Submit Search
Upload
Graph Gurus Episode 4: Detecting Fraud and Money Laudering in Real-Time Part 2
•
0 likes
•
179 views
TigerGraph
Follow
Detecting Fraud and Money Laudering in Real-Time Part 2
Read less
Read more
Software
Report
Share
Report
Share
1 of 38
Download now
Download to read offline
Recommended
Graph Databases and Machine Learning | November 2018
Graph Databases and Machine Learning | November 2018
TigerGraph
Graph Gurus Episode 3: Anti Fraud and AML Part 1
Graph Gurus Episode 3: Anti Fraud and AML Part 1
TigerGraph
Tiger graph 2021 corporate overview [read only]
Tiger graph 2021 corporate overview [read only]
ercan5
New! Neo4j AuraDS: The Fastest Way to Get Started with Data Science in the Cloud
New! Neo4j AuraDS: The Fastest Way to Get Started with Data Science in the Cloud
Neo4j
The Knowledge Graph Explosion
The Knowledge Graph Explosion
Neo4j
Comparing three data ingestion approaches where Apache Kafka integrates with ...
Comparing three data ingestion approaches where Apache Kafka integrates with ...
HostedbyConfluent
TigerGraph UI Toolkits Financial Crimes
TigerGraph UI Toolkits Financial Crimes
TigerGraph
Neo4j GraphSummit London March 2023 Emil Eifrem Keynote.pptx
Neo4j GraphSummit London March 2023 Emil Eifrem Keynote.pptx
Neo4j
Recommended
Graph Databases and Machine Learning | November 2018
Graph Databases and Machine Learning | November 2018
TigerGraph
Graph Gurus Episode 3: Anti Fraud and AML Part 1
Graph Gurus Episode 3: Anti Fraud and AML Part 1
TigerGraph
Tiger graph 2021 corporate overview [read only]
Tiger graph 2021 corporate overview [read only]
ercan5
New! Neo4j AuraDS: The Fastest Way to Get Started with Data Science in the Cloud
New! Neo4j AuraDS: The Fastest Way to Get Started with Data Science in the Cloud
Neo4j
The Knowledge Graph Explosion
The Knowledge Graph Explosion
Neo4j
Comparing three data ingestion approaches where Apache Kafka integrates with ...
Comparing three data ingestion approaches where Apache Kafka integrates with ...
HostedbyConfluent
TigerGraph UI Toolkits Financial Crimes
TigerGraph UI Toolkits Financial Crimes
TigerGraph
Neo4j GraphSummit London March 2023 Emil Eifrem Keynote.pptx
Neo4j GraphSummit London March 2023 Emil Eifrem Keynote.pptx
Neo4j
Graph-Based Network Topology Analysis for Telecom Operators
Graph-Based Network Topology Analysis for Telecom Operators
Neo4j
Kafka + Uber- The World’s Realtime Transit Infrastructure, Aaron Schildkrout
Kafka + Uber- The World’s Realtime Transit Infrastructure, Aaron Schildkrout
confluent
What is Differential Privacy?
What is Differential Privacy?
Georgian
Real-time Fraud Detection for Southeast Asia’s Leading Mobile Platform
Real-time Fraud Detection for Southeast Asia’s Leading Mobile Platform
ScyllaDB
AWS Neptune - A Fast and reliable Graph Database Built for the Cloud
AWS Neptune - A Fast and reliable Graph Database Built for the Cloud
Amazon Web Services
A Universe of Knowledge Graphs
A Universe of Knowledge Graphs
Neo4j
Försäkringskassan: Neo4j as an Information Hub (GraphSummit Stockholm 2023)
Försäkringskassan: Neo4j as an Information Hub (GraphSummit Stockholm 2023)
Neo4j
Storing State Forever: Why It Can Be Good For Your Analytics
Storing State Forever: Why It Can Be Good For Your Analytics
Yaroslav Tkachenko
DAS Slides: Data Governance - Combining Data Management with Organizational ...
DAS Slides: Data Governance - Combining Data Management with Organizational ...
