金融网络中资金流动模式识别与智能化异常监测
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
金融是现代经济的主要支柱之一,金融系统的稳定性更是世界各国金融监管部门的主要任务和核心职责之一。金融信息化改变了传统的金融体制和业务模式,随着金融机构信息化、网络化和全球化改变了金融机构的经营方式,金融网络中资金流动呈现速度快、数量大、创新多等特点,大量的资金在金融系统中流动着以满足正常的经济活动需求,但也夹杂着许多不正常、违规违法的资金流动,怀揣各种想法的资本所有者在金融网络中施展百般武艺,逃脱监管,达到资金流动的目的,给金融监管部门带来了空前的挑战。本研究拟建立科学系统的分析、识别可疑资金流动的智能化的金融监管模式、模型、方法,为金融机构和金融监管部门提供有效的决策支持工具。
     本文研究基于以下思路:基于约束理论的反洗钱业务流程瓶颈研究――>基于正常模板的资金流动异常识别方法研究――>基于扫描统计的单帐户资金流动异常识别研究――>基于序列匹配的单帐户资金流动异常识别研究――>基于社会关系网络的多帐户资金流动异常识别研究。
     本文主要工作和结论如下:
     (1)文章在约束瓶颈(TOC)理论的指导框架下,通过深入访谈反洗钱各相关部门,从整体上勾勒了目前反洗钱业务实施实际的整体框架图,理清了各个相关部门在开展发洗钱业务时的主要依据、数据的扭转方式、内部控制机制等;并进一步从物理约束、政策约束和行为约束三方面总结归纳了存在于金融机构和监管部门的主要反洗钱瓶颈。
     (2)基于正常模板的资金流动异常客户分析一章节,在总结分析影响企业经营活动的若干因素,如宏观经济环境、行业特征、企业规模和地区差异之后,利用统计模式识别的方法从资金流动交易金额分布、资金流动的时间特征、资金流动地区特点、资金流入、流出对比分析、资金流动间隔频度分布等多个纬度建立正常模式的相关模型。
     (3)基于扫描统计的单帐户资金流动异常识别研究一章,研究根据扫描统计相关原理,将资金流动过程中的异常识别问题转化为扫描统计研究问题。并结合上一章节的正常模式,设计利用扫描统计监测帐户资金流动异常的算法。实验结果表明,算法对甄别帐号交易过程中短期内的异常资金交易行为十分有效。能够大大降低监测的第一类错误,即降低漏报率,然而,在降低第二类错误(误报),提高算法敏感性方面仍然需要做进一步改进。
     (4)基于序列匹配的单帐户资金流动异常识别研究章节,研究充分利用金融机构在反洗钱识别中的主要信息源:客户信息、帐户信息和交易信息,试图完成资金识别的最终目的:分类正常与异常交易。算法基于序列匹配相关原理,建立识别问题对应的查询序列-高风险交易片段,参考序列-帐户的历史交易记录和同组帐号的交易记录,并建立相似度核-基于欧几里德距离和余弦法的相似度计算方法,最终根据分类阶段阈值识别异常识别。
     (5)最后,基于社会关系网络的多帐户资金流动异常识别研究,文章首先研究了基于社会关系网络相关理论描述多帐户间资金网络构建方法,然后从金融监管实际中隐藏网络的实际问题出发,建立基于隐藏网络分析的多帐户资金流动网络中隐藏网络的异常识别方法,并根据实验验证隐藏网络识别算法的可行性。
     文章的主要创新工作可以归纳为以下几个部分:
     第一,建立了基于约束理论的反洗钱业务流程瓶颈研究方法,为我国其他金融监管问题提供可参考的理论依据与研究方法。在对现有的金融监管问题的研究中,国内外学者多以‘点’切入,单就业务流程环节的某一单一环节的单一问题进行研究,提出监管建议。然而,这样的研究方法不利于从整体上把握影响监管效率的关键因素。
     本文通过引入供应链领域的‘约束理论’将反洗钱监管监管效率看作由监管领域上下游各环节间、各部门共同协作,共同决定的。通过从业务环节的各个环节之间的信息扭转、职责明确,以及各环节的主要工作重要和工作环境分析,从‘面’上描述反洗钱业务的全貌,同时又有针对性的从物理约束、政策约束和行为约束多方面总结归纳影响各关键环节的主要因素。
     第二,提出了基于正常模式识别异常的监测模式,为我国监管部门进一步完善大额可疑报告细则提供理论依据,也为金融机构抽取可疑资金报告提供新的思路。
     国家目前已经针对反洗钱金融犯罪制定了《金融机构反洗钱规定》和《金融机构大额交易和可疑交易报告管理办法》,然而在金融机构执行的可疑报告抽取的时候,多反映在实施过程按照管理办法中的条例“过于模糊”,“难以量化”,给实际监管工作带来困难。另一方面,目前我国的商业银行用于甄别洗钱活动的决策模型主要是基于固定规则的,其效率相对低下,存在大量的误判错判,并且犯罪分子可以通过简单的规避和反侦察手段逃过监管。本研究提出基于正常模式的异常识别监测模式,该模式可以根据行业、监测力度动态调整可疑标准,使得犯罪分析不能通过简单的规避手段逃过监管。另一方面,采用智能化的监测手段辅助可疑报告抽取工作,使得监测效率可以大幅提高,并在很大程度上将监管专家从人工识别的繁杂劳动中解放出来。
     第三,建立了基于社会关系网络分析的异常群体识别模型,使得利用客户之间的交易关系识别异常成为可能,为完善风险可控的监管平台提供新的监管思路。
     金融网络中对手方交易信息对于追溯资金的来源和识别资金的目的地发挥着重要的作用,传统的监管条例多单一地围绕客户的直接交易方,而犯罪团体可以在一定程度上通过借助空壳公司、离岸公司或者各种金融服务公司作为媒介,增加资金交易的路径,以掩盖其真实的目的,因此,迫切需要建立能够有效识别金融网络中隐藏团体的抽取模型。
     本研究利用社会关系网络和图论的相关理论的建立金融网络中隐藏团体的抽取模型,抽取客户间交易关系代表的社会关系,并试图通过智能化的监测手段,甄别隐藏在正常金融交易行为中的隐藏团体。
     第四,从网络层、客户层、交易层三个层次系统建立了适应于金融网络信息分布特征的监管体系,使得各个算法能够有针对性的服务于不同的监管主体和监管目的。
     根据《金融机构反洗钱规定》和《金融机构大额交易和可疑交易报告管理办法》,金融机构有义务向监管部门上报金融网络海量数据中的可疑交易和可疑客户。监管部门接收来自全国各地不同金融机构的报告,并进一步分析转移这些高度可疑的交易和客户,同时还有责任从宏观层次上分析当前最新的异常模式和资金流向规律,不同主体的不同监管职责和信息分布特征决定了我们需要有针对性的设计满足各自需要的监管模型。
     本研究根据不同主体的信息分布特征,设计满足于其自身需求的监测模型,同时又综合考虑模型之间的关联性和兼容性,使得从网络层、客户层、交易层三个层次建立的监管体系能够行之有效的服务于当前金融监管实际。
Finance is one of the main pillars in modern economy, and the stability of financial system is the major tasks and core responsibilities for the world’s financial supervision authorities. Financial information technology has changed the traditional financial system and business model: the financial institutions become electronic connected, with more complexity and tend to be globalization; the capital flows within the financial institution are filled with large volume of transactions with high speed and showed as innovative forms. Large amount of money are flowing in the financial system to meet the needs of normal economic activities, but also few abnormal, illegal capital flows are carring a variety bad ideas and intent to escape regulation, which brought big challenges to supervision authorities. This study aims to establish a scientific and systematic analysis method to effectively provide intelligent decision support systems for financial institutions and financial regulators.
     This paper is organized as the following orders: first we study the main constrains and bottlenecks in anti-money laundering business process based on Theory of Constraints (TOC), then we conduct research to identify the abnormal customer in capital flow based on normal patterns; then we use Scan Statistics to identify the suspicious transactions from a single customer angle; and we establish a suspicious transaction identification method using sequence matching based algorithms; also we establish a social network based method to identify hidden groups in financial networks. In this paper, the main work are as follows:
     (1) We conduct a in-depth interviews under the framework of Theory of Constrains (TOC) to study the main constraints and bottlenecks in the AML organizational system, we surveyed those relevant agencies, figure out their AML responsibilities, their operations and business process, the information distribution they have for detecting suspicious reports, also the way transferring valuable data. Also we conclude the main AML bottlenecks existed in financial institutions and supervision agencies from three aspects: physical constrains, policy constraints and behavioral constraints.
     (2) We establish a suspicious customer identification method based on normal pattern. First we analyze the main factors which affect the capital flow of a company; those factors include the macroeconomic environment, the industry characteristics, the firm size, and the regional differences. Then we use statistical pattern recognition to analyze the distribution of capital flow from different latitude: transaction amount, time characteristics, regional characteristics, capital direction, and interval of the sequent transactions.
     (3) We also use scan statistic method to identify suspicious transaction activity in single account angle. Based on the principle of Scan Statistics, we transfer the identification of suspicious transaction into a scan statistics problem. In conjunction with the previous normal pattern model, we design a scan statistics based monitoring algorithm. The Experiment results show that the proposed algorithm can effectively detect the abnormal behavior in short observing period. Results also confirm that this intelligent algorithm can largely reduce the Type I error, which is also to say that it can effectively reduce the omitting rate. However, we need to find way to further reduce Type II errors (false positives) and improve the sensitivity results of the algorithm.
     (4) Based on sequence matching algorithm, we establish an algorithm to identify suspicious transaction using the main sources in financial institutions: customer information, account information, and transaction information. In order to achieve the final goals: classify normal transactions and suspicious transactions, we collaborate sequence matching algorithm, and establish the query sequences in this problem- high-risk transaction fragments, the reference sequence- the history of the query customer and also transactions of other customers in the same peer group. Also we use Euclidean distance based and cosine based similarity kernel to calculate the similarities between query sequences and reference sequences. The final stage of this algorithm label the query sequences and classify them into normal and abnormal based on given threshold.
     (5)Finally, we propose an algorithm to find hidden groups in financial networks based on social network theory. The paper first discuss the construction of a financial network using social network theory, and then bring up the practical issue of hidden group in financial supervision. Then we establish a model to identify hidden group in financial networks for supervision center. The experiment results show that this model is feasible in identifying small gangs or extracting related criminal hidden groups from a given nut.
     The main innovative ideas can be concluded as following:
     First, the method of identification of the main constraints and bottlenecks in AML organization system provide us the valuable theoretical basis to study other similar supervision problems.
     In previous research about current financial regulation issue, many scholars in and abroad solely study single point of the issue or focus on single link within business process chain. However, such research can hardly grasp the overall picture of a complex problem, or find the key factors which affect the supervision efficiency.
     This paper views the AML problem in an overall picture by surveying the upstream and downstream within the whole AML business process. Through analyzing the AML responsibilities for each AML related agencies, their operations and treatment process, the information distribution they have to detect suspicious reports, also the way to transferring valuable data, we draw the whole picture for anti-money laundering business process. We also summed up the key constraint from physical, policy and behavior angles to identify the most influential factors on AML efficiency.
     Secondly, we propose a pattern to identify suspicious behavior by comparing normal pattern, which can provide insight to improve Administrative rules for the reporting of large-value and suspicious activity reports, and also it explores new direction for suspicious detection.
     When reporting large amount or suspicious transactions according to Administrative rules for the reporting of large-value and suspicious activity reports, the financial institutions encountered problems of‘hard to quantify’, which brought difficulty to monitoring and detecting work. On the other hand, current extracting tool in financial institutions are mainly rule based system, with low efficiency and the criminals can easily escape the regulation by simply learn from the regulation rules.
     We proposed intelligent algorithm which can easily adjust the efficiency by changing different parameters, it makes the criteria difficult to escape. On the other hand, using intelligent tools, the type I and type II error can be reduced so that we can free the experts from huge labor.
     Thirdly, we incorporate the customer relationship information into detection, and propose algorithm to identify hidden groups in financial networks. This provides a new idea to regulation platform.
     The source and destination information of a transaction played important role in suspicious detection. However, traditional regulatory solely focus the direct transaction partner in suspicious detection. This encourages the criminals to use offshore company or variety financial services as medium to veil these illegal activities. Finding hidden groups within large financial networks is of urgency.
     In this study, we construct financial network using social network related theory, we extract networks which describe transaction relationship, and try to access the hidden groups in financial networks using intelligent monitoring tools.
     Fourth, we establish suspicious extracting tools from three layers: network layer, customer layer, and transaction layer for financial institutions and supervision agencies, according to their information distribution.
     Base on different responsibilities and information distribution of financial institutions and supervision agencies, we design intelligent tools which can exactly need their requirements, separately. The monitoring system based on algorithms from these three layers: network layer, customer layer, and transaction layer, can effectively serve the current financial regulation practice.
引文
[1] Advanced Legal Studies. Volume Two, Number One, Summer. 1998.
    [2] Agrawal, R., Lin, K., Sawhney, H., Shim, K.: Fast Similarity Search in the Presence of Noise, Scaling, and Translation in Time-Series Databases. VLDB ,1995:p. 490-501
    [3] Agrawal, R., Giuseppe, P., Edward, W.L., Zait, M.: Querying Shapes of Histories. VLDB ,1995: p.502-514
    [4] Agrawal, R., Faloutsos, C., Swami, A.: Efficient similarity search in sequence databases. FODO - Foundations of Data Organization and Algorithms Proceedings,1993,p: 69-84
    [5] Agurney.A.N., and S,Siokos. Financial Networks: Statics and Dynamics.Springer-Verlag Heidelbcrg.Germany, 1997.
    [6] Ajayi, O. and Ososami S. Nigeria: On the Trail of a Spectre Destabilization of Developing and Transitional Economies. Journal of Money Laundering Control, 1998,1(4).
    [7] Alba, R. M. Panama: Bank Secrecy and Prevention of Economic Crime. Journal of Money Laundering Control, 1998,1(4).
    [8] Alesina, A., & Perotti, R. Budget deficits and budget institutions. Unpublished manuscript. Cambridge and New York: Harvard University and Columbia University, 1994.
    [9] Ali, A. S. A Gateway for Money Laundering? Financial Liberalization in Developing and Transnational Economies. Journal of Money Laundering Control, 1998,1(4).
    [10] Ali, S. A. Jamaica: Combating Money Laundering - A Review of the Money Laundering Act. Journal of Money Laundering Control, 1998,1(3).
    [11] Ammann. P., D. Wijesekera, S. Kaushik. Scalable, Graph-Based Network Vulnerability Analysis. Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, November 2002.
    [12] Amir Noiboar and Israel Cohen .Anomaly detection in three dimension data based on gauss markov random filed modeling. IEEE conference, 2004.
    [13] Anna Nagurney and June Dong.Financial Networks and Optimally-Sized Portfolios. Computational Economics, 2001,17:p. 5–27.
