1.
P. Lilley, “Dirty dealing, the untold truth about global money laundering, international crime and terrorismâ€, Kogan page limited, 2000.
2.
P. Reuter, and E. Truman, “Chasing dirty moneyâ€, Institute for international economics, Washington, USA, 2005.
3.
G. SHIJIA, X. Dongming, W. Huaiqing, W. Yingfeng, “Intelligent Anti Money Laundering Systemâ€, Service Operations And Logistics, And Informatics, Ieee International Conference, Pp. 851-856, 2006.
4.
R. Molander, D. Mussington, and P. Wilson, “Cyberpayments and money laundering problems and promiseâ€, Financial crime enforcement network, RAND Critical technology institute, Washington, USA, 1998.
5.
F. Kwong, “Anti Money Launderingâ€, Computer Assisted Auditing Techniques, Retrieved 1 July 2011 available at http://uwcisa.uwaterloo.ca/Biblio2/Topic/ACC626%20Anti%20Money%20Laundering%20F%20Kwong.pdf
6.
Pellegrina, L. D, and Masciandaro, “The Risk Based Approach in the New European Anti-Money Laundering Legislatinâ€,Retrieved May 29, 2011, available at http://www.bepress.com/cgi/viewcontent.cgi?article=1422&context=rle
7.
J. Wit, “A Risk-Based Approach to AML: A Controversy between Financial Institutions and Regulatorsâ€, Journal of Financial Regulation and Compliance, Vol. 15, PP. 156-165, 2007.
8.
T. Senator, H. Goldberg, J. Wooton, M. Cottini, U. Khan, C. Klinger, W. Liamas, M. Marrone, R. Wong, “The FinCEN Artificial Intelligence System: Identifying Potential Money Laundering from Reports of large cash transactionsâ€, U.S. Department of the Treasury - Financial Crimes Enforcement Network (FinCEN), Association for the Advancement of Artificial Intelligence, USA, Vol. 16, No. 4, PP. 156-170, 1995.
9.
T. Jun. “A Peer Dataset Comparison Outlier Detection Model Applied to Financial Surveillanceâ€. Proceedings of the 18th International Conference on Pattern Recognition, IEEE Computer Society, Washington, USA, Vol. 4, PP. 900-903, 2006.
10.
S. Wang, J. Yang, “A money laundering risk evaluation method based on decision treeâ€, Proceedings of the International Conference on Machine Learning and Cybernetics, PP. 283-286, Hong Kong, 2007.
11.
Y.Wang, H. Wang, S. Gao, D. Xu, “Intelligent Money Laundering Monitoring and Detecting Systemâ€, European and Mediterranean Conference on Information Systems, Dubai, available at “http://www.iseing.org/emcis/emcis2008/Proceedings/Refereed%20Papers/Contributions/C%2045/Intelligent_Money_Laundering_Monitoring_and_Detecting_System.pdf “, 2008.
12.
N. Le-Khac, S. Markos, M. Kechadi, “A Heuristics Approach for Fast Detecting Suspicious Money Laundering Cases in an Investment Bankâ€, International Scholarly and Scientific Research AND Innovation, Engineering and Technology, Vol. 3, No. 12, PP. 70-74, 2009.
13.
J. Luell, “Employee Fraud Detection under Real World Conditionsâ€, Ph.D. thesis, University of Zurich, 2010.
14.
Anti-Money Laundering Countering Financing of Terrorism, “National Risk Assessment 2010â€, Financial Intelligence Unit, New Zealand Police, New Zealand, available at http://www.justice.govt.NZ/policy/criminal-justice/AML-CFT/publications-AND-consultation/national-risk-assessment-2010, 2010.
15.
Financial Action Task Force, “International Standards on Combating Money Laundering and the Financing of Terrorism and Proliferation – The FATF Recommendationsâ€, available at “www.fatf-gafi.org/recommendations “, 2012.
16.
Financial Transactions and Reports Analysis Center, Typologies and Trends, “Money Laundering and Terrorist Financing (ML/TF) Typologies and Trends for Canadian Money Services Businesses (MSBs)â€, FINTRAC Reports of Canada, Canada, 2010.
17.
The Canadian Institute of Chartered Accountants, “Canada’s Anti-Money Laundering and Anti-Terrorist Financing Requirementsâ€, available at www.cica.ca, 2008.
18.
Belgian Financial Intelligence Processing Unit, “Money Laundering Indicatorsâ€, available at http://www.ctif-cfi.be/website/images/EN/typo_ctifcfi/NL1175eENG.pdf, 2007.
19.
E. Garcia, P. Regan, J. Stern, W. Johnson, R. Macallister, J. Reidenberg, D. vogt, R. Serino, B. Proter, S. Welling, “Information Technologies for the Control of Money Launderingâ€, OTA-ITC-630, Washington, USA, 1995.
20.
Australian Transaction Reports and Analysis Center, “Money Laundering in Australia, Australia Government, available at http://www.austrac.gov.au/files/money_laundering_in_australia_2011.pdf, 2011.
21.
R. Fuhrer, “Sequential Optimization of Asynchronous and Synchronous Finite-State Machine: Algorithms and Toolsâ€, Springer, 2001.
22.
D. Lee, “Principles and Methods of Testing Finite State Machine surveyâ€, Proceedings of the IEEE, Vol. 84, No. 8, PP. 1089-1123, 1996.
23.
A. Aho, R. Sethi, J. Ullman, “Compilers: Principles, Techniques, and Tools Second Editionâ€, Addison Wesley, 2006.
24.
The Center for Public Integrity, available at http://www.publicintegrity.org/2012/10/18/11498/pennsylvania-governor-benefited-untraceable-15-million-donation, 2012.