endpoints
Account-
centric
Cross-
channels
Entity link
analysis
Analysis of
navigation
behavior and
suspect patterns
Analysis of
anomaly
behavior on a
per-channel
basis
Analysis of
anomaly
behavior
correlated on a
cross-channel
basis
Analysis of
relationships to
detect organized
collusion
Network analysis offers a unique opportunity to identify the sophisticated fraudsters who work under the radar
but in a coordinated fashion.
AML.
Normal customer #1
Normal customer #2
In business with
Suspicious individual Known criminal
In business with
In business with
Are my customers in contact
with criminals?
Conflict of interest.
Are my vendors linked to my
employees?
New vendor
Address
Employee
Registered address
Phone number
Registered phone Registered phone
Registered address
Synthetic identity.
Customer #1
Address
Customer #2
Phone number
Bank loan Bank loan
Am I loaning money to
people who don’t exist?
Swiss Leaks.
Finding the real owners of
$100 billion.
Real owner Pseudo owner Offshore entity Swiss bank account
Controls ControlsMarried
Stolen credit cards.
Customer #1
Merchant #3
Customer #2
Merchant #2
Merchant #1 Merchant #4
Who is stealing credit cards?
Normal TX
Contested TX Contested TX
Normal TX
Contested TX Contested TX
First enterprise-ready graph visualization platform.
Improve your fraud detection system.
Detect new
fraud cases.
Graph databases like Neo4j
provides the ability to identify
fraud patterns at scale.
Faster fraud
investigations.
Linkurious provides a simple
interface to investigate
suspicious patterns.
How it works.
Legacy DB
DB
On-premise server Web-browser
Pricing.
Starter Enterprise Toolkit
Search and explore your
data
Enterprise-ready security
and collaboration
Build or improve an
existing web application
Desktop Server Code
Single user Mature organization Mature organization
€990/user/year €1,990/user/year €30,000/product/year
Conclusion.
Question?
Want to know more?
● Insider trading: https://linkurio.us/using-graphs-to-uncover-insider-trading-schemes/
● Conflict of interest: https://linkurio.us/fraud-detection-identifying-conflicts-of-interest-with-graphs/
● Synthetic identify: https://linkurio.us/how-to-detect-bank-loan-fraud-with-graphs-part-1/ and
https://linkurio.us/how-to-detect-bank-loan-fraud-with-graphs-part-2/
● Ecommerce fraud: https://linkurio.us/reshipping-scams-and-network-visualization/
● Swiss Leaks: https://linkurio.us/how-the-icij-used-linkurious-to-reveal-the-secrets-hidden-in-the-
swiss-leaks-data/
● Fraud detection in retail: https://linkurio.us/fraud-detection-in-retail/
● Credit card fraud: https://linkurio.us/stolen-credit-cards-and-fraud-detection-with-neo4j/

More Related Content

What's hot

GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial FraudGraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
Neo4j
 
Finding answers through visualization (GraphDay Barcelona Feb 2016)
Finding answers through visualization (GraphDay Barcelona Feb 2016)Finding answers through visualization (GraphDay Barcelona Feb 2016)
Finding answers through visualization (GraphDay Barcelona Feb 2016)
Linkurious
 
Big Data is Dead, Long Live Big Data
Big Data is Dead, Long Live Big DataBig Data is Dead, Long Live Big Data
Big Data is Dead, Long Live Big Data
Mark van Rijmenam
 
The top 7 technology trends for 2018
The top 7 technology trends for 2018The top 7 technology trends for 2018
The top 7 technology trends for 2018
Mark van Rijmenam
 
CWIN17 New-York / adopting a cloud first strategy to fuel growth
CWIN17 New-York / adopting a cloud first strategy to fuel growthCWIN17 New-York / adopting a cloud first strategy to fuel growth
CWIN17 New-York / adopting a cloud first strategy to fuel growth
Capgemini
 
Atranstechnologypresentation
AtranstechnologypresentationAtranstechnologypresentation
Atranstechnologypresentation
NigelReid8
 
BDW16 London - Mark van Rijmenam, Datafloq - Big Data is Dead, Long Live Big ...
BDW16 London - Mark van Rijmenam, Datafloq - Big Data is Dead, Long Live Big ...BDW16 London - Mark van Rijmenam, Datafloq - Big Data is Dead, Long Live Big ...
BDW16 London - Mark van Rijmenam, Datafloq - Big Data is Dead, Long Live Big ...
Big Data Week
 
