| 期刊論文1. | 翁頌舜、鄭富山(20020900)。應用資料採擷探究電信資料異常之研究。輔仁管理評論,9(3),77-109。 延伸查詢![new window](/gs32/images/newin.png) | 2. | Park, Jong-Soo、Chen, Ming-Syan、Yu, Philips S.(1997)。Using a hash-based method with transaction trimming for mining association rules。IEEE Transactions on Knowledge and Data Engineering,9(5),813-825。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Butler, P.、Peppard, J.(1998)。Consumer Purchasing on the Internet: Processes and Prospects。European Management Journal,16(5),600-610。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Chen, Ming-Syan、Han, Jiawei、Yu, Philip S.(1996)。Data Mining: An Overview from a Database Perspective。IEEE Transactions on Knowledge and Data Engineering,8(6),866-883。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 會議論文1. | Shao, H.、Zhao, H.、Chang, G. H.(2002)。Applying data mining to detect fraud behavior in customs declaration。The First International Conference on Machine Learning and Cybernetics,1241-1244。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | 徐源隆(2003)。網路拍賣詐欺犯罪之偵查對策。第七屆資訊管理學術暨警政資訊實務研討會。中央警察大學。 延伸查詢![new window](/gs32/images/newin.png) | 3. | Bonchi, F.、Giannotte, F.、Mainetto, G.、Pedreschi, D.(1999)。A Classification-Based Methodology for Planning Audit Strategies in Fraud Detection。The Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining。San Diego, CA。175-184。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | Brause, R.、Langsdorf, T.、Hepp, M.(1999)。Neural Data Mining for Credit Card Fraud Detection。The 11th IEEE International Conference on the Tools with Artificial Intelligence,103-106。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Chui, C. C.、Tsai, C. Y.(2004)。A web Services-Based Collaborative Scheme for Credit Card Fraud Detection。The IEEE international conference on e-Technology, e-Commerce and e-Service。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 6. | Kou, Y.、Lu, C. T.、Sirwongwattana, S.、Huang, Y. P.(2004)。Survey of Fraud Detection Techniques。The 2004 IEEE International Conference on the Networking, Sensing and Control,749-754。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 7. | Metwally, A.、Agrawal, D.、Abbadi, A. E.(2005)。Using Association Rules for Detection in Web Advertising Networks。The 31st VLDB Conference,169-180。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 8. | Srikant, Ramakrishnan、Agrawal, Rakesh(1995)。Mining Generalized Association Rules。The 21st International Conference on Very Large Data Bases。Zurich。407-419。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 9. | Agrawal, R.、Imielinski, T.、Swami, A.(1993)。Mining Association Rules between Sets of Items in Very Large Database。The ACM SIGMOD Conference on Management of Data,207-216。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 10. | Agrawal, R.、Srikant, R.(1994)。Fast algorithms for mining association rules in large database。The 20th International Conference on Very Large Data Bases。Morgan Kaufmann Publishers Inc.。478-499。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 學位論文1. | 陳怡婷(2004)。應用資料採礦技術於拍賣網站購買行為之研究(碩士論文)。實踐大學。 延伸查詢![new window](/gs32/images/newin.png) | 2. | 詹培萱(2003)。利用文字探勘技術進行犯罪資料之發掘--以網路販售違禁品及網路賭博為例(碩士論文)。中央警察大學。 延伸查詢![new window](/gs32/images/newin.png) | 3. | 朱桓毅(2003)。拍賣網站消費與詐欺行為之研究(碩士論文)。銘傳大學。 延伸查詢![new window](/gs32/images/newin.png) | 4. | 葛煥元(2003)。線上拍賣欺騙行為偵測之研究(碩士論文)。國立中正大學。 延伸查詢![new window](/gs32/images/newin.png) | 圖書1. | Han, Jiawei、Kamber, Micheline(2006)。Data Mining: Concepts and Techniques。San Francisco:Morgan Kaufmann Publishers。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | |