<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>ijesm</PublisherName>
      <JournalTitle>International Journal of Engineering, Science and</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 7, Issue 4</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Multidisciplinary</IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>April 2018</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>2018</Year>
        <Month>04</Month>
        <Day>24</Day>
      </PubDate>
      <ArticleType>Engineering, Science and Mathematics</ArticleType>
      <ArticleTitle>IMPLEMENTATION OF DATA MINING TECHNIQUES FOR CYBER CRIME DETECTION</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>607</FirstPage>
      <LastPage>613</LastPage>
      <AuthorList>
        <Author>
          <FirstName>K. Chitra Lekha* Dr. S.</FirstName>
          <LastName>Prakasam**</LastName>
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>N</CorrespondingAuthor>
          <ORCID/>
        </Author>
      </AuthorList>
      <DOI/>
      <Abstract>Data mining technology is applied to fraud detection to ascertain the scam detection model, to depict the process of creating the scam detection model, and then to begin the data model with any classifier. As e-commerce transactions persist to develop, the allied online hoax remains an eye-catching resource of income for fraudsters. This counterfeit activity inflicts a significant financial hammering to merchants, making online fraud detection a prerequisite. The issue of scam detection is concerned with not only confining the fraudulent activities, but also detaining them as rapidly as possible. This relevance is decisive to shrink financial losses. Cyber crimes are a communal pest and rate our society greatly in numerous ways. The investigation of cyber crime cases has very significant role in police enforcement system in any country. This paper presents a comprehensive study on data mining techniques and its responsibility on detection of cyber crimes in real time applications. Data mining robotically sieves through massive quantity of data to uncover known/unknown patterns that fetches out valuable, innovative perceptions and formulate predictions. Data mining which is alienated into two learning skills viz., supervised and unsupervised is engaged to detect fraudulent asserts. Basically these techniques are used for fraud detection in many sectors such as health , insurance, E-commerce and it goes on.</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>Credit card scam; Cyber bullying; Genetic algorithm; MultiLayer Perceptron; Probability Density Evaluation; Self Organizing Map;  Neural Networks.</Keywords>
      <URLs>
        <Abstract>https://ijesm.co.in/ubijournal-v1copy/journals/abstract.php?article_id=5628&amp;title=IMPLEMENTATION OF DATA MINING TECHNIQUES FOR CYBER CRIME DETECTION</Abstract>
      </URLs>
      <References>
        <ReferencesarticleTitle>References</ReferencesarticleTitle>
        <ReferencesfirstPage>16</ReferencesfirstPage>
        <ReferenceslastPage>19</ReferenceslastPage>
        <References/>
      </References>
    </Journal>
  </Article>
</ArticleSet>