    [14] Anna Nagurney and Jose Cruz. Dynamics of international financial networks with risk management,Quantitative Finance, 2004,4:p.276–291.
    [15] Ani1 K. Jain, Robert P.W. Duin, and Jianchang Mao. Statistical Pattern recognition: A review. IEEE Transactions on pattern analysis and machine intelligence, 2000.1.
    [16] Antunes, C.M. and A.L. Oliveira, Temporal data mining: An overview. KDD Workshop on Temporal Data Mining, 2001: p. 1-3.
    [17] Arthur WB, J H Holland, B Lebaron, R G Palme, P Talyer. Asset Pricing under endogenous expectations in an artificial stock market.
    [18] Arthur, W.B. (eds), The economy as an evolving complex system II. Redwood City, CA:Assison Wesley,1997.
    [19] Australian Government Publication Service, Taken to the Cleaners: Money Laundering in Australia, Enfield, NSW. 1992.
    [20] Australian Senate Committee, Checking the Cash: A Report on the Effectiveness of the Financial Transaction Reports Act 1988. Senate Standing Committee on Legal and Constitutional Affairs, Canberra. 1993.
    [21] Bacchetta, P., & van Wincoop. E. Capital flows to emerging markets: liberalization, overshooting and volatility. NBER Working Paper,Cambridge, MA: NBER. 1998,(6530).
    [22] Backhouse, J., Structured account of approaches on interoperability. FIDIS WP4, Del, 2005. 4.
    [23] Bagenda, Prince M., Chapter 3. Combating money laundering in the sadc sub-region: the case of Tanzania.
    [24] Baldwin, Fletcher N. Jr. The Constitution, Forfeiture, Proportionality and Instrumentality: USA vs. Bajakajian - The U.S. Supreme Court Tries Again. Journal of Money Laundering Control, 1998,1(4).
    [25] Baldwin. R., Kuang. Rule Based Security Checking, Technical Report. MIT Lab for Computer Science, May 1994.
    [26] Banerjee, A. and J. Ghosh, Clickstream clustering using weighted longest common subsequences. Proc. of the Workshop on Web Mining, SIAM Conference on Data Mining, 2001: p. 330.
    [27] Barry Eichengreen.Taming Capital Flows University of California, Berkeley, USA, World Development, 2000,28(6):p.1105-1116.
    [28] Baumes J., M.Goldberg, M.Magdon-Ismail, W.Wallance., On hidden groups in communication networks. Technical report, TR 05-15, Computer Science Department, Rensselaer Polytechnic Institute (2005).
    [29] Bettini, C., Wang, S.X., Jagodia, S., Lin, J.L. Discovering Frequent Event Patterns with Multiple Granularities in Time Sequences. IEEE Transactions on Knowledge and Data Engineering, 1998,10: p.222-237.
    [30] Bhagwati, J. Yes to free trade, maybe to capital controls. Wall Street Journal, 1998,16.
    [31] Bian Yanjie. Guanxi and the Job Allocation in Urban China. The China Quarterly, 1994,140:971.
    [32] BNA. Cooperation in Fight Against Money Laundering in Context of European Community Integration. BNA's Banking Report, January 1990: p. 119-122.
    [33] Bowman.C.M, P.B.Danzing, U.Manber, M.F.Schwartz. Scalable Internet Resource Discovery. Research Problems and Approaches, Communications of the ACM, 1994,37: p.98-107.
    [34] Bowman.C.M., Peter B.Danzing,Darren R.Hardy,Udi Manber,Michael F.Schwartz. The Harvest Information Discovery and Access System.Computer Networks and ISDN System, 1995,28: p.119-125.
    [35] Brecher, R., & Bhagwati, J. Immiserizing transfers from abroad. Journal of International Economics, 1982,13: p. 353-364.
    [36] Caddie Shijia Gao and Dongming Xu, Conceptual modeling and development of an intelligent agent-assisted decision support system for anti-money laundering. 2005.
    [37] Calvo, G., & Reinhart, C. When capital flows come to a sudden stop: consequences and policy options. Unpublished manuscript, University of Maryland at College Park, 1999.
    [38] Calvo, G., & Mendoza, E. Rational herd behavior and the globalization of securities markets. Institute for Empirical Macroeconomics Discussion Paper, Federal Reserve Bank of Minneapolis. 1997: p.119-121.
    [39] Calvo, G., & Mendoza, E. Petty crime and cruel punishment: lessons from the Mexican debacle. American Economic Review Papers and Proceedings, 1996,96: p.170-175.
    [40] Camdessus, M., Money Laundering: The importance of international countermeasures. IMF to the Plenary
    [41] Meeting of the Financial Action Task Force on Money Laundering, Paris, 1998,Feb: p.2.
    [42] Canhoto, A.I. and J. Backhouse, Profiling under conditions of ambiguity-an application in the financial services industry. Journal of Retailing and Consumer Services, 2007. 14(6): p. 408-419.
    [43] Caprio, G., Atiyas, I., Hanson, J. A. Financial reform: theory and experience. New York: Cambridge University Press. 1994.
    [44] Cardenas, M., & Barrera, F. On the effectiveness of capital controls in Colombia. Unpublished manuscript, Fedesarrollo, 1995.
    [45] Carol M.Beaumier and carl J.Hatfield. Effective anti-money laundering monitoring issues and challenges. Bank accounting and financial, 2003.2.
    [46] Carrasco, R., Oncina, J.: Learning Stochastic Regular Grammars by means of a State Merging Method. ICGI1994: p. 139-152
    [47] Cassella, S.D., Overview of asset forfeiture law in the United States. South African Journal of Criminal Justice, 2004. 17(3): p. 347-367.
    [48] Chan, K., Fu, W.: Efficient Time Series Matching by Wavelets. ICDE. 1999: p. 126-133
    [49] Chan, M. Hong Kong: Money Laundering Legislation. Journal of Money Laundering Control,1997,1.
    [50] Chen, H., et al., Crime Data Mining: A General Framework and Some Examples. 2004.
    [51] Christensen, J. and Hampton, M. P. The capture of the State in Jersey′s Offshore Center, University of Portsmouth, United Kingdom, September,1998.
    [52] Christian, Osmand N. A. An implementation of a dynamic negotiation model for competitive and cooperative agents.
    [53] Chua. D.K.H., ASCE, M., and Shen, L.J., Key Constriants Analysis with integrated production scheduler. Journal of construction engineering and management, 2005: pp. 753-764.
    [54] Cotton, J. Australia: Lawyers Should be Treated Like Banks, Bookmakers and Bullion Dealers. Journal of Money Laundering Control, 1998,1(3).
    [55] Council of Europe. 1991. Explanatory report on the Convention on Laundering, Search, Seizure, and Confiscation of the Proceeds of Crime. Council of Europe Publishing and Documentation Service, Strasbourg, France.
    [56] Criado. R., J.Flores, M.I.Gonzalez-Vasco, J.Pello. Choosing a leader on a complex network. Journal of Computational and applied mathematics. 2005.
    [57] Dawkins. J., C. Campbell, J. Hale. Modeling Network Attacks: Extending the Attack Tree Paradigm. Proceedings of the Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, Johns Hopkins University, June 2002.
    [58] Daniel S. Nagin, Bobby L. Jones. Advances in Group-based Trajectory Modeling and a SAS Procedure for Estimating Them. A research report, supported by generous financial support from the National Science Foundation(SES-9911370). 2006.
