<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Distributed Infrastructure for Big Data Processing in the Transaction Monitoring Systems</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">M</forename><forename type="middle">U</forename><surname>Sapozhnikova</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Ufa State Aviation Technical University</orgName>
								<address>
									<addrLine>K. Marks St. 12</addrLine>
									<postCode>450077</postCode>
									<settlement>Ufa</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Gayanova</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Ufa State Aviation Technical University</orgName>
								<address>
									<addrLine>K. Marks St. 12</addrLine>
									<postCode>450077</postCode>
									<settlement>Ufa</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Vulfin</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Ufa State Aviation Technical University</orgName>
								<address>
									<addrLine>K. Marks St. 12</addrLine>
									<postCode>450077</postCode>
									<settlement>Ufa</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Nikonov</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Ufa State Aviation Technical University</orgName>
								<address>
									<addrLine>K. Marks St. 12</addrLine>
									<postCode>450077</postCode>
									<settlement>Ufa</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Chuykov</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Ufa State Aviation Technical University</orgName>
								<address>
									<addrLine>K. Marks St. 12</addrLine>
									<postCode>450077</postCode>
									<settlement>Ufa</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff0">
								<orgName type="department">IV International Conference on &quot;Information Technology and Nanotechnology&quot; (ITNT</orgName>
								<address>
									<postCode>2018</postCode>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Distributed Infrastructure for Big Data Processing in the Transaction Monitoring Systems</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">E8715BE0A4052728FDC0E6276D1040A5</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-23T20:24+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>To increase the effectiveness of detecting fraudulent bank transactions, the structure of the system is proposed to analyze data of user environment in order to identify potential fraudulent activities. The system for collecting and analyzing information about the user environment allows to accumulate data about the user environment, to mark precedents in manual and automatic modes and build a database of images for classifiers training. It is necessary to implement data collection, storage and access interface for the application of data mining tools. Operation of significant amount of accumulated data requires the use of special tools (frameworks and hardware platforms) for processing large data. In this paper the analysis of the existing software and hardware tools for distributed processing of indefinitely structured data of bank transactions (frameworks: Hadoop, Apache Spark) is presented. The structure and recommendations for the deployment of a hardware and software stand for testing algorithms for detecting financial fraud on the basis of data mining analysis as part of a distributed data processing system for bank transactions based on the selected framework are developed.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The penetration of information technologies into all spheres of human life creates the basis for the formation of new conditions for the functioning of the market. In these conditions it became possible to develop the digital economy. The key factors of this economy are electronic technologies and services and digital representation of large volume multi-branch data <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>. E-commerce is a significant institution in this branch of economy, penetrating into an increasing number of legal relationships that are emerging in the field of trade in electronic form. There is a rapid growth in the sphere of financial technologies: the introduction of artificial intelligence technologies, machine learning, analysis of large data to improve the efficiency of interaction of all participants in legal relations <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b4">5]</ref>.</p><p>An important aspect of the functioning of the digital economy is the provision of information and economic security of business, personal data protection. As a result of the rapid development of financial technologies in the whole world, there has been an increase in fraudulent activities in the electronic environment. According to the Central Bank of Russia for the year 2014, the share of fraudulent transactions in Internet banking was 63%, and in the last 2 yearsincreased 5.5-fold and accounted for 93% of all crimes related to embezzlement of funds from cardholders' accounts <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7]</ref>. Nowadays, the application of big data processing technologies and data mining methods (DM) is an important element of the anti-fraud system. For example, introduction of Big Data by HSBC has increased the efficiency of fraudulent incident detection by 10 times <ref type="bibr" target="#b7">[8]</ref>. VISA anti-fraud system helps prevent fraudulent payments amounting to $ 2 billion annually <ref type="bibr" target="#b8">[9]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Analysis of user environment data as a part of anti-fraud system</head><p>The transaction monitoring system (TMS) or anti-fraud system (AFS) is specialized software or hardware-software complex that monitors, detects fraudulent activities, and provides support for decision-making on the detected illegal operation.