Showing 181 - 200 results of 358 for search '"fraud"', query time: 0.04s Refine Results
  1. 181

    An efficient convolution neural network method for copy-move video forgery detection by Mohamed Meselhy Eltoukhy, Faisal S. Alsubaei, Akram M. Mortda, Khalid M. Hosny

    Published 2025-01-01
    “…Current approaches to video fraud detection often rely on manual feature selection and models tailored to detect specific tampering types, such as copy-move or splicing. …”
    Get full text
    Article
  2. 182

    Enhancing identity and access management using Hyperledger Fabric and OAuth 2.0: A block-chain-based approach for security and scalability for healthcare industry by Shrabani Sutradhar, Sunil Karforma, Rajesh Bose, Sandip Roy, Sonia Djebali, Debnath Bhattacharyya

    Published 2024-01-01
    “…Our statistical analysis demonstrates that the proposed approach can efficiently and securely manage patient identity and access, potentially transforming the healthcare industry by enhancing data interoperability, reducing fraud and errors, and improving patient privacy and security. …”
    Get full text
    Article
  3. 183

    Cyber security laws and safety in e-commerce in India by A. K. Kashyap, M. Chaudhary

    Published 2023-06-01
    “…However, with the rising dependence on internet commerce, the dangers of fraud and security and trust problems have become severe impediments. …”
    Get full text
    Article
  4. 184

    Contrebandiers de monnaie et autorités locales sur les côtes basques au début du XVIIe siècle by Susana Truchuelo García

    Published 2014-02-01
    “…The illegal exit of money outside Castile, through the provinces of Biscay and Guipuzcoa and the entrance to fraud of counterfeit billons resulting from France, both by the passage of Irun and by the Basque ports, established their main activities, favored by the local tax statuses. …”
    Get full text
    Article
  5. 185
  6. 186

    Women and Money: Unique Issues — Protecting Your Assets by Lynda Spence, Martie Gillen, Diann Douglas

    Published 2013-07-01
    “…This publication shares some common ways you can protect your assets by purchasing different types of insurance, being aware of identity theft or fraud, and monitoring your credit reports. This 4-page fact sheet was written by Lynda Spence, Martie Gillen, and Diann Douglas, and published by the UF Department of Family Youth and Community Sciences, July 2013. …”
    Get full text
    Article
  7. 187

    Women and Money: Unique Issues — Protecting Your Assets by Lynda Spence, Martie Gillen, Diann Douglas

    Published 2013-07-01
    “…This publication shares some common ways you can protect your assets by purchasing different types of insurance, being aware of identity theft or fraud, and monitoring your credit reports. This 4-page fact sheet was written by Lynda Spence, Martie Gillen, and Diann Douglas, and published by the UF Department of Family Youth and Community Sciences, July 2013. …”
    Get full text
    Article
  8. 188

    Smart Approach for Botnet Detection Based on Network Traffic Analysis by Alaa Obeidat, Rola Yaqbeh

    Published 2022-01-01
    “…Cybercriminals have exploited botnets for many illegal activities, including click fraud, DDOS attacks, and spam production. In this article, we suggest a method for identifying the behavior of data traffic using machine learning classifiers including genetic algorithm to detect botnet activities. …”
    Get full text
    Article
  9. 189

    Blockchain trading mechanism based on attached chain for the delay tolerant network by Lingling ZI, Xin CONG

    Published 2020-11-01
    “…In order to deploy a blockchain on the non-continuous connectivity delay tolerant network,a blockchain trading mechanism was designed,which could run on this type of network.First,the identifier was introduced into the existing block structure and a block structure on the attached chain was presented,which could append the blocks generated during network disconnection.Then,the approaches including the block package,block mining and block consensus on the attached chain were proposed.Finally,a confirming consensus approach was presented to avoid block fraud in the process of appending the attached chain.Through theoretical proof and experimental analysis,the proposed mechanism can support blockchain trading in the delay tolerant network.…”
    Get full text
    Article
  10. 190

    ANALISIS SISTEM PENGGAJIAN KARYAWAN PERUMDA LT KABUPATEN MAGETAN by Yurisa Dwi Aprilia Ningtias, Stely Aulia Trifananta, Elana Era Yusdita

    Published 2024-07-01
    “…The results of this research conclude that the Perumda LT employee payroll system is running quite well and effectively, but there are weaknesses in manual attendance which is less effective, making it possible for fraud to occur and errors in the employee payroll system. …”
    Get full text
    Article
  11. 191

    Criminal law / by De Than, Claire

    Published 2013
    Table of Contents: “…Introduction -- Actus reus -- Mens rea and fault -- Non-fatal offences against the person -- Sexual offences -- Homicide -- General defences I : age and insanity -- General defences II : automatism, intoxication, mistake and self-defence -- General defences III : duress, necessity and marital coercion -- Offences against property I : theft -- Offences against property II : fraud -- Offences against property III -- Strict liability -- Secondary participation in crime -- Inchoate offences.…”
    Publisher description
    Table of contents only
    View in OPAC
    Book
  12. 192