    [59] Das, G., D. Gunopulos, and H. Mannila, Finding Similar Time Series. Principles of Data Mining and Knowledge Discovery: First European Symposium, PKDD'97, Trondheim, Norway, June 24-27, 1997: Proceedings, 1997.
    [60] David. Civil Forfeiture of Proceeds of Crime in Australia, Journal of Money Laundering Control, 2002,5(4): p.345-359.
    [61] Devenow, A., & Welch, I. Rational herding in financial economics. European Economic Review, 1996,40: p.603-615.
    [62] Demirguc-Kunt, A., Levine, R., & Min, H.-G. Opening to foreign banks: issues of stability, efficiency, and growth. In The implications of globalization of world ?nancial markets. Seoul: Bank of Korea. 1998: p.83-115.
    [63] Desire, Development of a European Service for Information on Research and Education , http://www.desire.org/Aspen [EB/OL] httpa/www.cs.sandia.gov/tech reports/rjpryor/Aspen.html
    [64] Dettmer, H.W., Breaking the Constraints to World Class Performance, Milwaukee, WI. ASQ Quality Press. 1998.
    [65] Dooley, M. P. Capital controls and emerging markets. International Journal of Finance and Economics, 1996,1: p.197-205.
    [66] Emin Aleskerov, Bernd Freisleben and Bharat Rao. CARDWATCH:A neutral network based database mining system for credit card fraud detection. 1997
    [67] Faloutsos, C., Ranganathan, M., Manolopoulos, Y.: Fast Subsequence Matching in Time-Series Databases.ACM SIGMOD Int. Conf. on Management of Data. 1994:p . 419-429.
    [68] Feng, Y. China, the Crime of Embezzlement and Bribery - Weapon against Money Launderers. Journal of Money Laundering Control, 1997,1(2).
    [69] Financial Action Task Forth, The Forty Recommendations, 2003.
    [70] Force, F.A.T., Report on Money Laundering Typologies, 2000-2001. 2002, English ed. Accessed.
    [71] Frawley, W., Piatetsky-Shapiro, G., Matheus, C.. Knowledge discovery in databases: An overview. AI Magazine, 1992, 13(3), p: 57-70.
    [72] Gavrilov, M., et al., Mining the stock market: Which measure is best. Proc. of the 6th ACM SIGKDD, 2000.
    [73] Ge, X., Smyth, P.. Deformable Markov Model Templates for Time Series Pattern Matching. KDD, 2000: p. 81-90.
    [74] Giles, C., Lawrence, S., Tsoi, A.C.: Noisy Time Series Prediction using Recurrent Neural Networks and Glodratt, E.M., An introduction to Theory of Constraints: The Production Approach.
    [75] Glodratt, E.M, Theory of constraints, North River Press, 1999.
    [76] Goldratt, E.M, The goal, North River Press, 1999.
    [77] Glodratt, E.M., An introduction to Theory of Constraints: The Goal Approach, Avraham Y.Goldratt Institute, New Haven, Connecticut, 1992.
    [78] Gold, M & Levi, M. Money-Laundering in the UK: an Appraisal of Suspicion-Based Transaction Reporting. Police Foundation, London. 1994.
    [79] Goldberg, H. and T.E. Senator, Restructuring databases for knowledge discovery by consolidation and link formation. Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis, 1998.
    [80] Gombay, E., Sequential change-point detection with likelihood ratios. Statistics and Probability Letters, 2000. 49(2): p. 195-204.
    [81] Granovetter .Mark. The Strength of Weak Ties.American Journal of Sociology, 1973,78: p. 1360-1380.
    [82] Greenberg, T. S. Anti-Money Laundering Activities in the United States.Action Against Transnational Criminality: Papers from the 1993 Oxford Conference on International and White Collar Crime, London. 1994.
    [83] Guimar?es, G.: The Induction of Temporal Grammatical Rules from Multivariate Time Series. ICGI .2000: p.127-140.
    [84] Guralnik, V. and J. Srivastava, Event detection from time series data. Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining, 1999: p. 33-42.
    [85] Guralnik. V., Wijesakera. D., Srivastava. J.: Pattern Directed Mining of Sequence Data. KDD. 1998.p: 51-57 .
    [86] Haykin. S., Neural Networks. A comprehensive Foundation. Seconded. Englewood Cliffs, N.J.: Prentice Hall, 1999.
    [87] Higuera, C.: Learning Stochastic Finite Automata from Experts. ICGI. 1998,p: 79-89.
    [88] Hughes, M. and Nagurney, A. A network model and algorithm for the estimation and analysis of financial flow of funds. Computer Science in Economics and Management, 1992,5, p:23–39.
    [89] Hyun-Chul Kim, Shaoning Pang, Hong-Mo Je, Daijin Kim, Sung Yang Bang. Pattern Classification Using Support Vector Machine ensemble. IEEE. 2002.
    [90] Izci, A. Turkey: Efforts to Prevent Money Laundering. Journal of Money Laundering Control, 1998,(1).
    [91] Jaakko Hollm′en. User profiling and classification for fraud detection in mobile communications networks. IEEE, 1995.
    [92] Jain. A.K., and R.C.Dubes. Algorithms for clustering data. Englewood Cliffs. N.J.:Prentice Hall, 1998
    [93] Jason Kingdon. AI Fights Money Laundering. Intelligent Systems and Their Applications, 2004.
    [94] Jha, S. O. Sheyner, J. Wing. Two Formal Analyses of Attack Graphs. Proceedings of the 15th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, June 2002.
    [95] Jha. S., Oleg Sheyner. Two formal analysis of attack graghs. IEEE, 2002.
    [96] Johnson, Jackie. Australia: Attitudes to Extending the Scope of Anti-money Laundering Legislation, Journal of Money Laundering Control, 2001,(5), p: 16-24.
    [97] Jones, B. L, Nagin, D. S, Roeder, K. A SAS Procedure Based on Mixture Models for Estimating Developmental Trajectories. Sociological Methods & Research. 2001.
    [98] Jose R.Dorronsoro .Neural Fraud Detection in Credit Card Operations. IEEE. 1997
    [99] Jose E. Cabral, Jo?ao O. P. Pinto. Methodology for Fraud Detection Using Rough Sets. IEEE. 2006.
    [100] Juillé, H., Pollack, J.: A Stochastic Search Approach to Grammar Induction. ICGI, 1998,p: 79-89.
    [101] Jun Tang, Jian Yin. Developing an intelligent data discriminating system of anti-money laundering based on SVM. Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, Guangzhou.2005
    [102] Kai Zheng, Rema Padman, Michael P.Johnson, John B.Engberg and Herbert S.Diamond. User Acceptance and adoption of a clinical reminder system. Proceedings of 11th world congress on Medical Informatics. 2004.
    [103] Keogh, E. and P. Smyth, A probabilistic approach to fast pattern matching in time series databases. Proceedings of the 3 rdInternational Conference of Knowledge Discovery and Data Mining, 1997: p. 24-20.
    [104] Kulldorff , M., A spatial scan statistic. Communications in statistics: Theory and Methods, 1997. 26:p.1481-1496
    [105] Kulldorff, M., F. Mostashariz, L.Duczmal, W. Katherine., Multivariate scan statistics for disease surveillance. Statistics in Medicine, 2007. 26:p. 1824-1833
    [106] Kumar, B. V. India: The Misuse and Abuse of Legal Provisions in Money Laundering. Journal of Money Laundering Control, 1997,1(2).
    [107] Lambert, Alan. The Carribean Anti-Money Laundering Program, Journal of Money Laundering Control, 2001,5(2): p.158-161.