</p><p>The most promising solution for today is the use of technologies to define the user environment in combination with the methods of machine learning. The use of machine learning is a necessary metrics, since a large amount of information about the user environment is collected and the application of rules to this data becomes impossible. Classic methods for detecting fraudulent actions can not sufficiently accurately answer the question: was this action actually performed by the user? There are many ways to obtain illegal access to a user's account: phishing, vishing, pharming, mobile fraud, and other methods related to social engineering techniques <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b11">12]</ref>.</p><p>To analyze the large volumes of data collected about the user environment, it is advisable to use approaches based on data mining. The application of the data mining algorithms for solving the problem of fraudulent transaction recognition and analysis of the user environment data is given in <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b11">12,</ref><ref type="bibr" target="#b12">13,</ref><ref type="bibr" target="#b13">14]</ref>. The greatest efficiency is achieved using a combination of various algorithms (stacking-bagging) and the use of large data technologies (Hadoop Processing) <ref type="bibr" target="#b10">[11]</ref>. This is explained by the fact that in pure form these algorithms are no longer capable of solving existing problems in view of the increasing volumes of processed data. There is a need to modify these algorithms, combine them to obtain an acceptable result, and also apply technologies capable of processing huge amounts of accumulated information.</p><p>The goal of this research is development of the infrastructure for collection and analysis of user environment as a part of anti-fraud system on the basis of big data processing technologies.</p><p>To achieve this goal, the following tasks were formulated:  Development of the structure of the system for collecting and analyzing information about the user environment based on DM techniques.  Development of a structural and functional scheme of processing user environment data for testing algorithms of detecting financial fraud on the basis of DM as a part of the system of distributed processing of banking transaction data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">System structure for collecting and analyzing user environment information</head><p>Technologies of remote banking service (internet banking) for accessing accounts and operations through a web browser do not require installation of the client part software and have become very widespread <ref type="bibr" target="#b14">[15,</ref><ref type="bibr" target="#b15">16]</ref>. The user makes certain manipulations in a web browser that interacts with the Frontend server interface. Frontend server generates a set of data about the user environment and transfers data about the user's actions about transaction initializing to the Backend server of remote banking system (RB) and then to the automated banking system (ABS) for the calculations <ref type="bibr" target="#b14">[15,</ref><ref type="bibr" target="#b15">16,</ref><ref type="bibr" target="#b16">17]</ref>. Backend server transfers transaction data and collected data about the user's environment for analysis to the anti-fraud system. If the legitimacy of the transaction is recognized, data is transferred to the ABS server, otherwise the Backend server refuses user to perform the transaction. Anti-fraud system evaluates risk of the current transaction and, in case of exceeding a certain threshold value, triggers additional mechanisms for verifying the legitimacy of the transaction <ref type="bibr" target="#b17">[18]</ref>:</p><p> automated ways of additional transaction authentication  SMS / push-notification;</p><p> request to answer the test questions;  manual ways of additional transaction authentication  a phone call from a security specialist to the user. In this architecture, user session management module (USMM) is the main element of the antifraud system. The module analyzes the transaction data and the user environment data (UED) collected by the client-side script. The implemented script forms a set of data about the user environment <ref type="bibr" target="#b18">[19]</ref>. The generalized structure of collected UEDs is the following:  Color depth;  Document size;  Screen size;  Time zone offset;  Fonts;  Plugins;  IP-address;  Number of processor cores;  UserAgent. The module's main task is to classify the current session and its transaction (legitimate transaction or fraudulent actions) based on the composition of the analysis methods: signature and automatic. If the module's estimated legitimacy of the transaction is below the threshold, an additional mechanism for authenticating the user is triggered.</p><p>The signature analysis module allows the use an expert knowledge and their formalization in the form of a system of production rules "IF-TO". The main task of this module is to classify UED and/or existing data about banking transaction in order to detect fraudulent activities. A special feature of the module is the use of a unified signature database based on the system of production rules, which allows to integrate mechanism for explaining the decision in an understandable form for security expert into the system. Initially, the database of the signature analysis module contains typical templates of fraudulent and legitimate transactions and UEDs in appropriate cases. Replenishment of the signature database is possible both in manual mode through the interface of the manual analysis module, and with the help of the automatic analysis modules which detects signatures in the new data processing mode. Analysis of the accumulated data under control of the analyst makes it possible to identify new production rules in an automatic mode based on the DM technologies.