974
Views
8
CrossRef citations to date
0
Altmetric
Original Article

Money laundering regulatory risk evaluation using Bitmap Index-based Decision TreeFootnote

&
Pages 96-102 | Received 11 Jul 2015, Accepted 13 Mar 2016, Published online: 27 Mar 2018

References

  • Mihaela A.BorneaVassalosVasilisKotidisYannisAdaptive join operators for result rate optimization on streaming inputsIEEE Trans. Knowl. Data Eng.2282010
  • PamelaCastellón GonzálezJuan D.VelásquezCharacterization and detection of taxpayers with false invoices using data mining techniquesExpert Syst. Appl.2013 (Elsevier)
  • Tamer HossamEldin HelmyDesign of a monitor for detecting money laundering and terrorist financingInt. J. Comput. Networks Appl.112014
  • Denys A.FloresOlgaAngelopoulouRichard J.SelfAn anti-money laundering methodology: financial regulations, information security and digital forensics working togetherJ. Internet Serv. Inf. Secur. (JISIS)32011
  • VikasJayasreeR.V.Siva BalanA review on data mining in banking sectorAm. J. Appl. Sci.1010201311601165
  • VikasJayasreeR.V.Siva BalanMoney laundering identification on banking data using probabilistic relational audit sequential patternAsian J. Appl. Sci.201519963343
  • M.LaxmaiahA compressed bitmap vector method to assess aggregate queries competentlyInt. J. Adv. Res. Comput. Sci. Software Eng.3112013
  • M.LaxmaiahAn approach to evaluate aggregate queries efficiently using priority queue techniqueInt. J. Emerging Trends Technol. Comput. Sci.232013
  • XingrongLuoSuspicious transaction detection for anti-money launderingInt. J. Secur. Appl.822014
  • MalteMöserRainerBöhmeDominicBreukerAn inquiry into money laundering tools in the bitcoin ecosystemeCrime Researchers Summit, IEEE2013
  • SvetlanaNikoloskaIvicaSimonovskiRole of banks as entity in the system for prevention of money laundering in the MacedoniaSocial Behav. Sci.2012 (Elsevier)
  • CliftonPhuaResilient identity crime detectionIEEE Trans. Knowl. Data Eng.2432012
  • SreekumarPulakkazhyR.V.S.BalanData mining in banking and its applications-a reviewJ. Comput. Sci.910201312521259
  • Roberto CortinasSecure failure detection and consensus in trusted palsIEEE Trans. Dependable Secure Comput.942012
  • Roberto CortinasSecure failure detection and consensus in trusted palsIEEE Trans. Dependable2012 (n.d.)
  • C.H.SureshK.Thammi ReddyGraph based approach to identify suspicious accounts in the layering stage of money launderingGlobal J. Comput. Sci. Inf. Technol.1120148187
  • PengWeibingResearch on money laundering crime under electronic payment backgroundJ. Comput.612011
  • MasoumehZareapooK.R.SreejaM.Afshar AlamAnalysis of credit card fraud detection techniques: based on certain design criteriaInt. J. Comput. Appl.5232012

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.