    [108] Land, K., McCall, P, & Nagin, D. A comparison of Poisson, negative binomial, and semiparametric mixed Poisson regression models with empirical applications to criminal careers data. Sociological Methods& Research, 1996,.24:p.387-440.
    [109] Lane, T. and C.E. Brodley, Temporal sequence learning and data reduction for anomaly detection. ACM Transactions on Information and System Security (TISSEC), 1999. 2(3): p. 295-331.
    [110] Lang, K., Pearlmutter, B., Price, R.: Results of the Abbadingo One DFA Learning Competition and a new Evidence-Driven State Merging Algorithm. ICGI. 1998: p. 79-89.
    [111] Leach, L.P, Critical chain project management, Artech House, Inc.m Norwood, Mass, 2000.
    [112] Lensink. Robert., Niels Hermes, Victor Murinde. Capital flight and political risk. Journal of International Money and Finance, 2000,19: p,73–92.
    [113] Lepore, D., and Cohen O., Deming and Goldratt, The Theory of Constraints and the System of Profound Knowledge, Great Barrrington, MA. North River Press Publishing Go. 1999.
    [114] Lingyu Wang, Steven Noel and Suchil Jajodia. Minimum-cost network hardening using attack graphs. Computer Communications. 2006
    [115] Liu, X. and P. Zhang, Research on Constraints in Anti-Money Laundering (AML) Business Process in China Lusty,
    [116] Lloyd J.Taylor III, P.E., Brian J.M., Geralyn M.F., Public Personnel Management, 2003, 32(3): p.367-382.
    [117] Based on Theory of Constraints. Hawaii International Conference on System Sciences, Proceedings of the41st Annual, 2008: p. 213-213.
    [118] MacDonald, S. Money Laundering and the Asia/Pacific Region. International Enforcement Law Reporter, 1993,9(6): p.215-221.
    [119] MacDonald, S. Asia/Pacific Catches the Money Laundering Bug: Part 2. International Enforcement Law Reporter, 1993,9(9): p.334-336.
    [120] Magliveras, Konstantinos D. The Regulation of Money Laundering in the United Kingdom, Journal of Business Law.1991,11: p. 525-535.
    [121] Magliveras, Konstantinos D. The Recent Legislation to Combat Money Laundering in Spain," 12 International Enforcement Law Reporter. 1996: p. 84-88.
    [122] Magliveras, Konstantinos D. The Implementation of the 1991 EC Directive on Money Laundering in Germany, Italy and The Netherlands. New York State Bar Association International Law Practicum. 1995. Autumn: p. 89-100.
    [123] Magliveras, Konstantinos D. The European Community's Combat Against Money Laundering: Analysis and Evaluation, 5 Nova Southeastern University ILSA Journal of International & Comparative Law. 1998: p. 91-120.
    [124] Magliveras, Konstantinos D. The Efforts of the European Community to Supervise the Community's Financial Services Sector. In Caiger and Floudas eds, Onwards: Lowering the Barriers Further, John Wiley & Sons, Chichester: 1996: p.81-104.
    [125] Magliveras, Konstantinos D. Revision to the European Community's Anti-Money Laundering Instrument: Critical Analysis. International Enforcement Law Reporter, 2002,18(5): p.181-185.
    [126] Magliveras, Konstantinos D. Defeating the Money Launderer: The International and European Framework. Journal of Business Law, 1992: p. 161-177.
    [127] Magliveras, Konstantinos D. Banks, Money Laundering and the European Community in J. Norton (editor), Banks, Fraud and Crime, Second Edition, Lloyd's of London Press, London, 2000: p.173-200.
    [128] Magliveras, Konstantinos D. An Examination of the Inter-American Convention on Corruption, 3 International Enforcement Law Reporter, 1997: p.201-208.
    [129] Malik Magdon-Ismail, Mark Goldberg, William Wallace, and David Siebecker. Locating hidden groups in communication networks using Hidden Markov Models. In International Conference on Intelligence and Security Informatics (ISI 2003). Tuscon, AZ, June 2003.
    [130] Mannila, H., Toivonen, H., Verkamo, I.: Discovering Frequent Episodes in Sequences. KDD 1995: p.210-215.
    [131] Masciandaro, D. and U. Filotto, Money Laundering Regulation and Bank Compliance Costs: What Do Your Customers Know? Economics and the Italian Experience'. Journal of Money Laundering Control, 2001. 5(2): p. 133-145.
    [132] Maynard, P. Bahamas: Civil Liberties and Privacy - The Question of Balance. Journal of Money Laundering Control, 1997, 1(2).
    [133] Millard, G. H. Drugs and Organized Crime in Latin America. Journal of Money Laundering Control, 1997. 1.
    [134] Minghua He, Nicholas R.Jennings. Designing a successful trading agent:a fuzzy set approach. IEEE transaction on fuzzy systems. 2004(12):p.389-410.
    [135] Money laundering, Source: National White Collar Crime Center,www.nw3c.org.2005.2
    [136] Morgan, Matthew S. Money Laundering: The United States Law and Its Global Influence, London: International Financial & Tax Law Unit, Center for Commercial Law Studies, Queen Mary & Westfield College, University of London in cooperation with the London Center for International Banking Studies andthe London Institute of International Banking, Finance & Development Law. 1996.
    [137] Nagin DS. Analyzing Developmental Trajectories: A Semiparametric, Group-Based Approach. Psychological Methods, 1999,4: p.139-157.
    [138] Nagin DS, Tremblay RE. Analyzing Developmental Trajectories of Distinct but Related Behaviors: A Group-Based Method. Psychological Methods, 2001,6(1): p.18-34.
    [139] Nagin, D. Analyzing developmental trajectories: A semi-parametric, group-based approach. Psychological Methods, 1999,4: p.139一157.
    [140] Nagin, D., Farrington, D&Moffitt, T. Life-course trajectories of different types of offenders. Criminology, 1995,33: p.111-139.
    [141] Nagin, D. S&Land, K. C. Age, criminal careers and population heterogeneity: Specification and estimation of a nonparametric, mixed Poisson model. Criminology, 1993,31: p.327-362.
    [142] Naus, J., Clustering of random points in two dimensions. Biometrika, 1965. 52: p.263-267
    [143] Nwana. H.S., Software agents: An overview. Knowledge Engineering Review. 1996,(11),p: 1-40.
    [144] Oleg Sheyner. Scenario graphs and attack graphs: a summary. Unpublished paper.
    [145] Oliveira, A., Silva, J.: Efficient Algorithms for the Inference of Minimum Size DFAs. Machine Learning, 2001,4: p.93-119.
    [146] Organization of American States. Narcotics Money Laundering in the Caribbean Region:A Vulnerability Assessment. Coopers & Lybrand. 1994.
    [147] Osimire, U. Nigeria: Critique of the Money Laundering Decree No. 3, 1995. Journal of Money Laundering Control, 1997,1.
    [148] Pensa, A. Money Laundering in Italy,”Paper presented at ISPAC International Conference on ,Responding to the Challenges of Transnational Crime, Vienna, Austria September, 1998: p.25-27,
    [149] Phillips. C., L. Swiler. A Graph-Based System for Network-Vulnerability Analysis. Proceedings of the New Security Paradigms Workshop, Charlottesville, VA, 1998.
    [150] Philip K.Chan, Wei Fan. Distributed data mining in credit card fraud detection. IEEE, 1999.
    [151] Philippsohn. Steven., Money Laundering on the Internet.Computers & Security, 2001, 20:p.485-490.
    [152] Possamai, Mario. Money on the Run: Canada and How the World's Dirty Profits Are Laundered. Toronto: Penguin. 1992.