How to Win Customers with Predictive Analytics
How to Win Customers with Predictive AnalyticsHow to Win Customers with Predictive Analytics
How to Win Customers with Predictive Analytics
Mark van Rijmenam
 
Software Industry Trends 2020
Software Industry Trends 2020Software Industry Trends 2020
Software Industry Trends 2020
Mohammad Alashmawi
 
InsideView Clean Data
InsideView Clean DataInsideView Clean Data
InsideView Clean Data
InsideView
 
Gov.uk Verify - The Journey So Far
Gov.uk Verify - The Journey So FarGov.uk Verify - The Journey So Far
Gov.uk Verify - The Journey So Far
ForgeRock Identity Tech Talks
 
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An InfographicTop 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
InApp
 
What Does 2018 Have In Store For The Big Data Industry
What Does 2018 Have In Store For The Big Data IndustryWhat Does 2018 Have In Store For The Big Data Industry
What Does 2018 Have In Store For The Big Data Industry
PromptCloud
 
Big data
Big dataBig data
Big data
Abdullah Masoud
 
Data article
Data articleData article
Data article
Will Klopp
 
Big data Keynote Africa's Payment Banking Retail Show 2015
Big data Keynote Africa's Payment Banking Retail Show 2015Big data Keynote Africa's Payment Banking Retail Show 2015
Big data Keynote Africa's Payment Banking Retail Show 2015
Mark van Rijmenam
 
Ppt3 copy
Ppt3  copyPpt3  copy
Ppt3 copy
rahulmore7477
 
UX STRAT 2013: Aarron Walter, Connected UX
UX STRAT 2013: Aarron Walter, Connected UX UX STRAT 2013: Aarron Walter, Connected UX
UX STRAT 2013: Aarron Walter, Connected UX
UX STRAT
 
Sources of data collection for business applications
Sources of data collection for business applicationsSources of data collection for business applications
Sources of data collection for business applications
PromptCloud
 
Why should I give RP Data my data
Why should I give RP Data my dataWhy should I give RP Data my data
Why should I give RP Data my data
Peter Bromley
 

What's hot (20)

GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial FraudGraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
 
Finding answers through visualization (GraphDay Barcelona Feb 2016)
Finding answers through visualization (GraphDay Barcelona Feb 2016)Finding answers through visualization (GraphDay Barcelona Feb 2016)
Finding answers through visualization (GraphDay Barcelona Feb 2016)
 
Big Data is Dead, Long Live Big Data
Big Data is Dead, Long Live Big DataBig Data is Dead, Long Live Big Data
Big Data is Dead, Long Live Big Data
 
The top 7 technology trends for 2018
The top 7 technology trends for 2018The top 7 technology trends for 2018
The top 7 technology trends for 2018
 
CWIN17 New-York / adopting a cloud first strategy to fuel growth
CWIN17 New-York / adopting a cloud first strategy to fuel growthCWIN17 New-York / adopting a cloud first strategy to fuel growth
CWIN17 New-York / adopting a cloud first strategy to fuel growth
 
Atranstechnologypresentation
AtranstechnologypresentationAtranstechnologypresentation
Atranstechnologypresentation
 
BDW16 London - Mark van Rijmenam, Datafloq - Big Data is Dead, Long Live Big ...
BDW16 London - Mark van Rijmenam, Datafloq - Big Data is Dead, Long Live Big ...BDW16 London - Mark van Rijmenam, Datafloq - Big Data is Dead, Long Live Big ...
BDW16 London - Mark van Rijmenam, Datafloq - Big Data is Dead, Long Live Big ...
 
How to Win Customers with Predictive Analytics
How to Win Customers with Predictive AnalyticsHow to Win Customers with Predictive Analytics
How to Win Customers with Predictive Analytics
 
Software Industry Trends 2020
Software Industry Trends 2020Software Industry Trends 2020
Software Industry Trends 2020
 
InsideView Clean Data
InsideView Clean DataInsideView Clean Data
InsideView Clean Data
 
Gov.uk Verify - The Journey So Far
Gov.uk Verify - The Journey So FarGov.uk Verify - The Journey So Far
Gov.uk Verify - The Journey So Far
 
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An InfographicTop 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
 
What Does 2018 Have In Store For The Big Data Industry
What Does 2018 Have In Store For The Big Data IndustryWhat Does 2018 Have In Store For The Big Data Industry
What Does 2018 Have In Store For The Big Data Industry
 
