On rules, procedure, caching and views in data base systems
SIGMOD '90 Proceedings of the 1990 ACM SIGMOD international conference on Management of data
A survey of intrusion detection techniques
Computers and Security
ACM Computing Surveys (CSUR)
AAAI '99/IAAI '99 Proceedings of the sixteenth national conference on Artificial intelligence and the eleventh Innovative applications of artificial intelligence conference innovative applications of artificial intelligence
Domain-specific languages: an annotated bibliography
ACM SIGPLAN Notices
The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems
The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems
Active Database Systems: Triggers and Rules for Advanced Database Processing
Active Database Systems: Triggers and Rules for Advanced Database Processing
Transaction Processing: Concepts and Techniques
Transaction Processing: Concepts and Techniques
Data Mining and Knowledge Discovery
Signature-Based Methods for Data Streams
Data Mining and Knowledge Discovery
Neural Fraud Detection in Mobile Phone Operations
IPDPS '00 Proceedings of the 15 IPDPS 2000 Workshops on Parallel and Distributed Processing
The Ponder Policy Specification Language
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
Neural Data Mining for Credit Card Fraud Detection
ICTAI '99 Proceedings of the 11th IEEE International Conference on Tools with Artificial Intelligence
STREAM: the stanford stream data manager (demonstration description)
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Aurora: a new model and architecture for data stream management
The VLDB Journal — The International Journal on Very Large Data Bases
Automatic Control of Workflow Processes Using ECA Rules
IEEE Transactions on Knowledge and Data Engineering
Design and Implementation of Policy Decision Point in Policy-Based Network
Proceedings of the Fourth Annual ACIS International Conference on Computer and Information Science
Policy Languages for Digital Identity Management in Federation Systems
POLICY '06 Proceedings of the Seventh IEEE International Workshop on Policies for Distributed Systems and Networks
Cauldron: A Policy-Based Design Tool
POLICY '06 Proceedings of the Seventh IEEE International Workshop on Policies for Distributed Systems and Networks
Adaptive communal detection in search of adversarial identity crime
Proceedings of the 2007 international workshop on Domain driven data mining
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Thinking Inside the Box: System-Level Failures of Tamper Proofing
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Policy-based autonomic computing with integral support for self-stabilisation
International Journal of Autonomic Computing
Auto claim fraud detection using Bayesian learning neural networks
Expert Systems with Applications: An International Journal
Expert Systems with Applications: An International Journal
Testing the fraud detection ability of different user profiles by means of FF-NN classifiers
ICANN'06 Proceedings of the 16th international conference on Artificial Neural Networks - Volume Part II
Establishing fraud detection patterns based on signatures
ICDM'06 Proceedings of the 6th Industrial Conference on Data Mining conference on Advances in Data Mining: applications in Medicine, Web Mining, Marketing, Image and Signal Mining
Exemplar driven development of software product lines
Expert Systems with Applications: An International Journal
A model-driven approach for facilitating user-friendly design of complex event patterns
Expert Systems with Applications: An International Journal
Hi-index | 12.05 |
Developing fraud management policies and fraud detection systems is a vital capability for financial institutions towards minimising the effect of fraud upon customer service delivery, bottom line financial losses and the adverse impact on the organisation's brand image reputation. Rapidly changing attacks in real-time financial service platforms continue to demonstrate fraudster's ability to actively re-engineer their methods in response to ad hoc security protocol deployments, and highlights the distinct gap between the speed of transaction execution within streaming financial data and corresponding fraud technology frameworks that safeguard the platform. This paper presents the design of FFML, a rule-based policy modelling language and encompassing architecture for facilitating the conceptual level expression and implementation of proactive fraud controls within multi-channel financial service platforms. It is demonstrated how a domain specific language can be used to abstract the financial platform into a data stream based information model to reduce policy modelling complexity and deployment latencies through an innovative policy mapping language usable by both expert and non-expert users. FFML is part of a comprehensive suite of assistive tools and knowledge-based systems developed to support fraud analysts' daily work of designing new high level fraud management policies, mapping into executable code of the underpinning application programming interface and deployment of active monitoring and compliance functionality within the financial platform.