</p><p>Task of the automatic analysis module is automatic data classification based on the DM methods, for example, using a neural network classifier trained on a database of committed transactions marked by an expert <ref type="bibr" target="#b10">[11]</ref>. At the stage of data preparation for DM algorithms application, the following tasks must be solved:</p><p> features selectionselection of the most significant features for the adoption of a classification decision.  features transformationfilling gaps in data, removing emissions and filtering noise components.  features extractiontransformation of the selected features into a new feature space for feeding to the classifier input; In the previous works <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b11">12]</ref> the original feature space included 40 parameters. After evaluating available parameter values and its distributions, 12 parameters were deleted from the original data. As a result of expert analysis of the feature space transformation results, new nonlinear features were addedcombinations of the initial features, characterizing possible combinations of some available parameters.</p><p>The core of automatic analysis module is the neural network -the "black box"which allows to assign the current vector of features extracted from the data collected about the user environment to one of the previously defined classes. The following classes are proposed:</p><p> User system is under remote control;  The user system uses action anonymization mechanisms;  User system does not contain any suspicious elements.</p><p>Results of the signature and automatic analysis modules are comparing. If the verdicts do not coincide, then an anti-fraud system expert can be brought in for manual analysis of the precedent. While the accumulation of data on transactions and UED occurs, the neural network classifier is aftertrained. While group of use cases, the parameters of which do not fit into the current scheme of "IF-TO" signature rules, are being formed, new rules are being extracted, replenishing the existing signature database. If new signatures are added by the expert, then the current base of marked use cases is analyzed in order to update the class labels and retrain the neural network classifier.</p><p>Manual analysis module is designed to correct the markup of the existing database of the user environment and transactions in order to form a training sample for the neural network classifier. The module allows expert to analyze the system solution for each of the use cases and correct it in case of erroneous operations.</p><p>The AFS control modules allow to monitor the basic performance of AFS, analyze the log of the system and debug the interaction of the signature and automatic modules. Thus, structure of the system for collection and analysis of user environment as a part of anti-fraud system is presented in figure <ref type="figure" target="#fig_0">1</ref>. The key element of the system is data mining module. Analysis algorithms should be applicable in the context of "Big Data" (a set of approaches, tools and methods for processing structured and unstructured data of huge volumes and significant diversity for obtaining human-readable results that are effective under conditions of continuous growth, distribution over multiple nodes of the computer network) <ref type="bibr" target="#b19">[20]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Designing a structural and functional scheme for processing "big data" of the user environment as a part of a distributed data processing system for bank transactions</head><p>The implementation of algorithms for detecting financial fraud based on data mining techniques of banking transactions as part of a distributed processing system of banking transactions requires the solution of a few tasks related to the design and deployment of an appropriate infrastructure for storing and processing accumulated data.</p><p>To date, there are many tools for the distributed processing of banking transaction data (frameworks: Hadoop, Apache Spark, ClickHouse, ElasticSearch, Splunk Free) <ref type="bibr" target="#b20">[21,</ref><ref type="bibr" target="#b21">22,</ref><ref type="bibr" target="#b22">23,</ref><ref type="bibr" target="#b23">24,</ref><ref type="bibr" target="#b24">25]</ref>. The proposed structure of the distributed processing system of banking transaction data is presented in the figure <ref type="figure">2</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 2. Hadoop cluster structure</head><p>Main element of the distributed processing system of banking transaction data is a distributed file system. Nowadays the most popular distributed file system is HDFS <ref type="bibr" target="#b20">[21]</ref>.</p><p>Next element of the big data processing system is the distributed programming and machine learning infrastructure. The core of this element is Spark, a cluster computing infrastructure similar in MapReduce <ref type="bibr" target="#b20">[21]</ref>. The structure of this infrastructure includes the machine learning tool MLLib, which allows to implement the DM tools of the accumulated data.</p><p>To directly store the accumulated data, it is proposed to use solutions from the New-SQL family <ref type="bibr" target="#b25">[26]</ref>.