Big data
Big dataBig data
Big data
 
Data article
Data articleData article
Data article
 
Big data Keynote Africa's Payment Banking Retail Show 2015
Big data Keynote Africa's Payment Banking Retail Show 2015Big data Keynote Africa's Payment Banking Retail Show 2015
Big data Keynote Africa's Payment Banking Retail Show 2015
 
Ppt3 copy
Ppt3  copyPpt3  copy
Ppt3 copy
 
UX STRAT 2013: Aarron Walter, Connected UX
UX STRAT 2013: Aarron Walter, Connected UX UX STRAT 2013: Aarron Walter, Connected UX
UX STRAT 2013: Aarron Walter, Connected UX
 
Sources of data collection for business applications
Sources of data collection for business applicationsSources of data collection for business applications
Sources of data collection for business applications
 
Why should I give RP Data my data
Why should I give RP Data my dataWhy should I give RP Data my data
Why should I give RP Data my data
 

Viewers also liked

Visualizing an anti-money laundering investigation
Visualizing an anti-money laundering investigationVisualizing an anti-money laundering investigation
Visualizing an anti-money laundering investigation
Linkurious
 
Graph visualization options and latest developments
Graph visualization options and latest developmentsGraph visualization options and latest developments
Graph visualization options and latest developments
Linkurious
 
Cyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsCyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analytics
Linkurious
 
Introduction to the graph technologies landscape
Introduction to the graph technologies landscapeIntroduction to the graph technologies landscape
Introduction to the graph technologies landscape
Linkurious
 
Reinforcing AML systems with graph technologies.
Reinforcing AML systems with graph technologies.Reinforcing AML systems with graph technologies.
Reinforcing AML systems with graph technologies.
Linkurious
 
Aerospike Architecture
Aerospike ArchitectureAerospike Architecture
Aerospike Architecture
Peter Milne
 
Content curation
Content curationContent curation
Content curation
techiesue
 
An overview of mobile html + java script frameworks
An overview of mobile html + java script frameworksAn overview of mobile html + java script frameworks
An overview of mobile html + java script frameworks
Sasha dos Santos
 
Qr codes + ipads
Qr codes + ipadsQr codes + ipads
Qr codes + ipads
techiesue
 
Cell Phone Jammer , Intro
Cell Phone Jammer , IntroCell Phone Jammer , Intro
Cell Phone Jammer , Intro
Lakshman Basnet
 
Serious Games + Computer Science = Serious CS
Serious Games + Computer Science = Serious CSSerious Games + Computer Science = Serious CS
Serious Games + Computer Science = Serious CS
Katrin Becker
 
NoSQL Application Development with JSON and MapR-DB
NoSQL Application Development with JSON and MapR-DBNoSQL Application Development with JSON and MapR-DB
NoSQL Application Development with JSON and MapR-DB
MapR Technologies
 
Dossier presentation bmr_associés
Dossier presentation bmr_associésDossier presentation bmr_associés
Dossier presentation bmr_associés
Marjorie KIENTZLER
 
Introduction to OpenCV
Introduction to OpenCVIntroduction to OpenCV
Introduction to OpenCV
Amit Mandelbaum
 
Navigating large graphs like a breeze with Linkurious
Navigating large graphs like a breeze with LinkuriousNavigating large graphs like a breeze with Linkurious
Navigating large graphs like a breeze with Linkurious
Linkurious
 
La visualisation au service de la lutte contre la fraude
La visualisation au service de la lutte contre la fraudeLa visualisation au service de la lutte contre la fraude
La visualisation au service de la lutte contre la fraude
Linkurious
 
Teaching ML with scikit-learn at Telecom ParisTech
Teaching ML with scikit-learn at Telecom ParisTechTeaching ML with scikit-learn at Telecom ParisTech
Teaching ML with scikit-learn at Telecom ParisTech
agramfort
 
12th CBSE Computer Science Project
12th CBSE Computer Science Project  12th CBSE Computer Science Project
12th CBSE Computer Science Project
Ashwin Francis
 
Anomaly/Novelty detection with scikit-learn
Anomaly/Novelty detection with scikit-learnAnomaly/Novelty detection with scikit-learn
Anomaly/Novelty detection with scikit-learn
agramfort
 
Panama papers: how ICIJ used Linkurious to investigate the Mossack Fonseca leaks
Panama papers: how ICIJ used Linkurious to investigate the Mossack Fonseca leaksPanama papers: how ICIJ used Linkurious to investigate the Mossack Fonseca leaks
Panama papers: how ICIJ used Linkurious to investigate the Mossack Fonseca leaks
Linkurious
 

