P. Barson’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (3)


Figure 2. A visual representation of the network validation.
Detection of fraud in mobile phone networks
  • Article
  • Full-text available

January 1996

·

1,236 Reads

·

63 Citations

P. Barson

·

·

N. Davey

·

[...]

·

R. Frank

Fraudulent use within the mobile communications network is costing the industry hundreds of millions of dollars each year. The industry is now making a major effort to find ways of combating the problem. In this paper we report our attempts to apply neural computational techniques to the problem of identifying fraudulent use of mobile phone networks. Our first experiments have used a Multi-Layer Perceptron network, and with this we have obtained 92.5% correct classification of our stochastically simulated data.

Download

Figure 1. Frequency activation of the nodes contained in a 55 by 55 SOM trained on 10,257 vectors.
Figure 2: An indexed taxonomic tree for the clones of a single block of code. It can be seen that A and D were cloned and subsequently B and C were cloned from D.
Figure 5: The clone detector tool process 
Figure 6: The user interface of the productised clone detector. 
Figure 7: A simple tree structure representing the similarity of five vectors A…E.
The Development of a Software Clone Detector

January 1995

·

451 Reads

·

83 Citations

Cloning, the copying and modifying of blocks of code, is the most basic means of software reuse. Code cloning has been very extensively used within the software development design community. Unofficial surveys carried out within large, long term software development projects suggest that 25-30% of the modules in this kind of system may have been cloned. A system to detect clones of procedures in large software systems is described. The system uses a self organising neural net, a SOM, to cluster feature vectors associated with the procedures. We report how a prototype system was developed and subsequently enhanced into a full product quality tool. The limitations of the SOM-based tool are the long training times and the fixed number of clone classes that are created. A second neural net model, the Dynamic Competitive Learning (DCL) net, which overcomes both these limitations is also discussed as a possible component: the results of our initial trials with the SOM-based tool and the DCL-based prototype are given.


Citations (2)


... Intrusion detection in information security has been addressed with various approaches [11][12][13]. In the financial sector, fraud prevention has seen advancements through specialized detection systems [14][15][16]. The detection of unusual patterns in images has been tackled using neural networks [17], while detecting fake news has been studied through various methods [18,19]. ...

Reference:

Statistically inspired discrepancy detection for anomalous spatio-temporal graphs
Detection of fraud in mobile phone networks

... Lanubile et al. [51] proposed a semi-automated method to detect clone script functions, using eMetrics tool to retrieve the potential function clones. Davey et al. [52], detects exact, parameterized and near-miss clones by using neural networks on features retrieved. ...

The Development of a Software Clone Detector