</p><p>A detailed description of the additional elements and their functions in the distributed data processing system for bank transactions is presented in the table <ref type="table">1</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 1. Hadoop ecosystem applications</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Function</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Tools name Short description</head><p>Store HDFS <ref type="bibr" target="#b18">[19]</ref> Distributed file system Cassandra <ref type="bibr" target="#b23">[24]</ref> NoSql database management system Cluster resource management YARN <ref type="bibr" target="#b18">[19]</ref> Operating system for big data application Data processing Spark <ref type="bibr" target="#b19">[20]</ref> Engine for big data processing</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Machine learning</head><p>Spark-sklearn <ref type="bibr" target="#b24">[25]</ref> Scikit-learn python library integrated in Apache Spark for exploratory data analysis</p><p>Sparkling Water <ref type="bibr" target="#b25">[26]</ref> H2O library integrated in Apache Spark for machine learning in Hadoop system TensorFlow <ref type="bibr" target="#b26">[27]</ref> TensorFlow library integrated in Apache Spark for deep learning in Hadoop system Coordination Zookeeper <ref type="bibr" target="#b27">[28]</ref> Application for maintaining configuration information, naming and etc Data Access Hive <ref type="bibr" target="#b28">[29]</ref> Application for data summarization, SQL-like query, and analysis Data Collection Sqoop <ref type="bibr" target="#b29">[30]</ref> Application for transferring data between relational databases and Hadoop Flume <ref type="bibr" target="#b30">[31]</ref> Application for transferring data between relational databases and Hadoop WorkFlow Oozie <ref type="bibr" target="#b31">[32]</ref> Application for collecting, aggregating, and moving of unstructured data Monitoring Hue <ref type="bibr" target="#b32">[33]</ref> Web interface to monitor Hadoop system</p><p>The use of three machine learning libraries is due to the need of rapid prototyping of the developed algorithms, debugging on small amounts of data and the possibility of importing the developed models.</p><p>The hardware-software stand structure for testing the algorithms of detecting financial fraud based on DM techniques in the distributed data processing system for bank transactions based on the selected big data processing stack is shown on figure <ref type="figure" target="#fig_1">3</ref>. The data collection and analysis module consists of: • Sentry software suite <ref type="bibr" target="#b35">[36]</ref> for collection client-side script logs; • Gitlab service <ref type="bibr" target="#b36">[37]</ref> for organization joint work on the implemented analysis algorithms source code; • DVWA (Damn Vulnerable Web Application) for testing the script of user environment data collection. The load testing module is designed to automate collection of the user environment database. For distributed processing of bank transaction data, the Hadoop cluster is used, on which the software is deployed from Table <ref type="table">1</ref>. Typical configuration of the used server machine pool is shown in Table <ref type="table" target="#tab_0">2</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>The main problem of improving the TMS efficiency is the insufficient amount of registered parameters transferred from an online banking client side to a processing center, and the imperfection of signature analysis methods and algorithms because of low adaptability and configuration flexibility. Nowadays the most promising solution is the use of technologies for determining user environment in combination with the methods of machine learning within TMS. The use of machine learning is an indispensable criterion, because big amount of user environment information being collected and application of the rules to this data becomes difficult. Algorithms for analysis should be applicable in the context of "big data".</p><p>In the paper the infrastructure for collection and analysis of user environment as a part of anti-fraud system on the basis of big data processing technologies is proposed.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 .</head><label>1</label><figDesc>Figure 1. Structure of the user environment data and transaction analysis system within the AFS.</figDesc><graphic coords="4,75.10,200.40,445.00,490.55" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 3 .</head><label>3</label><figDesc>Figure 3. The hardware-software stand structure testing algorithms for detecting financial fraud.</figDesc><graphic coords="6,70.80,256.80,485.50,336.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="5,87.60,263.05,419.75,141.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 2 .</head><label>2</label><figDesc>Server settings.</figDesc><table><row><cell>ID</cell><cell>Sector</cell><cell>Configuration</cell><cell>OS</cell></row><row><cell>1</cell><cell></cell><cell>2x3.4 GHz / 4GB</cell><cell>debian 8.2</cell></row><row><cell>2 3</cell><cell>Collection and analysis user environment data</cell><cell>2x3.4 GHz / 2GB 2x3.0 GHz / 1GB D</cell><cell>debian 8.2 ubuntu 16.04</cell></row><row><cell>4</cell><cell></cell><cell>1x2.4 GHz / 1GB</cell><cell>ubuntu 16.04</cell></row><row><cell>5</cell><cell></cell><cell>2x3.0 GHz / 3GB</cell><cell>debian 9.2</cell></row><row><cell>6</cell><cell></cell><cell>2x3.0 GHz / 3GB</cell><cell>debian 9.2</cell></row><row><cell>7 8</cell><cell>Load testing software</cell><cell>2x3.0 GHz / 4GB 2x3.0 GHz / 3GB</cell><cell>debian 9.2 debian 9.2</cell></row><row><cell>9</cell><cell></cell><cell>2x3.0 GHz / 4GB</cell><cell>debian 9.2</cell></row><row><cell>10</cell><cell></cell><cell>2x3.0 GHz / 3GB</cell><cell>debian 9.2</cell></row><row><cell>11</cell><cell></cell><cell>2x3.4 GHz / 12GB</cell><cell>ubuntu 14.04</cell></row><row><cell>12</cell><cell></cell><cell>2x3.4 GHz / 12GB</cell><cell>ubuntu 14.04</cell></row><row><cell>13 14</cell><cell>Hadoop Cluster</cell><cell>2x3.4 GHz / 8GB 2x3.4 GHz / 6GB</cell><cell>ubuntu 14.04 ubuntu 14.04</cell></row><row><cell>15</cell><cell></cell><cell>2x3.2 GHz / 6GB</cell><cell>ubuntu 14.04</cell></row><row><cell>16</cell><cell></cell><cell>2x3.0 GHz / 6GB</cell><cell>ubuntu 14.04</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>Work was supported by the Russian Foundation for Basic Research, research № 17-48-020095.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">National cyber security strategies for digital economy</title>