Viewers also liked (20)

Visualizing an anti-money laundering investigation
Visualizing an anti-money laundering investigationVisualizing an anti-money laundering investigation
Visualizing an anti-money laundering investigation
 
Graph visualization options and latest developments
Graph visualization options and latest developmentsGraph visualization options and latest developments
Graph visualization options and latest developments
 
Cyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsCyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analytics
 
Introduction to the graph technologies landscape
Introduction to the graph technologies landscapeIntroduction to the graph technologies landscape
Introduction to the graph technologies landscape
 
Reinforcing AML systems with graph technologies.
Reinforcing AML systems with graph technologies.Reinforcing AML systems with graph technologies.
Reinforcing AML systems with graph technologies.
 
Aerospike Architecture
Aerospike ArchitectureAerospike Architecture
Aerospike Architecture
 
Content curation
Content curationContent curation
Content curation
 
An overview of mobile html + java script frameworks
An overview of mobile html + java script frameworksAn overview of mobile html + java script frameworks
An overview of mobile html + java script frameworks
 
Qr codes + ipads
Qr codes + ipadsQr codes + ipads
Qr codes + ipads
 
Cell Phone Jammer , Intro
Cell Phone Jammer , IntroCell Phone Jammer , Intro
Cell Phone Jammer , Intro
 
Serious Games + Computer Science = Serious CS
Serious Games + Computer Science = Serious CSSerious Games + Computer Science = Serious CS
Serious Games + Computer Science = Serious CS
 
NoSQL Application Development with JSON and MapR-DB
NoSQL Application Development with JSON and MapR-DBNoSQL Application Development with JSON and MapR-DB
NoSQL Application Development with JSON and MapR-DB
 
Dossier presentation bmr_associés
Dossier presentation bmr_associésDossier presentation bmr_associés
Dossier presentation bmr_associés
 
Introduction to OpenCV
Introduction to OpenCVIntroduction to OpenCV
Introduction to OpenCV
 
Navigating large graphs like a breeze with Linkurious
Navigating large graphs like a breeze with LinkuriousNavigating large graphs like a breeze with Linkurious
Navigating large graphs like a breeze with Linkurious
 
La visualisation au service de la lutte contre la fraude
La visualisation au service de la lutte contre la fraudeLa visualisation au service de la lutte contre la fraude
La visualisation au service de la lutte contre la fraude
 
Teaching ML with scikit-learn at Telecom ParisTech
Teaching ML with scikit-learn at Telecom ParisTechTeaching ML with scikit-learn at Telecom ParisTech
Teaching ML with scikit-learn at Telecom ParisTech
 
12th CBSE Computer Science Project
12th CBSE Computer Science Project  12th CBSE Computer Science Project
12th CBSE Computer Science Project
 
Anomaly/Novelty detection with scikit-learn
Anomaly/Novelty detection with scikit-learnAnomaly/Novelty detection with scikit-learn
Anomaly/Novelty detection with scikit-learn
 
Panama papers: how ICIJ used Linkurious to investigate the Mossack Fonseca leaks
Panama papers: how ICIJ used Linkurious to investigate the Mossack Fonseca leaksPanama papers: how ICIJ used Linkurious to investigate the Mossack Fonseca leaks
Panama papers: how ICIJ used Linkurious to investigate the Mossack Fonseca leaks
 

Similar to Using graph technologies to fight fraud

Detecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousDetecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and Linkurious
Neo4j
 
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdfNeo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j
 
Digital Transformation and the Journey to a Highly Connected Enterprise
Digital Transformation and the Journey to a Highly Connected EnterpriseDigital Transformation and the Journey to a Highly Connected Enterprise
Digital Transformation and the Journey to a Highly Connected Enterprise
Neo4j
 
Connections Drive Digital Transformation
Connections Drive Digital TransformationConnections Drive Digital Transformation
Connections Drive Digital Transformation
Neo4j
 
Kick start graph visualization projects
Kick start graph visualization projectsKick start graph visualization projects
Kick start graph visualization projects
Linkurious
 
CWIN17 New-York / a best customer or worst nightmare putting ai to work for...
CWIN17 New-York / a best customer or worst nightmare   putting ai to work for...CWIN17 New-York / a best customer or worst nightmare   putting ai to work for...
CWIN17 New-York / a best customer or worst nightmare putting ai to work for...
Capgemini
 
The 10 most trusted fraud detection solution providers 2019
The 10 most trusted fraud detection solution providers 2019The 10 most trusted fraud detection solution providers 2019
The 10 most trusted fraud detection solution providers 2019
Insights success media and technology pvt ltd
 
