Intern
    Data Science Chair

    Machine Learning for Network Security & Fraud Detection

    In the field of network security and fraud prevention, our research at the Chair focuses on developing machine learning-based approaches for anomaly detection.  Our primary focus lies in developing and utilizing machine learning algorithms to detect anomalies and suspicious activities in network security, host-based security and fraud detection in enterprise resource planning (ERP) systems. We aim to identify potential vulnerabilities and threats within these systems, enabling proactive measures to ensure data and system integrity.

     

    Projects

    Occupational Fraud Detection

    Detecting Fraud in ERP systems

    Concluded Projects

    • DeepScan -  Machine Learning for automatic detection of security relevant events and fraud.

    Publications

    • Generative Inpainting for...
      Generative Inpainting for Shapley-Value-Based Anomaly Explanation. Tritscher, Julian; Lissmann, Philip; Wolf, Maximilian; Krause, Anna; Hotho, Andreas; Schlör, Daniel. In The World Conference on eXplainable Artificial Intelligence (xAI 2024) - to appear. 2024.
    • Feature relevance XAI in ...
      Feature relevance XAI in anomaly detection: Reviewing approaches and challenges. Tritscher, Julian; Krause, Anna; Hotho, Andreas. In Frontiers in Artificial Intelligence, 6. 2023.
    • Evaluating feature releva...
      Evaluating feature relevance XAI in network intrusion detection. Tritscher, Julian; Wolf, Maximilian; Hotho, Andreas; Schlör, Daniel. In The World Conference on eXplainable Artificial Intelligence (xAI 2023). 2023.
    • Occupational Fraud Detect...
      Occupational Fraud Detection through Agent-based Data Generation. Tritscher, Julian; Roos, Alexander; Schlör, Daniel; Hotho, Andreas; Krause, Anna. In The 8th Workshop on MIning DAta for financial applicationS MIDAS 2023. 2023.
    • Open ERP System Data For ...
      Open ERP System Data For Occupational Fraud Detection. Tritscher, Julian; Gwinner, Fabian; Schlör, Daniel; Krause, Anna; Hotho, Andreas. In arxiv. 2022.
    • Detecting Anomalies in Tr...
      Detecting Anomalies in Transaction Data. Technical Report (PhD dissertation), . Schlör, Daniel. PhD dissertation. Universität Würzburg, 2022.
    • Towards Explainable Occup...
      Towards Explainable Occupational Fraud Detection. Tritscher, Julian; Schlör, Daniel; Gwinner, Fabian; Krause, Anna; Hotho, Andreas. In Machine Learning and Principles and Practice of Knowledge Discovery in Databases. ECML PKDD 2022, Communications in Computer and Information Science(1753), pp. 79–96. 2022.
    • Malware detection on wind...
      Malware detection on windows audit logs using LSTMs. Ring, Markus; Schlör, Daniel; Wunderlich, Sarah; Landes, Dieter; Hotho, Andreas. In Computers & Security, 109, p. 102389. 2021.
    • A financial game with opp...
      A financial game with opportunities for fraud. Tritscher, Julian; Krause, Anna; Schlör, Daniel; Gwinner, Fabian; Von Mammen, Sebastian; Hotho, Andreas. In 2021 IEEE Conference on Games (CoG), pp. 1–5. 2021.
    • A financial game with opp...
      A financial game with opportunities for fraud. Tritscher, Julian; Krause, Anna; Schl{\"o}r, Daniel; Gwinner, Fabian; von Mammen, Sebastian; Hotho, Andreas. In IEE COG 2021, 2021. 2021.
    • Evaluation of Post-hoc XA...
      Evaluation of Post-hoc XAI Approaches Through Synthetic Tabular Data. Tritscher, Julian; Ring, Markus; Schlör, Daniel; Hettinger, Lena; Hotho, Andreas. In Foundations of Intelligent Systems, D. Helic, G. Leitner, M. Stettinger, A. Felfernig, Z. W. Raś (eds.), pp. 422–430. Springer International Publishing, Cham, 2020.
    • Financial Fraud Detection...
      Financial Fraud Detection with Improved Neural Arithmetic Logic Units. Schlör, Daniel; Ring, Markus; Krause, Anna; Hotho, Andreas. Vol. Fifth Workshop on MIning DAta for financial applicationS. 2020.
    • Flow-based network traffi...
      Flow-based network traffic generation using Generative Adversarial Networks. Ring, Markus; Schlör, Daniel; Landes, Dieter; Hotho, Andreas. In Computers & Security, 82, pp. 156–172. 2019.