DATAVERSITY
Expectation maximization
Expectation maximization
LALAOUIBENCHERIFSIDI
Graphs for Enterprise Architects
Graphs for Enterprise Architects
Neo4j
The delta architecture
The delta architecture
Prakash Chockalingam
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...
Simplilearn
Spark Summit EU 2015: Lessons from 300+ production users
Spark Summit EU 2015: Lessons from 300+ production users
Databricks
It's Time To Stop Using Lambda Architecture
It's Time To Stop Using Lambda Architecture
Yaroslav Tkachenko
Neo4j Graph Use Cases, Bruno Ungermann, Neo4j
Neo4j Graph Use Cases, Bruno Ungermann, Neo4j
Neo4j
Graph Gurus 15: Introducing TigerGraph 2.4
Graph Gurus 15: Introducing TigerGraph 2.4
TigerGraph
Workshop - Build a Graph Solution
Workshop - Build a Graph Solution
Neo4j
The Data Platform for Today’s Intelligent Applications
The Data Platform for Today’s Intelligent Applications
Neo4j
Graph and Amazon Neptune
Graph and Amazon Neptune
Amazon Web Services
Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
TigerGraph
InfluxDB 101 – Concepts and Architecture by Michael DeSa, Software Engineer |...
InfluxDB 101 – Concepts and Architecture by Michael DeSa, Software Engineer |...
InfluxData
More Related Content
What's hot
Graph-Based Network Topology Analysis for Telecom Operators
Graph-Based Network Topology Analysis for Telecom Operators
Neo4j
Kafka + Uber- The World’s Realtime Transit Infrastructure, Aaron Schildkrout
Kafka + Uber- The World’s Realtime Transit Infrastructure, Aaron Schildkrout
confluent
What is Differential Privacy?
What is Differential Privacy?
Georgian
Real-time Fraud Detection for Southeast Asia’s Leading Mobile Platform
Real-time Fraud Detection for Southeast Asia’s Leading Mobile Platform
ScyllaDB
AWS Neptune - A Fast and reliable Graph Database Built for the Cloud
AWS Neptune - A Fast and reliable Graph Database Built for the Cloud
Amazon Web Services
A Universe of Knowledge Graphs
A Universe of Knowledge Graphs
Neo4j
Försäkringskassan: Neo4j as an Information Hub (GraphSummit Stockholm 2023)
Försäkringskassan: Neo4j as an Information Hub (GraphSummit Stockholm 2023)
Neo4j
Storing State Forever: Why It Can Be Good For Your Analytics
Storing State Forever: Why It Can Be Good For Your Analytics
Yaroslav Tkachenko
DAS Slides: Data Governance - Combining Data Management with Organizational ...
DAS Slides: Data Governance - Combining Data Management with Organizational ...
DATAVERSITY
Expectation maximization
Expectation maximization
LALAOUIBENCHERIFSIDI
Graphs for Enterprise Architects
Graphs for Enterprise Architects
Neo4j
The delta architecture
The delta architecture
Prakash Chockalingam
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...
Simplilearn
Spark Summit EU 2015: Lessons from 300+ production users
Spark Summit EU 2015: Lessons from 300+ production users
Databricks
It's Time To Stop Using Lambda Architecture
It's Time To Stop Using Lambda Architecture
Yaroslav Tkachenko
Neo4j Graph Use Cases, Bruno Ungermann, Neo4j
Neo4j Graph Use Cases, Bruno Ungermann, Neo4j
Neo4j
Graph Gurus 15: Introducing TigerGraph 2.4
Graph Gurus 15: Introducing TigerGraph 2.4
TigerGraph
Workshop - Build a Graph Solution
Workshop - Build a Graph Solution
Neo4j
The Data Platform for Today’s Intelligent Applications
The Data Platform for Today’s Intelligent Applications
Neo4j
Graph and Amazon Neptune
Graph and Amazon Neptune
Amazon Web Services
What's hot
(20)
Graph-Based Network Topology Analysis for Telecom Operators
Graph-Based Network Topology Analysis for Telecom Operators
Kafka + Uber- The World’s Realtime Transit Infrastructure, Aaron Schildkrout
Kafka + Uber- The World’s Realtime Transit Infrastructure, Aaron Schildkrout
What is Differential Privacy?