How Graphs Continue to Revolutionize The Prevention of Financial Crime & Frau...
How Graphs Continue to Revolutionize The Prevention of Financial Crime & Frau...How Graphs Continue to Revolutionize The Prevention of Financial Crime & Frau...
How Graphs Continue to Revolutionize The Prevention of Financial Crime & Frau...
Connected Data World
 
FinTech Belgium Summit 2018 - Vadis Technologies - Jean-François Heering
FinTech Belgium Summit 2018 - Vadis Technologies - Jean-François HeeringFinTech Belgium Summit 2018 - Vadis Technologies - Jean-François Heering
FinTech Belgium Summit 2018 - Vadis Technologies - Jean-François Heering
FinTech Belgium
 
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdfRabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j
 
apidays New York 2023 - API Adventures in Embedded Finance, Jason Kobus, JPMo...
apidays New York 2023 - API Adventures in Embedded Finance, Jason Kobus, JPMo...apidays New York 2023 - API Adventures in Embedded Finance, Jason Kobus, JPMo...
apidays New York 2023 - API Adventures in Embedded Finance, Jason Kobus, JPMo...
apidays
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Perficient, Inc.
 
Analytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface lookAnalytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface look
Deloitte Canada
 
A visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe FrancavillaA visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe Francavilla
Data Driven Innovation
 
Graph+AI for Fin. Services
Graph+AI for Fin. ServicesGraph+AI for Fin. Services
Graph+AI for Fin. Services
TigerGraph
 
Graphs in Government
Graphs in GovernmentGraphs in Government
Graphs in Government
Neo4j
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
gauravmiishra701
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
NishantSisodiya
 
Forensic Technology & Discovery Services: The Intelligent Connection - EY India
Forensic Technology & Discovery Services: The Intelligent Connection - EY IndiaForensic Technology & Discovery Services: The Intelligent Connection - EY India
Forensic Technology & Discovery Services: The Intelligent Connection - EY India
sathish kriishnan
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
NishantSisodiya
 

Similar to Using graph technologies to fight fraud (20)

Detecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousDetecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and Linkurious
 
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdfNeo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
 
Digital Transformation and the Journey to a Highly Connected Enterprise
Digital Transformation and the Journey to a Highly Connected EnterpriseDigital Transformation and the Journey to a Highly Connected Enterprise
Digital Transformation and the Journey to a Highly Connected Enterprise
 
Connections Drive Digital Transformation
Connections Drive Digital TransformationConnections Drive Digital Transformation
Connections Drive Digital Transformation
 
Kick start graph visualization projects
Kick start graph visualization projectsKick start graph visualization projects
Kick start graph visualization projects
 
CWIN17 New-York / a best customer or worst nightmare putting ai to work for...
CWIN17 New-York / a best customer or worst nightmare   putting ai to work for...CWIN17 New-York / a best customer or worst nightmare   putting ai to work for...
CWIN17 New-York / a best customer or worst nightmare putting ai to work for...
 
The 10 most trusted fraud detection solution providers 2019
The 10 most trusted fraud detection solution providers 2019The 10 most trusted fraud detection solution providers 2019
The 10 most trusted fraud detection solution providers 2019
 
How Graphs Continue to Revolutionize The Prevention of Financial Crime & Frau...
How Graphs Continue to Revolutionize The Prevention of Financial Crime & Frau...How Graphs Continue to Revolutionize The Prevention of Financial Crime & Frau...
How Graphs Continue to Revolutionize The Prevention of Financial Crime & Frau...
 
FinTech Belgium Summit 2018 - Vadis Technologies - Jean-François Heering
FinTech Belgium Summit 2018 - Vadis Technologies - Jean-François HeeringFinTech Belgium Summit 2018 - Vadis Technologies - Jean-François Heering
FinTech Belgium Summit 2018 - Vadis Technologies - Jean-François Heering
 
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdfRabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
 
apidays New York 2023 - API Adventures in Embedded Finance, Jason Kobus, JPMo...
apidays New York 2023 - API Adventures in Embedded Finance, Jason Kobus, JPMo...apidays New York 2023 - API Adventures in Embedded Finance, Jason Kobus, JPMo...
apidays New York 2023 - API Adventures in Embedded Finance, Jason Kobus, JPMo...
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Analytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface lookAnalytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface look
 
A visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe FrancavillaA visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe Francavilla
 
