{"id":532,"date":"2022-11-27T23:17:38","date_gmt":"2022-11-27T23:17:38","guid":{"rendered":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/?p=532"},"modified":"2022-12-11T21:25:45","modified_gmt":"2022-12-11T21:25:45","slug":"rule-based-decision-tree-and-application-to-identity-fraud-detection","status":"publish","type":"post","link":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/2022\/11\/27\/rule-based-decision-tree-and-application-to-identity-fraud-detection\/","title":{"rendered":"Rule-based decision tree and application to identity fraud detection"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.18.0&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#000000&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h1 id=\"PageTopHeading\"><\/h1>\n<ul>\n<li><span style=\"font-size: medium\">A. Abdelhalim and I. Traore, Y. Nakkabi, &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/Computational_Intelligence_Creating-decision-trees-from-rules-using-RBDT-1.pdf\">Creating decision trees from rules using RBDT-1<\/a>&#8220;, Computational Intelligence, Volume 32, Issue 2, May 2016, Pages 216\u2013239, Wiley.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Abdelhalim and I. Traore, 8. Abdelhalim A., Traore I. (2010)\u00a0<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/RBDT-1%20Method_Combining%20Rules%20and%20Decision%20Tree%20Capabilities.pdf\">RBDT-1 Method: Combining Rules and Decision Tree Capabilities<\/a>. In: Ao SI., Rieger B., Amouzegar M. (eds) Machine Learning and Systems Engineering. Lecture Notes in Electrical Engineering, vol 68. Springer, Dordrecht.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Abdelhalim, I. Traore, &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/SEDE10-Rule-based%20Decision%20Tree.pdf\">Unsupervised identity application fraud detection using rule-based decision tree<\/a>&#8220;, Proceedings of 19th International Conference on Software Engineering and Data Engineering (SEDE2010), June 16-18, 2010, San Francisco, CA, USA (8 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Abdelahlim, I. Traore, &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/ijcns-v0.2.pdf\">Identity application fraud detection using web mining and rule-based decision tree<\/a>&#8220;, International Journal of Network and Computer Security, Vol. 1, No.1, pp. 31-44, October 2009.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Abdelhalim and I. Traore, &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/ICMLA09-v0.6.pdf\">A new method for learning decision trees from rules<\/a>&#8220;, In the Proceedings of 8th International Conference on Machine Learning and Applications (ICMLA&#8217;09), Miami, Florida, USA, December 13-15, 2009.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Abdelhalim, I. Traore, B. Sayed, &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/RuleML-v0.6.pdf\">RBDT-1: a new rule-based decision tree generation technique<\/a>&#8220;, In the Proceedings of 3rd International Symposium on Rules, Applications and Interoperability (RuleML09), Las Vegas, Nevada, USA: Nov 5-7, 2009, (14 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Abdelhalim, I. Traore, &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/ICCSA09-v0.5.pdf\">Converting declarative rules into decision trees<\/a>&#8220;, In the Proceedings of the International Conference on Computer Science and Applications, San Francisco, USA, 20-22 October, 2009; (9 pages).<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A. Abdelhalim and I. Traore, Y. Nakkabi, &#8220;Creating decision trees from rules using RBDT-1&#8221;, Computational Intelligence, Volume 32, Issue 2, May 2016, Pages 216\u2013239, Wiley. A. Abdelhalim and I. Traore, 8. Abdelhalim A., Traore I. (2010)\u00a0RBDT-1 Method: Combining Rules and Decision Tree Capabilities. In: Ao SI., Rieger B., Amouzegar M. (eds) Machine Learning and Systems [&hellip;]<\/p>\n","protected":false},"author":17669,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<h1 id=\"PageTopHeading\">Rule-based decision tree and application to identity fraud detection<\/h1><ol><li>A. Abdelhalim and I. Traore, Y. Nakkabi, \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/Computational_Intelligence_Creating-decision-trees-from-rules-using-RBDT-1.pdf\">Creating decision trees from rules using RBDT-1<\/a>\", Computational Intelligence, Volume 32, Issue 2, May 2016, Pages 216\u2013239, Wiley.<\/li><li>A. Abdelhalim and I. Traore, 8. Abdelhalim A., Traore I. (2010)\u00a0<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/RBDT-1%20Method_Combining%20Rules%20and%20Decision%20Tree%20Capabilities.pdf\">RBDT-1 Method: Combining Rules and Decision Tree Capabilities<\/a>. In: Ao SI., Rieger B., Amouzegar M. (eds) Machine Learning and Systems Engineering. Lecture Notes in Electrical Engineering, vol 68. Springer, Dordrecht.<\/li><li>A. Abdelhalim, I. Traore, \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/SEDE10-Rule-based%20Decision%20Tree.pdf\">Unsupervised identity application fraud detection using rule-based decision tree<\/a>\", Proceedings of 19th International Conference on Software Engineering and Data Engineering (SEDE2010), June 16-18, 2010, San Francisco, CA, USA (8 pages).<\/li><li>A. Abdelahlim, I. Traore, \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/ijcns-v0.2.pdf\">Identity application fraud detection using web mining and rule-based decision tree<\/a>\", International Journal of Network and Computer Security, Vol. 1, No.1, pp. 31-44, October 2009.<\/li><li>A. Abdelhalim and I. Traore, \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/ICMLA09-v0.6.pdf\">A new method for learning decision trees from rules<\/a>\", In the Proceedings of 8th International Conference on Machine Learning and Applications (ICMLA'09), Miami, Florida, USA, December 13-15, 2009.<\/li><li>A. Abdelhalim, I. Traore, B. Sayed, \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/RuleML-v0.6.pdf\">RBDT-1: a new rule-based decision tree generation technique<\/a>\", In the Proceedings of 3rd International Symposium on Rules, Applications and Interoperability (RuleML09), Las Vegas, Nevada, USA: Nov 5-7, 2009, (14 pages).<\/li><li>A. Abdelhalim, I. Traore, \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/ICCSA09-v0.5.pdf\">Converting declarative rules into decision trees<\/a>\", In the Proceedings of the International Conference on Computer Science and Applications, San Francisco, USA, 20-22 October, 2009; (9 pages).<\/li><\/ol>","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5,4],"tags":[],"class_list":["post-532","post","type-post","status-publish","format-standard","hentry","category-by-area","category-publications"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/users\/17669"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/comments?post=532"}],"version-history":[{"count":6,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/532\/revisions"}],"predecessor-version":[{"id":1115,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/532\/revisions\/1115"}],"wp:attachment":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/media?parent=532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/categories?post=532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/tags?post=532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}