[1]Genzman L. Responding to Organized Crime: Laws and Law Enforcement[M]∥Abadinsky H,Ed. Organized Crime. CA: Wadsworth,1997:342.
[2]Kennedy A. Dead Fish Across the Trail: Illustrations of Money Laundering Methods[J]. Journal of Money Laundering Control, 2005,8(4):305319.
[3]Bank Secrecy Act (BSA). AnitMoney Laundering Examination Manual[Z].2001.
[4]Goldberg H G, Wong R W H.Restructuring Transactional Data for Link Analysis in the FinCen AI System[C]∥Proc of 1998 AAAI Fall Symp on Artificial Intelligence and Link Analysis,1998:3846.
[5]Xu D, Wang H, Wang M. A Conceptual Model of Personalized Virtual Learning Environments[J]. Expert Systems with Applications, 2005,29(3):525534.
[6]Kingdon J. AI Fights Money Laundering[J]. IEEE Intelligent Systems,2004, 19 (3):8789.
[7]Gao S, Xu D, Wang H, et al. Intelligent AntiMoney Laundering System[C]∥Proc of the IEEE Int’l Conf on Service Operations and Logistics, and Informatics, 2006:851856.
[8]Yu E, Cysneiros L M. AgentOriented MethodologiesTowards a Challenge Exemplar[C]∥Proc of the 4th Int’l Workshop on AgentOriented Information Systems, 2002:94109.
[9]Wang H Q. Intelligent AgentAssisted Decision Support System: Integration of Knowledge Discovery, Knowledge Analysis and Group Decision Support[J]. Expert System with Applications, 1997,12(3):323335.
[10]Reuter P, Truman E M. Chasing Dirty Money: The Fight Against Money Laundering[M]. Washington, DC:Institute for International Economics, 2004.
[11]Liu Fang, Lu Zhengding, Lu Songfeng.Mining Association Rules Using Clustering[J].Intelligent Data AnMysis,2001, 5(4):309326.
[12]Ester M, Frommelt A, Kriegel H, et al. Algorithms and Efficient DBMS Support[J]. Data Mining and Knowledge Discovery, 2000,4(2):193216.
[13]Wang H, Mylopoulos J, Liao S. Intelligent Agents and Financial Risk Monitoring Systems[J]. Communications of the ACM, 2002,45(3):8388.
[14]Fayyad U M,Uthurusamy R. Evolving Data Mining into Solutions for Insights[J]. Communications of the ACM, 2002, 45(8):2831.
[15]Witherell, William. International Approaches to Combating Financial Abuse and Promoting Stable Financial Markets[J]. Journal of Money Laundering Control, 2002,5(4):257262.
[16]Watkins R C,Reynolds K M,Demara R,et al. Tracking Dirty Proceeds: Exploring Data Mining Technologies as Tools to Investigate Money Laundering [J]. Police Practice and Researeh, 2003,4(2):163178.
[17]Bolton R J, Hand D J. Unsupervised Profiling Methods for Fraud Detection[C]∥Proc of Conf on Credit Scoring and Credit Control VII,2001:57.
[18]Han J, Kamber M. Data Mining:Concepts and Technique[M]. Morgan Kaufmann Publishers,2001.
[19]Fan W,Yu P S,Wang H. Mining Extremely Skewed Trading Anomalies[C]∥Proc of EDBT’04,2004:801810.
[20]Mooney R J, Melville P, Tang L R, et al. Relational Data Mining with Inductive Logic Programming for Link Discovery[C]∥Proc of the National Science Foundation Workshop on Next Generation Data Mining, 2002.
[21]Resig J, Dawara S, Homan C M, et al. Extracting Social Networks from Instant Messaging Populations[C]∥Proc of KDD 2004 Link Discovery Workshop, 2004:2225. |