What is Differential Privacy?
Real-time Fraud Detection for Southeast Asia’s Leading Mobile Platform
Real-time Fraud Detection for Southeast Asia’s Leading Mobile Platform
AWS Neptune - A Fast and reliable Graph Database Built for the Cloud
AWS Neptune - A Fast and reliable Graph Database Built for the Cloud
A Universe of Knowledge Graphs
A Universe of Knowledge Graphs
Försäkringskassan: Neo4j as an Information Hub (GraphSummit Stockholm 2023)
Försäkringskassan: Neo4j as an Information Hub (GraphSummit Stockholm 2023)
Storing State Forever: Why It Can Be Good For Your Analytics
Storing State Forever: Why It Can Be Good For Your Analytics
DAS Slides: Data Governance - Combining Data Management with Organizational ...
DAS Slides: Data Governance - Combining Data Management with Organizational ...
Expectation maximization
Expectation maximization
Graphs for Enterprise Architects
Graphs for Enterprise Architects
The delta architecture
The delta architecture
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...
Spark Summit EU 2015: Lessons from 300+ production users
Spark Summit EU 2015: Lessons from 300+ production users
It's Time To Stop Using Lambda Architecture
It's Time To Stop Using Lambda Architecture
Neo4j Graph Use Cases, Bruno Ungermann, Neo4j
Neo4j Graph Use Cases, Bruno Ungermann, Neo4j
Graph Gurus 15: Introducing TigerGraph 2.4
Graph Gurus 15: Introducing TigerGraph 2.4
Workshop - Build a Graph Solution
Workshop - Build a Graph Solution
The Data Platform for Today’s Intelligent Applications
The Data Platform for Today’s Intelligent Applications
Graph and Amazon Neptune
Graph and Amazon Neptune
Similar to Graph Gurus Episode 4: Detecting Fraud and Money Laudering in Real-Time Part 2
Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
TigerGraph
InfluxDB 101 – Concepts and Architecture by Michael DeSa, Software Engineer |...
InfluxDB 101 – Concepts and Architecture by Michael DeSa, Software Engineer |...
InfluxData
Graph Gurus Episode 5: Webinar PageRank
Graph Gurus Episode 5: Webinar PageRank
TigerGraph
Graph Gurus Episode 8: Location, Location, Location - Geospatial Analysis wit...
Graph Gurus Episode 8: Location, Location, Location - Geospatial Analysis wit...
TigerGraph
Graph Gurus Episode 13: Visualizing Bitcoin Blockchain with Tiger Graph
Graph Gurus Episode 13: Visualizing Bitcoin Blockchain with Tiger Graph
TigerGraph
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
TigerGraph
Network Traffic Packets Classified as Textual Images for Intrusion Detection
Network Traffic Packets Classified as Textual Images for Intrusion Detection
iammyr
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
TigerGraph
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5
TigerGraph
Using Graph Algorithms for Advanced Analytics - Part 5 Classification
Using Graph Algorithms for Advanced Analytics - Part 5 Classification
TigerGraph
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
TigerGraph
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2
TigerGraph
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...
TigerGraph
Surprising Advantages of Streaming - ACM March 2018
Surprising Advantages of Streaming - ACM March 2018
Ellen Friedman
Graph Gurus Episode 11: Accumulators for Complex Graph Analytics
Graph Gurus Episode 11: Accumulators for Complex Graph Analytics
TigerGraph
Scaling Multi-tenant Applications Using the Django ORM & Postgres | PyCon Can...
Scaling Multi-tenant Applications Using the Django ORM & Postgres | PyCon Can...
Citus Data
Real-Time Fraud Detection at Scale—Integrating Real-Time Deep-Link Graph Anal...
Real-Time Fraud Detection at Scale—Integrating Real-Time Deep-Link Graph Anal...