    Private Cloud Assistant Trust Model for P2P Secure Transactions by Wei Lin, Xianghan Zheng

    Published 2015-01-01
    “…Some coping mechanisms were proposed to curb malicious behaviors, such as low quality services, false recommendation and strategic fraud attaches. Simulation result shows that the proposed model has feasibility, efficiency and dynamic adaptability.…”
    Get full text
    Article
  13. 193

    Anonymous survey system based on NIZK by Lu LIU, Yu-xi LI, Fu-cai ZHOU

    Published 2016-12-01
    “…Aiming at the security problem that the existing in electronic surveys,such as information fraud,privacy security etc.An anonymous electronic survey scheme based on non-interactive zero knowledge proofs (NIZK) was constructed,which had the characteristics of self-organization,non-interactive,anti-replay,and high efficiency.The system uses the NIZK protocol and the Boneh-Boyen signature scheme to verify the user's identity in non-interactive manner,which guarantees the authenticity of the scheme.The system also uses the Pedersen commitment scheme and the pseudo random function to hide the user's identity and the related information,which guarantees the ano-nymity.Security analysis show that the system has security features such as malicious users attack resistance and anonymity.Finally,the function of the system was also verified and the result show that the system can accomplish all the functions correctly and guarantee the anonymity and authenticity of the system effectively.…”
    Get full text
    Article
  14. 194

    Jakość pracy naukowej, jej potwierdzenie a recenzja partnerska. Odbiór w środowisku naukowym i nieporozumienia. Postawy wobec recenzji partnerskiej (przekł. Tomasz Olszewski) by Adrian Mulligan

    Published 2009-01-01
    “…Berti, 1981. Lerner E., Fraud shows peer-review flaw, „The Industrialist Physicist” 8(6), 2003. …”
    Get full text
    Article
  15. 195

    La litigiosidad en torno a las ventas de oficios perpetuos en la Castilla del siglo xvii by Francisco Andújar Castillo

    Published 2016-03-01
    “…However, the most interesting lawsuits, by far, were initiated by the monarchy itself, always with the intention of raising more money from a property that had been sold many years before. Allegations of fraud - «injury» - filed against buyers reveal that their origin was not the intent of defrauding the purchasers of the property but, most likely, the interest of royal commissioners who attempted to make money through these negotiations in which large sums of money were at stake.…”
    Get full text
    Article
  16. 196

    5-pass zero-knowledge identity authentication scheme based on matrix completion problem by Houzhen WANG, Xinwei CAI, Yan GUO, Huanguo ZHANG

    Published 2021-11-01
    “…To solve the problem that most identity authentication schemes are vulnerable to quantum-computing attacks and low efficiency, a new 5-pass zero-knowledge identity authentication scheme was designed based on the matrix completion problem (MCP).Since the MCP is NP-complete, the proposed scheme has the potential to avoid quantum-computing attacks.Compared with the existing similar protocols, the proposed scheme reduced the fraud probability from 2/3 to 1/2 by adding a single round of interaction, and had the advantages of easy implementation and small key size.Moreover, based on the proposed zero-knowledge authentication scheme and Fiat-Shamir standard transformation method, a secure and efficient digital signature algorithm against quantum-computing can be obtained.…”
    Get full text
    Article
  17. 197

    Secure privacy-preserving record linkage system from re-identification attack. by Sejong Lee, Yushin Kim, Yongseok Kwon, Sunghyun Cho

    Published 2025-01-01
    “…These attacks compromise privacy and pose significant risks, such as identity theft and financial fraud. This study proposes a zero-relationship encoding scheme that minimizes the linkage between source and encoded records to enhance PPRL systems' resistance to re-identification attacks. …”
    Get full text
    Article
  18. 198

    LEADERSHIP, GOOD GOVERNANCE AND DEVELOPMENT IN NIGERIA by ADENIYI ADEKUNLE

    Published 2023-12-01
    “…Political leadership has been severely hampered by corruption, electoral fraud, resource mismanagement, and underdeveloped infrastructure. …”
    Get full text
    Article
  19. 199

    The Role of the EPPO in Combating Crime in the Cultural Sector: The Case of the Regional Museum in Olomouc by Jan Petr, Andrzej Jakubowski

    Published 2024-12-01
    “…While focusing on the case of the subsidy and procurement fraud, passive corruption, and money laundering in the case of the Regional Museum in Olomouc (Czech Republic), the article aims to elucidate the current mandate and expectations with respect to the EPPO in relation to the prosecution of cultural heritage crimes. …”
    Get full text
    Article
  20. 200

    Automatic exchange of financial information from the perspective of tax fairness and transparency by Isnaini Isnaini, Joni Emirzon, Ridwan Ridwan

    Published 2024-11-01
    “…The results show that AEOI can help prevent tax evasion, ensure taxpayer compliance, and strengthen international cooperation in the fight against tax evasion and fraud. Challenges such as data security and compliance costs can be addressed with the development of better technology and regulatory frameworks. …”
    Get full text
    Article