    [153] Protiviti Inc. Guide to U.S Anti-money laundering Requirements,2003.9.
    [154] Quesnay, F.Tablean Economique, Reproduced in facsimile with an introduction by H.Higgs. The British Economic Society,1958
    [155] Rafiei, D. and A. Mendelzon, Similarity-based queries for time series data. Proceedings of the 1997 ACM SIGMOD international conference on Management of data, 1997: p. 13-25.
    [156] Ram Dantu, Kall Loper and Prakash Kolan. Risk management using behavior based attack graphs. Proceedings of International Conference on Information technology: Coding and Computing, IEEE. 2004.
    [157] Ramakrishnan. C., R. Sekar. Model-Based Analysis of Configuration Vulnerabilities. Proceedings of the 7th ACM Conference on Computer and Communication Security, November 2000.
    [158] Ramasastry, A. The Geographic Targeting Order: A Useful Tactic for Combating Money Laundering by Non-Bank Entities in the USA. Journal of Money Laundering Control, 1998,1(3).
    [159] Ridley, N. Bulgaria: Major Problems Caused by Illicit Money Transfer are Met with Grim Determination. Journal of Money Laundering Control, 1998,1(4).
    [160] Ritchey. R., P. Ammann. Using Model Checking to Analyze Network Vulnerabilities. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, 2000.
    [161] Roddick, J., Spiliopoulou, M.: A Survey of Temporal Knowledge Discovery Paradigms and Methods. InIEEE Transactions of Knowledge and Data Engineering, 2001,(13).
    [162] Roybal, H., Baxendale, S.J., and Gupta, M., Using Activity-Based Costing and Theory of Constraints to Guide Continuous Improvement in Managed Care, Managed Care Quarterly, 1999.7: pp. 1-10.
    [163] Sakakibara, Y.: Recent Advances of Grammatical Inference. Theoretical Computer Science, 1997,185:p,15-45.
    [164] Sakakibara, Y., Muramatsu, H.: Learning Context Free Grammars from Partially Structured Examples. ICGI ,2000: p. 229-240 .
    [165] Samuel P.M.Choi,Jiming Liu, Sheynug-Ping Chan. A genetic agent-based negotiateon System. Computer networks. 2001(37):p,195-204.
    [166] Sankoff, D. and M. Blanchette, Multiple Genome Rearrangement and Breakpoint Phylogeny. Journal of Computational Biology, 1998. 5(3): p. 555-570.
    [167] Scholkop. B., A.Smola, and K.R. Muller. Nonlinear component analysis as a Kernel Eigenvalue Problem. Neural Computation, 1998,10(5):p.1299-1319.
    [168] Schneider, S., Organized crime, money laundering, and the real estate market in Canada. Journal of Property Research, 2004. 21(2): p. 99-118.
    [169] Senator, T.E., Ongoing management and application of discovered knowledge in a large regulatory organization: a case study of the use and impact of NASD Regulation's Advanced Detection System (RADS). Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining, 2000: p. 44-53.
    [170] Senator, T.E., et al., The financial crimes enforcement network AI system(FAIS): identifying potential money laundering from reports of large cash transactions. The AI magazine, 1995. 16(4): p. 21-39.
    [171] Shapiro, G., Smyth, P., Uthurusamy, R. (eds.): Advances in Knowledge Discovery and Data Mining. AAAI Press. 1996:p. 229-248,
    [172] Sherman, Tom. Combating Money Laundering in the Asia-Pacific Region. Research Institute for Asia and Pacific Business Briefing, September. 1995,27.
    [173] Sheyner. O., J. Haines, S. Jha, R. Lippmann, J. Wing. Automated Generation and Analysis of Attack Graphs. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, 2002.
    [174] Smyth, P., Probabilistic Model-Based Clustering of Multivariate and Sequential Data. Artificial Intelligence and Statistics. 1999:p.299-304.
    [175] Sinuraya, T. Integration of Criminal Capital from Russia into Western European Markets: An Assessment of Threat. Journal of Money Laundering Control, 1997,1.
    [176] Solongo, Dolgor. Russian Capitalism and Money-Laundering. A study by staff member of the Global Programme against Money Laundering, Office for Drug Control and Crime Prevention, Vienna, Austria. March. 2001.
    [177] Srivatsan Laxman, A survey of temporal data mining, 2006.
    [178] Stefano Allesina and Antonio Bodini. Who dominates whom in the ecosystem? Energy flow bottlenecks and cascading extinctions. Journal of Theoretical Biology, 2004.
    [179] Steven Noel and Sushil Jajodia. Managing attack graph complexity through visual hierachical aggregation. VizSEC/DMSEC, 2004.
    [180] Steyn, H., An investigation into the fundamentals of critical chain project scheduling, Int. J.Proj. Mange, 2000, 19: p. 363-369.
    [181] Storoy. S., S.Thore. and Boyer.M. Equlibrium in Liner capital market networks.The journal og Finance,1975,30(4):p.1197-1211.
    [182] Sushmito Ghosh and Douglas L.Reilly. Credit card fraud detection with a neural-network. IEEE, 1994.
    [183] Simser, J., The significance of money laundering: The example of the Philippines. Journal of Money Laundering Control, 2006. 9(3): p. 293-302.?
    [184] Swiler. L., C. Phillips, D. Ellis, S. Chakerian. Computer-Attack Graph Generation Tool. Proceedings of the DARPA Information Survivability Conference & Exposition II, June 2001.
    [185] Tang, J. and J. Yin, Developing an Intelligent Data Discriminating System of Anti-Money Laundering Based on SVM. Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on, 2005. 6.
    [186] Tao Zhang, Ming-Zeng Hu, Dong Li and Liang sun. An effective method to generate attack graph. Unpublished paper.
    [187] The Seventh Annual International Money Laundering Conference, Fontainebleau Hilton Resort, Miami Beach USA Wednesday to Friday, February, 2002
    [188] The TOC Center, The Five-Step Process. Inc, 2002. [EB/OL]. www.tocc.com
    [189] Thomas A. Stewart. Six degrees of Mohamed Atta. Business 2.0, 2 issue 10:63, 2001.
    [190] Thore. S., Credit networks. Economica,1969,36(1):42-57.
    [191] Thore. S., Programming the networks of Financial Intermediation. Universities Oslo.Norwav.1980.
    [192] Thoumi, Francisco. U.S., Colombia struggle over drugs, dirty money. Forum for Applied Research and Public Policy, Spring. 1997.
    [193] Transcript of an Economic Forum,Capital Flow Cycles: Old and New Challenges,Friday, November 7, 2003,Washington, D.C.
    [194] Uche, C. U. The Adoption of a Money Laundering Law in Nigeria. Journal of Money Laundering Control, 1998,1(3).
    [195] United States General Accounting Office. Money Laundering: A Framework for Understanding U.S. Efforts Overseas. Washington, DC: May. 1995.
    [196] United Nations Convention against IIIicit Traffic in Narcotic Drugs and Psychotropic Substances,1998.
    [197] U.S.Congress, Information technologies for the control of money laundering. Office of Technology Assessment, Report OTA-ITC-630, U.S. Government Printing Office, Washington,DC., 1995.
    [198] Valdis E.Krebs. Mapping Networks of Terrorist Cells. Connections. 24(3): 43-52. 2002
    [199] Van Zyl, F. South Africa: Money Laundering Regulation - The Way Ahead. Journal of Money Laundering Control, 1997,1.
    [200] Varese F. Pervasive corruption in Economic Crime in Russia, London: Kluwer. Law International. 1999.