		<author>
			<persName><forename type="first">C S</forename><surname>Teoh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A K</forename><surname>Mahmood</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Int. Conf. on Research and Innovation in Information Systems 1-6</title>
				<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Enabling the new economic actor: Personal data regulation and the digital economy</title>
		<author>
			<persName><forename type="first">A</forename><surname>Crabtree</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. IEEE Int. Conf. on Cloud Engineering Workshops</title>
				<meeting>IEEE Int. Conf. on Cloud Engineering Workshops</meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="124" to="129" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Binary Classification and Data Analysisfor Modeling Calendar Anomalies in Financial Markets 7th</title>
		<author>
			<persName><forename type="first">H</forename><surname>Tung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Cheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">C</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y Y And</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y F</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Int. Conf. on Cloud Computing and Big Data</title>
				<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="116" to="121" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Big Data and Big Money: The Role of Data in the Financial Sector IT Prof</title>
		<author>
			<persName><forename type="first">J</forename><surname>Trelewicz</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="page" from="8" to="10" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Big Data for innovation: The case of credit evaluation using mobile data analyzed by innovation ecosystem lens</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">S</forename><surname>Luvizan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Nascimento</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yu</forename><forename type="middle">A</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. Portland Int. Conf. on Management of Engineering and Technology: Technology Management For Social Innovation</title>
				<meeting>Portland Int. Conf. on Management of Engineering and Technology: Technology Management For Social Innovation</meeting>
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="925" to="936" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Data mining algorithms of bank transaction as a part of antifraud system</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">U</forename><surname>Sapozhnikova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Gayanova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nikonov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A M</forename><surname>Vulfin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Proc. Conf. Information Technologies for Intelligent Decision Making Support</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="143" to="149" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">A review of computer simulation for fraud detection research in financial datasets</title>
		<author>
			<persName><forename type="first">E</forename><surname>Lopez-Rojas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Axelsson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of Future Technologies Conf</title>
				<meeting>of Future Technologies Conf</meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="932" to="935" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<author>
			<persName><forename type="first">L</forename><surname>Dodds</surname></persName>
		</author>
		<ptr target="https://www.raconteur.net/technology/big-ideas-are-coming-from-using-big-data" />
		<title level="m">Big ideas are coming from using big data</title>
				<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Rosenbush</surname></persName>
		</author>
		<ptr target="https://blogs.wsj.com/cio/2013/03/11/visa-says-big-data-identifies-billions-of-dollars-in-fraud" />
		<title level="m">Visa Says Big Data Identifies Billions of Dollars in Fraud CIO J</title>
				<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<author>
			<persName><forename type="first">I</forename><surname>Piskunov</surname></persName>
		</author>
		<ptr target="https://www.securitylab.ru/blog/personal/Informacionnaya_bezopasnost_v_detalyah/339929" />
		<title level="m">Anti-fraud systems and how it works J. Securitylab</title>
				<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Data mining technologies in the problem of designing the bank transaction monitoring system ComputerScience and Information Technologies</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">U</forename><surname>Sapozhnikova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Gayanova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nikonov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A M</forename><surname>Vulfin</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="45" to="56" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Antifraud system on the basis of data mining technologies</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">U</forename><surname>Sapozhnikova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Gayanova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nikonov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vulfin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D V</forename><surname>Kurrenov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. Symp. on Signal Processing and Information Technology</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page">5</biblScope>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Real-time face identification via CNN and boosted hashing forest</title>
