To expand your knowledge simply choose a specific technique
Rules that are applied fully independent from a fraudulent behavior, allowing for exclusion of known customers’ transactions with a usual behavior from the detection phase.
Rules that are defined based on fraud cartography describing different fraud typologies such as phishing, malware, etc. Investigators’ experience and known behaviors are heavily capitalized.
Customers are profiled based on past activity and significant deviations are used for alerts.
Provide the ability to build statistical models exploiting self-learning with minimal human intervention to improve the accuracy of detection over time.