Modelling call detail records from a mobile telecommunications network
Authors: Mintram, R., Anyakoha, C., Vincent, J. and Phalp, K.
Journal: Proceedings of the 16th IASTED International Conference on Applied Simulation and Modelling, ASM 2007
Pages: 56-61
ISBN: 9780889866874
Abstract:Data concerning telephone calls is collected by telecommunications operators, typically to support the billing process. However, such records may also be analysed in order to identify cases of fraudulent usage, which may depend critically on differentiating normal from abnormal behavioural patterns. Data to support empirical study by the research community within the fraud detection area is hard to acquire, as it contains sensitive information, from both commercial and personal perspectives. Hence, the synthesis of representative data is a viable way forward, provided reasonable models for telecommunications traffic are available. This paper provides such models, based on the behaviour of a sample of 250 subscribers over a 52 week period.
Source: Scopus
Modelling call detail records from a mobile telecommunications network
Authors: Mintram, R., Anyakoha, C., Vincent, J. and Phalp, K.
Journal: PROCEEDINGS OF THE 16TH IASTED INTERNATIONAL CONFERENCE ON APPLIED SIMULATION AND MODELLING
Pages: 56-61
ISBN: 978-0-88986-687-4
ISSN: 1021-8181
Source: Web of Science (Lite)
Modelling Call Detail Records from a Mobile Telecommunications Network
Authors: Mintram, R., Anyakoha, C., Vincent, J. and Phalp, K.T.
Conference: IASTED International Conference in Applied Simulation and Modelling (ASM 2007)
Dates: 29-31 August 2007
Abstract:Data concerning telephone calls is collected by telecom munications operators, typically to support the billing pro cess. However, such records may also be analysed in or der to identify cases of fraudulent usage, which may de pend critically on differentiating normal from abnormal be havioural patterns. Data to support empirical study by the research community within the fraud detection area is hard to acquire, as it contains sensitive information, from both commercial and personal perspectives. Hence, the synthe sis of representative data is a viable way forward, provided reasonable models for telecommunications traffic are avail able. This paper provides such models, based on the be haviour of a sample of 250 subscribers over a 52 week pe riod. This work is partially funded by the EC 6th Frame work IST project Misuse Detection System (IST-026459).
Source: Manual
Preferred by: Keith Phalp