﻿<?xml version="1.0" encoding="utf-8"?>
<ArticleSet>
  <ARTICLE>
    <Journal>
      <PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName>
      <JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle>
      <ISSN>2322-1437</ISSN>
      <Volume>7</Volume>
      <Issue>28</Issue>
      <PubDate PubStatus="epublish">
        <Year>2020</Year>
        <Month>6</Month>
        <Day>7</Day>
      </PubDate>
    </Journal>
    <ArticleTitle>A Study of Fraud Types, Challenges and Detection Approaches in Telecommunication</ArticleTitle>
    <VernacularTitle>A Study of Fraud Types, Challenges and Detection Approaches in Telecommunication</VernacularTitle>
    <FirstPage>248</FirstPage>
    <LastPage>261</LastPage>
    <ELocationID EIdType="doi">10.7508/jist.2019.04.002</ELocationID>
    <Language>en</Language>
    <AuthorList>
      <Author>
        <FirstName>Kasra</FirstName>
        <LastName>Babaei</LastName>
        <Affiliation> University of Nottingham Malaysia</Affiliation>
      </Author>
      <Author>
        <FirstName>ZhiYuan</FirstName>
        <LastName>Chen</LastName>
        <Affiliation> University of Nottingham Malaysia</Affiliation>
      </Author>
      <Author>
        <FirstName>Tomas</FirstName>
        <LastName>Maul</LastName>
        <Affiliation> University of Nottingham Malaysia</Affiliation>
      </Author>
    </AuthorList>
    <History PubStatus="received">
      <Year>2019</Year>
      <Month>11</Month>
      <Day>13</Day>
    </History>
    <Abstract>Fraudulent activities have been rising globally resulting companies losing billions of dollars that can cause severe financial damages. Various approaches have been proposed by researchers in different applications. Studying these approaches can help us obtain a better understanding of the problem. The aim of this paper is to investigate different aspects of fraud prevention and detection in telecommunication. This study presents a review of different fraud categories in telecommunication, the challenges that hinder the detection process, and some proposed solutions to overcome them. Also, the performance of some of the state-of-the-art approaches is reported followed by our guideline and recommendation in choosing the best metrics.</Abstract>
    <ObjectList>
      <Object Type="Keyword">
        <Param Name="Value">Fraud Detection;</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Machine Learning;</Param>
      </Object>
      <Object Type="Keyword">
        <Param Name="Value">Telecommunication;</Param>
      </Object>
    </ObjectList>
    <ArchiveCopySource DocType="Pdf">http://jist.ir/fa/Article/Download/15379</ArchiveCopySource>
  </ARTICLE>
</ArticleSet>