		<author>
			<persName><forename type="first">Yu</forename><forename type="middle">V</forename><surname>Vizilter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">S</forename><surname>Gorbatsevich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vorotnikov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N A</forename><surname>Kostromov</surname></persName>
		</author>
		<idno type="DOI">10.18287/2412-6179-2017-41-2-254-265</idno>
	</analytic>
	<monogr>
		<title level="j">Computer Optics</title>
		<imprint>
			<biblScope unit="volume">41</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="254" to="265" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Evaluation of signature verification reliability based on artificial neural networks, Bayesian multivariate functional and quadratic forms</title>
		<author>
			<persName><forename type="first">I</forename><surname>Ivanov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Lozhnikov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A E</forename><surname>Sulavko</surname></persName>
		</author>
		<idno type="DOI">10.18287/2412-6179-2017-41-5-765-774</idno>
	</analytic>
	<monogr>
		<title level="j">Computer Optics</title>
		<imprint>
			<biblScope unit="volume">41</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="765" to="774" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">The Development of E-Banking in Developing Countries in the Middle East</title>
		<author>
			<persName><forename type="first">M</forename><surname>Abbad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Abed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Abbad</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Financ. Account. Manag</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="107" to="123" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title/>
		<author>
			<persName><forename type="first">J E</forename><surname>Jarrett</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Internet Banking Development J. Entrep. Organ. Manag</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="2" to="5" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<ptr target="https://tipalti.com/" />
		<title level="m">Global Mass Payments, AP Software, B2B Payments</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Fedotenko</surname></persName>
		</author>
		<ptr target="https://xakep.ru/2017/04/21/antifrod-1/" />
		<title level="m">How banks are protected: explaining the structure and the principles of a bank antifraud system J. Hacker</title>
				<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Cross-) Browser Fingerprinting via OS and Hardware Level Features Proc</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Cao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Li</forename><forename type="middle">S</forename><surname>Wijmans</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Network and Distributed System Security Symp</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="1" to="15" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<ptr target="https://en.wikipedia.org/wiki/Big_data/" />
		<title level="m">Big Data</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<ptr target="http://hadoop.apache.org/" />
		<title level="m">Apache Hadoop</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<ptr target="https://spark.apache.org/" />
		<title level="m">Apache Spark</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<ptr target="https://clickhouse.yandex/" />
		<title level="m">Click House</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<ptr target="https://www.elastic.co/products/elasticsearch/" />
		<title level="m">Elastic search</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<ptr target="https://www.splunk.com/" />
		<title level="m">Splunk</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<ptr target="http://cassandra.apache.org/" />
		<title level="m">Apache Cassandra</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<ptr target="https://github.com/databricks/spark-sklearn/" />
		<title level="m">Spark-sklearn</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<monogr>
		<ptr target="https://www.h2o.ai/sparkling-water/" />
		<title level="m">Sparkling Water</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<monogr>
		<ptr target="github.com/yahoo/TensorFlowOnSpark/" />
		<title level="m">Tensor Flow On Spark (Access mode</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<monogr>
		<ptr target="https://zookeeper.apache.org/" />
		<title level="m">Apache Zookeeper</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<monogr>
		<ptr target="https://hive.apache.org/" />
		<title level="m">Apache Hive</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<monogr>
		<ptr target="http://sqoop.apache.org/" />
		<title level="m">Apache Sqoop</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<monogr>
		<ptr target="https://flume.apache.org/" />
		<title level="m">Apache Flume</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<monogr>
		<ptr target="http://oozie.apache.org/" />
		<title level="m">Apache Oozie</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Cloudera</forename><surname>Hue</surname></persName>
		</author>
		<ptr target="https://github.com/cloudera/hue/" />
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<monogr>
		<ptr target="https://sentry.io/welcome/" />
		<title level="m">Sentry</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<monogr>
		<ptr target="https://about.gitlab.com/" />
		<title level="m">GitLab</title>
				<imprint/>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