Databricks
Introducing VenmoPlus.com 6/27 version
Introducing VenmoPlus.com 6/27 version
Qingpeng "Q.P." Zhang
20181129 keynote augmented intelligence and artificial intelligence
20181129 keynote augmented intelligence and artificial intelligence
Santiago Cabrera-Naranjo
A Fast Intro to Fast Query with ClickHouse, by Robert Hodges
A Fast Intro to Fast Query with ClickHouse, by Robert Hodges
Altinity Ltd
Similar to Graph Gurus Episode 4: Detecting Fraud and Money Laudering in Real-Time Part 2
(20)
Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
InfluxDB 101 – Concepts and Architecture by Michael DeSa, Software Engineer |...
InfluxDB 101 – Concepts and Architecture by Michael DeSa, Software Engineer |...
Graph Gurus Episode 5: Webinar PageRank
Graph Gurus Episode 5: Webinar PageRank
Graph Gurus Episode 8: Location, Location, Location - Geospatial Analysis wit...
Graph Gurus Episode 8: Location, Location, Location - Geospatial Analysis wit...
Graph Gurus Episode 13: Visualizing Bitcoin Blockchain with Tiger Graph
Graph Gurus Episode 13: Visualizing Bitcoin Blockchain with Tiger Graph
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
Network Traffic Packets Classified as Textual Images for Intrusion Detection
Network Traffic Packets Classified as Textual Images for Intrusion Detection
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5
Using Graph Algorithms for Advanced Analytics - Part 5 Classification
Using Graph Algorithms for Advanced Analytics - Part 5 Classification
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...
Surprising Advantages of Streaming - ACM March 2018
Surprising Advantages of Streaming - ACM March 2018
Graph Gurus Episode 11: Accumulators for Complex Graph Analytics
Graph Gurus Episode 11: Accumulators for Complex Graph Analytics
Scaling Multi-tenant Applications Using the Django ORM & Postgres | PyCon Can...
Scaling Multi-tenant Applications Using the Django ORM & Postgres | PyCon Can...
Real-Time Fraud Detection at Scale—Integrating Real-Time Deep-Link Graph Anal...
Real-Time Fraud Detection at Scale—Integrating Real-Time Deep-Link Graph Anal...
Introducing VenmoPlus.com 6/27 version
Introducing VenmoPlus.com 6/27 version
20181129 keynote augmented intelligence and artificial intelligence
20181129 keynote augmented intelligence and artificial intelligence
A Fast Intro to Fast Query with ClickHouse, by Robert Hodges
A Fast Intro to Fast Query with ClickHouse, by Robert Hodges
More from TigerGraph
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
TigerGraph
Better Together: How Graph database enables easy data integration with Spark ...
Better Together: How Graph database enables easy data integration with Spark ...
TigerGraph
Building an accurate understanding of consumers based on real-world signals
Building an accurate understanding of consumers based on real-world signals
TigerGraph
Care Intervention Assistant - Omaha Clinical Data Information System
Care Intervention Assistant - Omaha Clinical Data Information System
TigerGraph
Correspondent Banking Networks
Correspondent Banking Networks
TigerGraph
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
TigerGraph
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
TigerGraph
Fraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph Learning
TigerGraph
Fraudulent credit card cash-out detection On Graphs
Fraudulent credit card cash-out detection On Graphs
TigerGraph
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
TigerGraph
Customer Experience Management
Customer Experience Management
TigerGraph
Graph+AI for Fin. Services
Graph+AI for Fin. Services
TigerGraph
Davraz - A graph visualization and exploration software.
Davraz - A graph visualization and exploration software.
TigerGraph
Plume - A Code Property Graph Extraction and Analysis Library
Plume - A Code Property Graph Extraction and Analysis Library
TigerGraph
TigerGraph.js
TigerGraph.js
TigerGraph
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
TigerGraph
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
TigerGraph
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
TigerGraph
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
TigerGraph
Recommendation Engine with In-Database Machine Learning
Recommendation Engine with In-Database Machine Learning
TigerGraph
More from TigerGraph
(20)
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
Better Together: How Graph database enables easy data integration with Spark ...
