References
- Mihaela A.BorneaVassalosVasilisKotidisYannisAdaptive join operators for result rate optimization on streaming inputsIEEE Trans. Knowl. Data Eng.2282010
- PamelaCastellón GonzálezJuan D.VelásquezCharacterization and detection of taxpayers with false invoices using data mining techniquesExpert Syst. Appl.2013 (Elsevier)
- Tamer HossamEldin HelmyDesign of a monitor for detecting money laundering and terrorist financingInt. J. Comput. Networks Appl.112014
- Denys A.FloresOlgaAngelopoulouRichard J.SelfAn anti-money laundering methodology: financial regulations, information security and digital forensics working togetherJ. Internet Serv. Inf. Secur. (JISIS)32011
- VikasJayasreeR.V.Siva BalanA review on data mining in banking sectorAm. J. Appl. Sci.1010201311601165
- VikasJayasreeR.V.Siva BalanMoney laundering identification on banking data using probabilistic relational audit sequential patternAsian J. Appl. Sci.201519963343
- M.LaxmaiahA compressed bitmap vector method to assess aggregate queries competentlyInt. J. Adv. Res. Comput. Sci. Software Eng.3112013
- M.LaxmaiahAn approach to evaluate aggregate queries efficiently using priority queue techniqueInt. J. Emerging Trends Technol. Comput. Sci.232013
- XingrongLuoSuspicious transaction detection for anti-money launderingInt. J. Secur. Appl.822014
- MalteMöserRainerBöhmeDominicBreukerAn inquiry into money laundering tools in the bitcoin ecosystemeCrime Researchers Summit, IEEE2013
- SvetlanaNikoloskaIvicaSimonovskiRole of banks as entity in the system for prevention of money laundering in the MacedoniaSocial Behav. Sci.2012 (Elsevier)
- CliftonPhuaResilient identity crime detectionIEEE Trans. Knowl. Data Eng.2432012
- SreekumarPulakkazhyR.V.S.BalanData mining in banking and its applications-a reviewJ. Comput. Sci.910201312521259
- Roberto CortinasSecure failure detection and consensus in trusted palsIEEE Trans. Dependable Secure Comput.942012
- Roberto CortinasSecure failure detection and consensus in trusted palsIEEE Trans. Dependable2012 (n.d.)
- C.H.SureshK.Thammi ReddyGraph based approach to identify suspicious accounts in the layering stage of money launderingGlobal J. Comput. Sci. Inf. Technol.1120148187
- PengWeibingResearch on money laundering crime under electronic payment backgroundJ. Comput.612011
- MasoumehZareapooK.R.SreejaM.Afshar AlamAnalysis of credit card fraud detection techniques: based on certain design criteriaInt. J. Comput. Appl.5232012