Research Article

A Victim-Based Framework for Telecom Fraud Analysis: A Bayesian Network Model

Figure 8

(a) The sensitivity of nodes G/I/J to sex and work. (b) The sensitivity of “Cheat Type” to sex and work. (c) The sensitivity of “Call the Police” to sex and work. (d) The sensitivity of “Per Capita Loss” to sex and work.
(a)
(b)
(c)
(d)