Better Together: How Graph database enables easy data integration with Spark ...
Building an accurate understanding of consumers based on real-world signals
Building an accurate understanding of consumers based on real-world signals
Care Intervention Assistant - Omaha Clinical Data Information System
Care Intervention Assistant - Omaha Clinical Data Information System
Correspondent Banking Networks
Correspondent Banking Networks
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
Fraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph Learning
Fraudulent credit card cash-out detection On Graphs
Fraudulent credit card cash-out detection On Graphs
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
Customer Experience Management
Customer Experience Management
Graph+AI for Fin. Services
Graph+AI for Fin. Services
Davraz - A graph visualization and exploration software.
Davraz - A graph visualization and exploration software.
Plume - A Code Property Graph Extraction and Analysis Library
Plume - A Code Property Graph Extraction and Analysis Library
TigerGraph.js
TigerGraph.js
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
Recommendation Engine with In-Database Machine Learning
Recommendation Engine with In-Database Machine Learning
Recently uploaded
EY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
Neo4j
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio, Inc.
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Christina Lin
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
kzayra69
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Ahmed Mohamed
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
Hanief Utama
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
Dinusha Kumarasiri
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
smiwainfosol
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
Andreas Granig
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
bntitsolutionsrishis
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
qr0udbr0
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
OnePlan Solutions
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
Diego Iván Oliveros Acosta
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Stefano Stabellini
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
andrehoraa
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
soniya singh
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
stazi3110
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
FerryKemperman
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
BrainSell Technologies
Recently uploaded
(20)
EY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
Graph Gurus Episode 4: Detecting Fraud and Money Laudering in Real-Time Part 2
1.
Detecting Fraud and
Money Laundering in Real-Time with a Graph Database Part 2 Gaurav Deshpande and Dan Hu September 26, 2018 Graph Gurus Episode 4
2.
© 2018 TigerGraph.
All Rights Reserved Welcome ● Attendees are muted but you can talk to us via Chat in Zoom ● We will have 10 min for Q&A at the end ● Send questions at any time using the Q&A tab in the Zoom menu ● The webinar will be recorded ● A link to the presentation and reproducible steps will be emailed 2 Developer Edition Download https://www.tigergraph.com/developer/
3.
© 2018 TigerGraph.
All Rights Reserved Today’s Moderator ● Built out and positioned IBM’s Big Data and Analytics portfolio, driving 45 percent year-over-year growth. ● Led 2 startups through explosive growth - i2 Technologies (IPO) & Trigo Technologies (largest MDM acquisition by IBM) ● Big Data Analytics Veteran, 14 patents in supply chain management and big data analytics 3 Gaurav Deshpande, VP of Marketing
4.
© 2018 TigerGraph.
All Rights Reserved Today’s Guru ● BS & MS in Physics from University of Science and Technology of China (USTC) ● PhD in Quantum Computation from University of California, Merced ● 3-Year TigerGraph Veteran ● Solution Architect, Graph Query Language Designer, Database Core Engineer 4 Dr. Dan Hu, Distinguished AI Research Scientist
5.
© 2018 TigerGraph.
All Rights Reserved What is Money Laundering? The process of transforming proceeds of illegal activities to legitimate money www.unodc.org/unodc/en/money-laundering/laundrycycle.html 5
6.
© 2018 TigerGraph.
All Rights Reserved Money Laundering Techniques - Layering 1. Funds to be laundered starts at one source 2. Layering: Split and transferred in less suspicious amounts to various accounts. Split and transfer again... 3. Integration: transfer and consolidate… 4. Funds arrive in the account of a related party Perfect fit for graph analytics 6
7.
© 2018 TigerGraph.
All Rights Reserved Money Laundering Techniques - Layering Loop ● Layering requires many transactions ○ Smaller, less suspicious amounts ○ Complex pattern which is hard to notice ● But criminals still want to keep their money! ● Solution: Pass the funds around in a loop 7
8.
© 2018 TigerGraph.
All Rights Reserved AML Workflow with TigerGraph and Machine Learning 8
9.
