P. Lilley, “Dirty dealing, the untold truth about global money laundering, international crime and terrorism”, Kogan page limited, 2000.
P. Reuter, and E. Truman, “Chasing dirty money”, Institute for international economics, Washington, USA, 2005.
G. SHIJIA, X. Dongming, W. Huaiqing, W. Yingfeng, “Intelligent Anti Money Laundering System”, Service Operations And Logistics, And Informatics, Ieee International Conference, Pp. 851-856, 2006.
R. Molander, D. Mussington, and P. Wilson, “Cyberpayments and money laundering problems and promise”, Financial crime enforcement network, RAND Critical technology institute, Washington, USA, 1998.
F. Kwong, “Anti Money Laundering”, Computer Assisted Auditing Techniques, Retrieved 1 July 2011 available at http://uwcisa.uwaterloo.ca/Biblio2/Topic/ACC626%20Anti%20Money%20Laundering%20F%20Kwong.pdf
Pellegrina, L. D, and Masciandaro, “The Risk Based Approach in the New European Anti-Money Laundering Legislatin”,Retrieved May 29, 2011, available at http://www.bepress.com/cgi/viewcontent.cgi?article=1422&context=rle
J. Wit, “A Risk-Based Approach to AML: A Controversy between Financial Institutions and Regulators”, Journal of Financial Regulation and Compliance, Vol. 15, PP. 156-165, 2007.
T. Senator, H. Goldberg, J. Wooton, M. Cottini, U. Khan, C. Klinger, W. Liamas, M. Marrone, R. Wong, “The FinCEN Artificial Intelligence System: Identifying Potential Money Laundering from Reports of large cash transactions”, U.S. Department of the Treasury - Financial Crimes Enforcement Network (FinCEN), Association for the Advancement of Artificial Intelligence, USA, Vol. 16, No. 4, PP. 156-170, 1995.
T. Jun. “A Peer Dataset Comparison Outlier Detection Model Applied to Financial Surveillance”. Proceedings of the 18th International Conference on Pattern Recognition, IEEE Computer Society, Washington, USA, Vol. 4, PP. 900-903, 2006.
S. Wang, J. Yang, “A money laundering risk evaluation method based on decision tree”, Proceedings of the International Conference on Machine Learning and Cybernetics, PP. 283-286, Hong Kong, 2007.
Y.Wang, H. Wang, S. Gao, D. Xu, “Intelligent Money Laundering Monitoring and Detecting System”, European and Mediterranean Conference on Information Systems, Dubai, available at “http://www.iseing.org/emcis/emcis2008/Proceedings/Refereed%20Papers/Contributions/C%2045/Intelligent_Money_Laundering_Monitoring_and_Detecting_System.pdf “, 2008.
N. Le-Khac, S. Markos, M. Kechadi, “A Heuristics Approach for Fast Detecting Suspicious Money Laundering Cases in an Investment Bank”, International Scholarly and Scientific Research AND Innovation, Engineering and Technology, Vol. 3, No. 12, PP. 70-74, 2009.
J. Luell, “Employee Fraud Detection under Real World Conditions”, Ph.D. thesis, University of Zurich, 2010.
Anti-Money Laundering Countering Financing of Terrorism, “National Risk Assessment 2010”, Financial Intelligence Unit, New Zealand Police, New Zealand, available at http://www.justice.govt.NZ/policy/criminal-justice/AML-CFT/publications-AND-consultation/national-risk-assessment-2010, 2010.
Financial Action Task Force, “International Standards on Combating Money Laundering and the Financing of Terrorism and Proliferation – The FATF Recommendations”, available at “www.fatf-gafi.org/recommendations “, 2012.
Financial Transactions and Reports Analysis Center, Typologies and Trends, “Money Laundering and Terrorist Financing (ML/TF) Typologies and Trends for Canadian Money Services Businesses (MSBs)”, FINTRAC Reports of Canada, Canada, 2010.
The Canadian Institute of Chartered Accountants, “Canada’s Anti-Money Laundering and Anti-Terrorist Financing Requirements”, available at www.cica.ca, 2008.
Belgian Financial Intelligence Processing Unit, “Money Laundering Indicators”, available at http://www.ctif-cfi.be/website/images/EN/typo_ctifcfi/NL1175eENG.pdf, 2007.
E. Garcia, P. Regan, J. Stern, W. Johnson, R. Macallister, J. Reidenberg, D. vogt, R. Serino, B. Proter, S. Welling, “Information Technologies for the Control of Money Laundering”, OTA-ITC-630, Washington, USA, 1995.
Australian Transaction Reports and Analysis Center, “Money Laundering in Australia, Australia Government, available at http://www.austrac.gov.au/files/money_laundering_in_australia_2011.pdf, 2011.
R. Fuhrer, “Sequential Optimization of Asynchronous and Synchronous Finite-State Machine: Algorithms and Tools”, Springer, 2001.
D. Lee, “Principles and Methods of Testing Finite State Machine survey”, Proceedings of the IEEE, Vol. 84, No. 8, PP. 1089-1123, 1996.
A. Aho, R. Sethi, J. Ullman, “Compilers: Principles, Techniques, and Tools Second Edition”, Addison Wesley, 2006.
The Center for Public Integrity, available at http://www.publicintegrity.org/2012/10/18/11498/pennsylvania-governor-benefited-untraceable-15-million-donation, 2012.