    [201] VladimirBoginski, Sergiy Butenko , Panos M. Pardalos. Statistical analysis of financial networks. Computational Statistics & Data Analysis, 2005,48: 431-443.
    [202] Walker, J. Estimates of the Extent of Money-Laundering in and through Australia. John Walker Consulting Services, Queanbeyan. 1995.
    [203] Wang Dong, Wang Quan-yu, ZHAN Shou-yi, LI Feng-xia, WANG Da-zhen. A Feature Extraction Method for Fraud Detection in Mobile Communication Networks. Proceedings of the 5'h World Congress on Intelligent Control and Automation,2004.
    [204] Wooldridge. M., Agent-based software engineering. IEE Pro-Softw.Eng, 1997(1):26-37.
    [205] Wntanabe. S., Pattern recognition: Human and Mechanical. New York: Wiley, 1985.
    [206] YangLi, Anti-money Laundering: China is taking action [EB/OL].Xinhua.net .2003.02.09.
    [207] Yeo, K.T., and Ning, J.H., Integrating supply chain and critical chain concepts in engineering-procure-construct (EPC) projects. Int. J.Proj. Mange. , 2002, 20: pp. 253-262.
    [208] Yufeng Kou, Chang-Tien Lu, Sirirat Sinvongwattana,Yo-Ping Huang. Survey of Fraud detection techniques. IEEE .2004.
    [209] Zerkle. D., K. Levitt. Netkuang– A Multi-Host Configuration Vulnerability Checker. Proceedings of the 6th USENIX Unix Security Symposium, San Jose, CA, 1996.
    [210] Zheng, K., Padman, R., Johnson, M. P., Engberg, J. and Diamond, H. An adoption study of a clinical reminder system in ambulatory care using a developmental trajectory approach. Unpublished paper.
    [211] ZhongFei Zhang. Applying Data Mining in Investing Money Laundering, 2003: p.747-752 Zerey, J. C. Greece: The Law on Money Laundering. Journal of Money Laundering Control, 1997,1(2). Zhu, T., Suspicious Financial Transaction Detection Based on Empirical Mode Decomposition Method. Services Computing, 2006. APSCC'06. IEEE Asia-Pacific Conference on, 2006: p. 300-304.
    [212] Zhu, T., An Outlier Detection Model Based on Cross Datasets Comparison for Financial Surveillance. Services Computing, 2006. APSCC'06. IEEE Asia-Pacific Conference on, 2006: p. 601-604.
    [213]边肇祺.模式识别[M].清华大学出版社,1999.
    [214]陈玉辉.银行业金融机构反洗钱工作的难点及政策建议[J].福建金融,2006,(08):29-30.
    [215]陈雨露著.国际资本流动的经济分析[M].中国金融出版社,1997:40-41.
    [216]蔡浩仪,徐忠.外部性、不确定性、非对称信息与金融监管[R],中国人民银行工作人员论文,2004.1.
    [217]程小白,徐鹏.国际反洗钱经验对我国反洗钱工作的启示[J].江西公安专科学校学报2006.(04):53-57.
    [218]第一届中国反洗钱理论与实践研讨会会议记录.上海:复旦大学, 2006年11月.
    [219]段益军.金融监管体制:理论分析与现实选择[J].济南金融,2004.(11):29-31+34.
    [220]段启俊、刘芬.网络洗钱犯罪的立法完善[J].湖南大学学报(社会科学版). 2006,20(5):141-146.
    [221]冯芸,吴冲锋.全球大系统关联结构与金融波动的国际传播[J].预测,2002.(02):25-29.
    [222]冯芸,吴冲锋.从波动到危机——货币危机研究[J].世界经济,2001.(01).
    [223]冯芸,杨冬梅,吴冲锋.洗钱行为识别与监管[M].上海交通大学出版社,2008.
    [224]冯芸,张晶晶.期货市场中洗钱行为的识别[J].管理学报,2009,6(04):489-501.
    [225]国家外汇管理局日照市中心支局课题组,反洗钱数据采集中的两个问题,中国外汇管理, 2004,102: pp. 55.
    [226]黄开鲜,当前基层开展反洗钱工作存在的问题及政策建议,广西金融研究. 2004,(03).
    [227]胡秋灵,姚文辉.聚类分析方法在反洗钱应用中的优先序探讨[J].金融电子化,2005(11):72-74.
    [228]苟天来.村落邻里关系构成与分布的网络关系[D].中国农业大学硕士学位论文,2005
    [229]康耀红.数据融合理论与应用[M].西安:北京电子科技大学出版社,1997
    [230]梁英武等编.支付交易与反洗钱[M].中国金融出版社,2003.
    [231]刘少波,蒋海.信誉机制、信用资源的有效供给与信用缺失治理———对中国当前信用缺失问题的信息经济学分析[J].金融研究,2004.(01):59-65.
    [232]罗友山.关于金融监管的博弈分析[J].经济评论,2002.(01):92-94.刘海龙,郑立辉,吴冲锋.证券投资者群体行为的系统描述[J].上海交通大学学报,2004.(03):31-34.
    [233]李玮,黄丞,蒋馥.基本医疗保险中共谋问题的研究与防范[J].管理工程学报,2004.(03):9-12.
    [234]罗贤缙,蔡淑琴.聚类分析在电力营销中的应用研究[D].优秀硕博论文. 2004.
    [235]刘源,董立岩.运用聚类数据挖掘技术预防电信业中的欺诈行为[D].优秀硕博论文, 2005.
    [236]李永清.中国现代化支付系统构想[J].计算机应用,1995.(01):9-12.
    [237]李时,张成虎.隐私保护关联规则在可疑金融交易识别中的应用[J].兰州大学学报(社会科学版), 2007,35(02):128-132.
    [238]李时,基于模糊概念的可疑金融交易量化关联规则研究[J].当代经济科学, 2007,29(02):57-60.
    [239]刘龄.关于银行监管的博弈与思考,北京理工大学学报(社会科学版),2004.(01):83-85.
    [240]李纪建.国际反洗钱立法的最新进展及其对我国的借鉴[J].金融理论与实践,2006,(8):81-83.
    [241]罗纬.反洗钱体系建立于运行中的群体理性的丧失与恢复[J].金融论坛. 2005,(10).
    [242]李成,钱华.非均衡反洗钱金融监管:理论解析与实证检验[J].上海金融. 2006,(05):36-38.
    [243]刘同明等.数据融合技术及其应用[M].北京:国防工业出版社. 1998
    [244]欧阳卫民a.金融情报机构(M).中国金融出版社,国际货币基金组织,2005.
    [245]欧阳卫民b.国际反洗钱重要文献选读[M].中国金融出版社,2005.
    [246]欧阳卫民c.中外洗钱案例评析[M].法律出版社,2005.
    [247]欧阳卫民a.反腐败、反洗钱与金融情报机构建设[M].法律出版社,2006.
    [248]欧阳卫民b.大额和可疑资金交易监测分析实务[M].法律出版社,2006.
    [249]彭敬.关于我国金融网络犯罪的立法思考[J].决策借鉴, 2002,15(01):65-67.
    [250]曲联佳.基层反洗钱工作存在的问题及建议[J].黑龙江金融. 2006,(08):62.
    [251]史定华,姜璐等译.随机网络的演化,复杂网络-系统结构研究文集[M],上海理工大学,2004.4.
    [252]宋文兵.国际短期资本流动与国际货币制度的变迁(上)-一种历史制度分析的新视角[J].国际金融研究,1999.(11):25-31.
    [253]孙秋美.短期资本流定的国际经验借鉴[J].中国外汇管理,2003.(09):24-26.