Anti Money Laundering
with TigerGraph In Depth Layering Loop Detection
10.
© 2018 TigerGraph.
All Rights Reserved Anti Money Laundering • An effective anti money launder system should have the following two features, i.e. • Detect All Suspicious Behavior Quickly: system should find all suspicious patterns of wrongdoing at all time. • Be Easy to Use and Change: all patterns can be easily applied and user could easily modify the pattern to adapt new rules. 10
11.
© 2018 TigerGraph.
All Rights Reserved Detect Suspicious Behavior with TigerGraph • TigerGraph is a native graph database with multiple built-in graph analytical tools. • With its powerful graph query language (GSQL), TigerGraph can do graph traversal & aggregation in a real time fashion. • Detection of suspicious behavior can be easily converted into a graph pattern matching problem. 11
12.
© 2018 TigerGraph.
All Rights Reserved Examples of detection of Suspicious Behavior • Detection of 1-level frequent money sender/receiver • Detection of 2-level frequent money sender/receiver • Detection of accounts with loop money transactions • Controllable search depth (Up to 20 hops) • Search transactions within a given time window • Amount lower Limit • Drain Ratio: (max - min) / max • All transactions in the loop must be in a forward time series 12
13.
© 2018 TigerGraph.
All Rights Reserved Graph Schema Design 13
14.
© 2018 TigerGraph.
All Rights Reserved Loop Detection Pseudocode a1 t4 t2 t1 send send a2 t3 a3 t5 send send send send send send send send Algorithm: Start with one account and collect paths while traversal. Disadvantages: ● memory cost: collect too many invalid paths ● computation cost: can not stop until arriving at the end of traversal. 14
15.
© 2018 TigerGraph.
All Rights Reserved Bi-directional Loop Detection Pseudocode a1 t4 t2 t1 rev_send send a2 t3 a3 t5 send send send rev_send rev_send send send send Phase1: use bidirectional search to mark the subgraph with loops. Phase2: Traverse the subgraph graph to collect loop paths. Phase3: Apply path related filters (drain ratio) on obtained paths Note: The start account could be multiple related accounts (such as linked by the same ID) 15
16.
© 2018 TigerGraph.
All Rights Reserved Phase 1: Bidirectional Search a1 t4 t2 t1 rev_send send a2 t3 a3 t5 send send send rev_send rev_send send send send Algorithm ● Traverse the first half hops from the starting account. Label vertices with the forward and backward reachable flags. ● Limit the other half traversal among the vertices with reachable flags, i.e. ○ Forward reachable vertex can only reach backward reachable vertices. ○ Backward reachable vertex can only reach forward reachable vertices. ● The potential loop candidates are the vertices with both forward and backward reach flags 16
17.
© 2018 TigerGraph.
All Rights Reserved Phase 1: Bidirectional Search a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send Search Depth = 6, k = 1 a4 t5 a5 send send ● Traverse the first half hops (3 hops) from the starting account. ● Label vertices with the forward (green) and backward (blue) reachable flags. 17
18.
© 2018 TigerGraph.
All Rights Reserved Phase 1: Bidirectional Search a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send Search Depth = 6, k = 2 ● Traverse the first half hops (3 hops) from the starting account. ● Label vertices with the forward (green) and backward (blue) reachable flags. 18
19.
© 2018 TigerGraph.
All Rights Reserved Phase 1: Bidirectional Search a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send Search Depth = 6, k = 3 ● Traverse the first half hops (3 hops) from the starting account. ● Label vertices with the forward (green) and backward (blue) reachable flags. 19
20.
© 2018 TigerGraph.
All Rights Reserved Phase 1: Bidirectional Search a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 4 ● Forward reachable vertex can only reach backward reachable vertices. ● Backward reachable vertex can only reach forward reachable vertices. 20
21.
© 2018 TigerGraph.
All Rights Reserved Phase 1: Bidirectional Search a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 5 rev_send send ● Forward reachable vertex can only reach backward reachable vertices. ● Backward reachable vertex can only reach forward reachable vertices. 21
22.