Graph+AI for Fin. Services
Graph+AI for Fin. ServicesGraph+AI for Fin. Services
Graph+AI for Fin. Services
 
Graphs in Government
Graphs in GovernmentGraphs in Government
Graphs in Government
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
 
Forensic Technology & Discovery Services: The Intelligent Connection - EY India
Forensic Technology & Discovery Services: The Intelligent Connection - EY IndiaForensic Technology & Discovery Services: The Intelligent Connection - EY India
Forensic Technology & Discovery Services: The Intelligent Connection - EY India
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
 

More from Linkurious

Using graph technology for multi-INT investigations
Using graph technology for multi-INT investigationsUsing graph technology for multi-INT investigations
Using graph technology for multi-INT investigations
Linkurious
 
Webinar: What's new in Linkurious Enterprise 2.8
Webinar: What's new in Linkurious Enterprise 2.8Webinar: What's new in Linkurious Enterprise 2.8
Webinar: What's new in Linkurious Enterprise 2.8
Linkurious
 
Graph-based intelligence analysis
Graph-based intelligence analysis Graph-based intelligence analysis
Graph-based intelligence analysis
Linkurious
 
What's new in Linkurious Enterprise 2.7
What's new in Linkurious Enterprise 2.7What's new in Linkurious Enterprise 2.7
What's new in Linkurious Enterprise 2.7
Linkurious
 
How to visualize Cosmos DB graph data
How to visualize Cosmos DB graph dataHow to visualize Cosmos DB graph data
How to visualize Cosmos DB graph data
Linkurious
 
GraphTech Ecosystem - part 3: Graph Visualization
GraphTech Ecosystem - part 3: Graph VisualizationGraphTech Ecosystem - part 3: Graph Visualization
GraphTech Ecosystem - part 3: Graph Visualization
Linkurious
 
Getting started with Cosmos DB + Linkurious Enterprise
Getting started with Cosmos DB + Linkurious EnterpriseGetting started with Cosmos DB + Linkurious Enterprise
Getting started with Cosmos DB + Linkurious Enterprise
Linkurious
 
GraphTech Ecosystem - part 2: Graph Analytics
 GraphTech Ecosystem - part 2: Graph Analytics GraphTech Ecosystem - part 2: Graph Analytics
GraphTech Ecosystem - part 2: Graph Analytics
Linkurious
 
GraphTech Ecosystem - part 1: Graph Databases
GraphTech Ecosystem - part 1: Graph DatabasesGraphTech Ecosystem - part 1: Graph Databases
GraphTech Ecosystem - part 1: Graph Databases
Linkurious
 
3 types of fraud graph analytics can help defeat
3 types of fraud graph analytics can help defeat3 types of fraud graph analytics can help defeat
3 types of fraud graph analytics can help defeat
Linkurious
 
Graph analytics in Linkurious Enterprise
Graph analytics in Linkurious EnterpriseGraph analytics in Linkurious Enterprise
Graph analytics in Linkurious Enterprise
Linkurious
 
Graph technology and data-journalism: the case of the Paradise Papers
Graph technology and data-journalism: the case of the Paradise PapersGraph technology and data-journalism: the case of the Paradise Papers
Graph technology and data-journalism: the case of the Paradise Papers
Linkurious
 
Visualize the Knowledge Graph and Unleash Your Data
Visualize the Knowledge Graph and Unleash Your DataVisualize the Knowledge Graph and Unleash Your Data
Visualize the Knowledge Graph and Unleash Your Data
Linkurious
 
Graph-based Product Lifecycle Management
Graph-based Product Lifecycle ManagementGraph-based Product Lifecycle Management
Graph-based Product Lifecycle Management
Linkurious
 
Fraudes Financières: Méthodes de Prévention et Détection
Fraudes Financières: Méthodes de Prévention et DétectionFraudes Financières: Méthodes de Prévention et Détection
Fraudes Financières: Méthodes de Prévention et Détection
Linkurious
 
Detecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousDetecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and Linkurious
Linkurious
 
Graph-based Network & IT Management.
Graph-based Network & IT Management.Graph-based Network & IT Management.
Graph-based Network & IT Management.
Linkurious
 
Graph-powered data lineage in Finance
Graph-powered data lineage in FinanceGraph-powered data lineage in Finance
Graph-powered data lineage in Finance
Linkurious
 
Using Linkurious in your Enterprise Architecture projects
Using Linkurious in your Enterprise Architecture projectsUsing Linkurious in your Enterprise Architecture projects
Using Linkurious in your Enterprise Architecture projects
Linkurious
 