    [254]斯蒂格利茨.经济学(第二版)[M].中国人民大学出版社, 2001.
    [255]宋军,吴冲锋.中国股评家预测行为的实证研究[J].数理统计与管理,2003.(03):2-6+18.
    [256]苏春艳.社会网络与职业获得-转型期下岗失业女工再就业过程研究[D],上海大学博士学位论文,2005.
    [257]宋文兵,国际短期资本的流动机制[D].华东师范大学,1999年度博士论文.
    [258]苏进,张佑生.一种分层聚类模型机器在电信行业的应用研究[D].合肥工业大学硕士学位论文,2005.
    [259]十届全国人民代表大会常务委员会第六次会议《关于修改〈中华人民共和国中国人民银行法〉的决定》修正
    [260]汤俊.基于客户行为模式识别的反洗钱数据监测与分析体系[J] .中南财经政法大学学报,2005,(04):62-67+143-144.
    [261]汤俊,熊前兴.用于的对比离散群点检测模型[J].武汉理工大学学报,2006,(04):118-121.
    [262]汤俊.基于客户行为模式识别的反洗钱数据监测与分析体系[J].中南财经政法大学学报, 2005(4):62-70.
    [263]王自力.反洗钱[M].中国金融出版社,2003.
    [264]孙立.论资本市场全球一体化趋势[J].东北师大学报(哲学社会科学版),2002.(03):6-14.
    [265]王键君.热钱挑战中国金融监管[J].了望新闻周刊,2003.43.
    [266]吴晓东,关于金融网络的几个基本问题[J].成都气象学院学报,2000.(01):33-36.
    [267]吴冲锋,宋军.金融复杂性[J].系统工程,2002,(04):1-6.
    [268]孙景,李志伟,刘炜.基于逻辑回归的企业大额可疑外汇资金交易识别模型[J].上海金融,2008(06):58-61.
    [269]王志亮.社会网络分析方法在科研协作网中的应用研究[D].大连理工大学硕士学位论文,2005.
    [270]王涛,邱泽新.英国会计师暂行指引对我国会计职业的启示[J].金融会计. 2006,(9):42+48-51.
    [271]王福重,王晓燕.反洗钱国际合作中的博弈分析[J].中国外汇管理. 2005,(07):27-28.
    [272]翁丽芳,陈萍.金融反洗钱中的博弈分析[J].商场现代化. 2006,(27):283.
    [273]徐克恩. 21世纪国际资本流动新格局与我国利用外资前景[J].城市金融论坛,2000.(06):50-54.
    [274]薛耀文.金融网络中资金异常流动监测研究[D].上海交通大学, 2006.
    [275]涂洪波.社会资本与个人职业地位的获得-转型期社会关系网络与求职行为研究[D],武汉大学硕士学位论文,2004.
    [276]薛耀文,张朋柱,范静.金融网络中资金异常流动准则辨识研究[J].中国软科学,2004.(09):58-63.
    [277]蒙肖莲,蔡淑琴.商业银行客户识别与保持模型研究[D].华北电子大学优秀硕博论文,2005.
    [278]宣慧玉,高宝俊.一个基于离散时间仿真的multi-agent经济仿真模型[J].信息与控制,2002,(01).
    [279]薛耀文,张朋柱,范静.复杂金融网络中资金异常流动仿真监测平台设计与实现[J].系统工程理论方法应用,2005.(05):67-71.
    [280]原永中,张新福.商业银行和中央银行在反洗钱问题上的博弈[J].山西财经大学学报,2003.(03):74-77.
    [281]阳建伟,蒋馥.行为金融:理论、模型与实践[J].当代经济科学,2001.04.
    [282]袁龙,仝允桓.ASX证券市场监管及其启示[J].外国经济与管理.2002.(05):29-33.
    [283]于公伟.部分国家反洗钱立法概况[J].中国人大, 2006.(22):18-19.
    [284]姚文.美国反洗钱机制及对我国的启示[J].河南金融管理干部学院学报,2006,(5):100-104.
    [285]杨胜刚,何靖.反洗钱领域大额与可疑信息报告制度的经济学分析[J].金融研究. 2004,(10):
    [286]杨东梅,吴冲锋,冯芸.金融网络中洗钱资金转移路径的经济成本模型[J].系统工程理论与实践, 2006,(05).
    [287]张宁,王恒山,狄增如译.复杂网络的统计力学,复杂网络-系统结构研究文集[M].上海理工大学,2004.4.
    [288]张宁.网络研究的基本概念,Scale-Free网络及BA模型[D].上海理工大学,2004.9
    [289]资金异常流动监测国际研讨会,中国外汇管理,2004.6.
    [290]张碧琼.论国际资本流动自由化理论渊源与制度选择[J].世界经济,1999.(01):42-47.
    [291]张立文.管制与放松管制:从亚洲金融危机看中国政府关于国际资本流动政策取向[J].世界经济,2000.(12):45-51.
    [292]朱宝明.银行业反洗钱中信息不对称与信息披露的例证分析[J].国际金融研究,2004.(04).
    [293]朱宝明,彭思源.国外反洗钱制度发展对我国的启示[J].中国金融,2003.(03):25-26.
    [294]中国人民银行令〔2006〕第1号又称:金融机构反洗钱规定.
    [295]中国人民银行令〔2006〕第2号又称:金融机构大额交易和可疑交易报告管理办法.
    [296]周涛. Wiki社群的社会网络分析[D].华东师范大学硕士学位论文,2005.
    [297]张海辉.不对称的社会距离-对苏州市本地人与外地人的关系网络和社会距离的初步研究[D].清华大学硕士学位论文,2004.
    [298]张焱.知识发现在金融反洗钱领域中的应用研究[D].合肥工业大学优秀硕士毕业论文,2004.
    [299]张成虎,赵小虎.基于小波分析的可疑金额交易时间序列研究[J].现代管理科学,2009(07):102-104.
    [300]张成虎,赵小虎.基于CURE聚类的可疑金融交易信息搜索研究[J].情报杂志, 2008,(06):52-54.
    [301]张敏,张朋柱,刘璇.商业银行资金流动异常行为监测的仿真体系设计[J].上海管理科学, 2007,01.
    [302]张敏,宋泓均,张朋柱,刘璇.现代反洗钱技术执法体系框架研究[J].计算机应用研究, 2008,02.
    [303]查宏.美国证券、期货业反洗钱经验及启示[J].南方金融. 2006,(09): p.57-59.
    [304]赵恩斌.完善外汇领域反洗钱数据采集监测体系的思考[J].中国外汇. 2005,(12): p.77.
    [305]赵宗贵译.数据融合方法概论[M].南京:电子工业部二十八研究所,1998.
    [306]中华人民共和国刑法修正案(六),2006年6月29日第十界全国人民代表大会常务委员会第二十二次会议通过
    [307]中华人民共和国主席令第五十六号(2006)中国人民共和国反洗钱法.
    [308]中华人民共和国银行法1995年3月18日第八届全国人民代表大会第三次会议通过根据2003年12月27日第中华人民共和国主席令(第二十一号)(2004)中华人民共和国证券法中华人民共和国第十届全国人民代表大会常务委员会第十一次会议于2004年8月28日通过
    [309]中华人民共和国主席令(第十一号)(2009)中华人民共和国保险法中华人民共和国第十一届全国人民代表大会常务委员会第七次会议于2009年2月28日修订通过
    [310]中国人民银行金融业反洗钱框架制度构建研究课题组,中国金融业反洗钱框架制度构建研究,济南金融. 2002, (7):p. 7-11.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700