© 2018 TigerGraph.
All Rights Reserved Phase 1: Bidirectional Search a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 6 rev_send send rev_send send ● Forward reachable vertex can only reach backward reachable vertices. ● Backward reachable vertex can only reach forward reachable vertices. 22
23.
© 2018 TigerGraph.
All Rights Reserved Phase 2: SubGraph Traversal a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6 rev_send send rev_send send ● Build Paths for each loop ● Apply filter on transactions with forward timestamps 23
24.
© 2018 TigerGraph.
All Rights Reserved Phase 2: SubGraph Traversal a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 1 rev_send send rev_send send ● Build Paths for each loop ● Apply filter on transactions with forward timestamps 24
25.
© 2018 TigerGraph.
All Rights Reserved Phase 2: SubGraph Traversal a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 2 rev_send send rev_send send ● Build Paths for each loop ● Apply filter on transactions with forward timestamps 25
26.
© 2018 TigerGraph.
All Rights Reserved Phase 2: SubGraph Traversal a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 3 rev_send send rev_send send ● Build Paths for each loop ● Apply filter on transactions with forward timestamps 26
27.
© 2018 TigerGraph.
All Rights Reserved Phase 2: SubGraph Traversal a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 4 rev_send send rev_send send ● Build Paths for each loop ● Apply filter on transactions with forward timestamps 27
28.
© 2018 TigerGraph.
All Rights Reserved Phase 2: SubGraph Traversal a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 5 rev_send send rev_send send ● Build Paths for each loop ● Apply filter on transactions with forward timestamps 28
29.
© 2018 TigerGraph.
All Rights Reserved Phase 2: SubGraph Traversal a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 6 rev_send send rev_send send ● Build Paths for each loop ● Apply filter on transactions with forward timestamps 29
30.
© 2018 TigerGraph.
All Rights Reserved Phase 3: Apply Path Filters a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 6 rev_send send rev_send send ● Drain Ratio Check 30
31.
© 2018 TigerGraph.
All Rights Reserved GSQL Query: Suspicious account with loop transactions Graph Data http://192.168.0.118:14240/#/loading-executor GSQL implementation on loop transactions http://192.168.0.118:14240/#/query-editor For GSQL Starter https://info.tigergraph.com/en/gsql-webinar-1 31
32.
© 2018 TigerGraph.
All Rights Reserved GSQL Query Batch Processing • To search for all possible accounts with loop transactions, one need to do loop detection query for all candidates. • One solution would be expand the single account loop detection algorithm to multiple accounts, which may greatly complicate the query and may actually reduce the performance. • GSQL Query provide an easy alternative way to speed up batch processing using Query Calling Query Feature. 32
33.
© 2018 TigerGraph.
All Rights Reserved GSQL Query Batch Processing Query Calling Query in parallel with GSQL • Use Vertex Block to parallelization • Start a Vertex Block with all candidate vertices • Call the loop detection subquery in ACCUM block • Use Edge Block to parallelization • Start a Edge Block with all candidate vertices as target vertex • Call the loop detection subquery in POST-ACCUM block 33
34.
© 2018 TigerGraph.
All Rights Reserved GSQL Query Batch Processing GSQL loop transactions in batch http://192.168.0.118:14240/#/query-editor 34
35.
© 2018 TigerGraph.
All Rights Reserved GSQL Query: Suspicious account with loop transactions 35
36.
Q&A Please send your
questions via the Q&A menu in Zoom 36
37.
© 2018 TigerGraph.
All Rights Reserved Thank You! 37 Compare the Developer Edition and Enterprise Free Trial https://www.tigergraph.com/download/ Guru Scripts https://github.com/tigergraph/ecosys/tree/master/guru_scripts Join our Developer Forum https://groups.google.com/a/opengsql.org/forum/#!forum/gsql-users Download our Ebook https://info.tigergraph.com/ebook @TigerGraphDB youtube.com/tigergraph facebook.com/TigerGraphDB linkedin.com/company/TigerGraph
38.
User Defined Function 38
Download now