Linkurious SDK: Build enterprise-ready graph applications faster
Linkurious SDK: Build enterprise-ready graph applications fasterLinkurious SDK: Build enterprise-ready graph applications faster
Linkurious SDK: Build enterprise-ready graph applications faster
Linkurious
 

More from Linkurious (20)

Using graph technology for multi-INT investigations
Using graph technology for multi-INT investigationsUsing graph technology for multi-INT investigations
Using graph technology for multi-INT investigations
 
Webinar: What's new in Linkurious Enterprise 2.8
Webinar: What's new in Linkurious Enterprise 2.8Webinar: What's new in Linkurious Enterprise 2.8
Webinar: What's new in Linkurious Enterprise 2.8
 
Graph-based intelligence analysis
Graph-based intelligence analysis Graph-based intelligence analysis
Graph-based intelligence analysis
 
What's new in Linkurious Enterprise 2.7
What's new in Linkurious Enterprise 2.7What's new in Linkurious Enterprise 2.7
What's new in Linkurious Enterprise 2.7
 
How to visualize Cosmos DB graph data
How to visualize Cosmos DB graph dataHow to visualize Cosmos DB graph data
How to visualize Cosmos DB graph data
 
GraphTech Ecosystem - part 3: Graph Visualization
GraphTech Ecosystem - part 3: Graph VisualizationGraphTech Ecosystem - part 3: Graph Visualization
GraphTech Ecosystem - part 3: Graph Visualization
 
Getting started with Cosmos DB + Linkurious Enterprise
Getting started with Cosmos DB + Linkurious EnterpriseGetting started with Cosmos DB + Linkurious Enterprise
Getting started with Cosmos DB + Linkurious Enterprise
 
GraphTech Ecosystem - part 2: Graph Analytics
 GraphTech Ecosystem - part 2: Graph Analytics GraphTech Ecosystem - part 2: Graph Analytics
GraphTech Ecosystem - part 2: Graph Analytics
 
GraphTech Ecosystem - part 1: Graph Databases
GraphTech Ecosystem - part 1: Graph DatabasesGraphTech Ecosystem - part 1: Graph Databases
GraphTech Ecosystem - part 1: Graph Databases
 
3 types of fraud graph analytics can help defeat
3 types of fraud graph analytics can help defeat3 types of fraud graph analytics can help defeat
3 types of fraud graph analytics can help defeat
 
Graph analytics in Linkurious Enterprise
Graph analytics in Linkurious EnterpriseGraph analytics in Linkurious Enterprise
Graph analytics in Linkurious Enterprise
 
Graph technology and data-journalism: the case of the Paradise Papers
Graph technology and data-journalism: the case of the Paradise PapersGraph technology and data-journalism: the case of the Paradise Papers
Graph technology and data-journalism: the case of the Paradise Papers
 
Visualize the Knowledge Graph and Unleash Your Data
Visualize the Knowledge Graph and Unleash Your DataVisualize the Knowledge Graph and Unleash Your Data
Visualize the Knowledge Graph and Unleash Your Data
 
Graph-based Product Lifecycle Management
Graph-based Product Lifecycle ManagementGraph-based Product Lifecycle Management
Graph-based Product Lifecycle Management
 
Fraudes Financières: Méthodes de Prévention et Détection
Fraudes Financières: Méthodes de Prévention et DétectionFraudes Financières: Méthodes de Prévention et Détection
Fraudes Financières: Méthodes de Prévention et Détection
 
Detecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousDetecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and Linkurious
 
Graph-based Network & IT Management.
Graph-based Network & IT Management.Graph-based Network & IT Management.
Graph-based Network & IT Management.
 
Graph-powered data lineage in Finance
Graph-powered data lineage in FinanceGraph-powered data lineage in Finance
Graph-powered data lineage in Finance
 
Using Linkurious in your Enterprise Architecture projects
Using Linkurious in your Enterprise Architecture projectsUsing Linkurious in your Enterprise Architecture projects
Using Linkurious in your Enterprise Architecture projects
 
Linkurious SDK: Build enterprise-ready graph applications faster
Linkurious SDK: Build enterprise-ready graph applications fasterLinkurious SDK: Build enterprise-ready graph applications faster
Linkurious SDK: Build enterprise-ready graph applications faster
 

Recently uploaded

Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Aggregage
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
ElizabethGarrettChri
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
Timothy Spann
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
jitskeb
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
AlessioFois2
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
apvysm8
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
Bill641377
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
nuttdpt
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
vikram sood
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
Sachin Paul
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
xclpvhuk
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
Timothy Spann
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
aqzctr7x
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
AndrzejJarynowski
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
Lars Albertsson
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
bopyb
 

Recently uploaded (20)

Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
 

Using graph technologies to fight fraud

  • 1. Using graph technologies to fight fraud. SAS founded in 2013 in Paris | http://linkurio.us | @linkurious
  • 2. French startup specialized in graph-visualization. CTO Web-scale archiving Université de Technologie de Compiègne CMO >5 years in consulting Sciences Po + Ecole de Guerre Economique Jean Villedieu Sébastien Heymann David Rapin CEO Created Gephi Phd in CS and complex systems from UPMC
  • 3. What is a graph? Father Of Father Of Siblings
  • 4. A graph is a set of nodes and relationships. This is a node This is a relationship Father Of Father Of Siblings
  • 5. Why graphs are important?
  • 6. Rise of complex and connected data. Increase in volume New processes, more transactions, more social devices, more devices, etc. Increase in connectedness Customers, products, processes and devices interact with each other.
  • 7. Relational DBS are not good at relationships. ● Cannot model data and relationships without complexity; ● Performance degrades with number and levels of relationships, and database size; ● Adding new types of data and relationships requires schema redesign.
  • 8. Graph DBs unlock connected data. ● Store graphs of billions of nodes and edges; ● Query the graph to find interesting patterns; ● Popularity of graph databases has increased 500% in the last 2 years; ● Recommendation, fraud detection, network management, cybersecurity, health...
  • 9. Why does it work well for fraud?
  • 10. Layer 1 Layer 2 Layer 3 Layer 4 Layer 5 Endpoint- centric Navigation- centric Analysis of users and their endpoints Account- centric Cross- channels Entity link analysis Analysis of navigation behavior and suspect patterns Analysis of anomaly behavior on a per-channel basis Analysis of anomaly behavior correlated on a cross-channel basis Analysis of relationships to detect organized collusion Network analysis offers a unique opportunity to identify the sophisticated fraudsters who work under the radar but in a coordinated fashion.
  • 11. AML. Normal customer #1 Normal customer #2 In business with Suspicious individual Known criminal In business with In business with Are my customers in contact with criminals?
  • 12. Conflict of interest. Are my vendors linked to my employees? New vendor Address Employee Registered address Phone number Registered phone Registered phone Registered address
  • 13. Synthetic identity. Customer #1 Address Customer #2 Phone number Bank loan Bank loan Am I loaning money to people who don’t exist?
  • 14. Swiss Leaks. Finding the real owners of $100 billion. Real owner Pseudo owner Offshore entity Swiss bank account Controls ControlsMarried
  • 15. Stolen credit cards. Customer #1 Merchant #3 Customer #2 Merchant #2 Merchant #1 Merchant #4 Who is stealing credit cards? Normal TX Contested TX Contested TX Normal TX Contested TX Contested TX
  • 16. First enterprise-ready graph visualization platform.
  • 17. Improve your fraud detection system. Detect new fraud cases. Graph databases like Neo4j provides the ability to identify fraud patterns at scale. Faster fraud investigations. Linkurious provides a simple interface to investigate suspicious patterns.
  • 18. How it works. Legacy DB DB On-premise server Web-browser
  • 19. Pricing. Starter Enterprise Toolkit Search and explore your data Enterprise-ready security and collaboration Build or improve an existing web application Desktop Server Code Single user Mature organization Mature organization €990/user/year €1,990/user/year €30,000/product/year
  • 21. Want to know more? ● Insider trading: https://linkurio.us/using-graphs-to-uncover-insider-trading-schemes/ ● Conflict of interest: https://linkurio.us/fraud-detection-identifying-conflicts-of-interest-with-graphs/ ● Synthetic identify: https://linkurio.us/how-to-detect-bank-loan-fraud-with-graphs-part-1/ and https://linkurio.us/how-to-detect-bank-loan-fraud-with-graphs-part-2/ ● Ecommerce fraud: https://linkurio.us/reshipping-scams-and-network-visualization/ ● Swiss Leaks: https://linkurio.us/how-the-icij-used-linkurious-to-reveal-the-secrets-hidden-in-the- swiss-leaks-data/ ● Fraud detection in retail: https://linkurio.us/fraud-detection-in-retail/ ● Credit card fraud: https://linkurio.us/stolen-credit-cards-and-fraud-detection-with-neo4j/