-
281
Malicious user detection in Momo application based on spatio-temporal behavior and static attribute analysis
Published 2024-08-01“…Momo, a popular mobile social application, has attracted a significant number of malicious users engaged in illegal online activities such as fraud, online gambling, and illegal lending. The detection of these malicious users is of great importance. …”
Get full text
Article -
282
DIGITAL TRANSFORMATION AND THE USE OF ARTIFICIAL INTELLIGENCE IN SOCIAL INSURANCE AND INSURANCE
Published 2024-06-01“…The advantages of digitization and the use of AI include improved accuracy of risk assessment, process automation, product personalization, fraud detection, and enhanced investment decision-making. …”
Get full text
Article -
283
Molecular and Biochemical Characterization of the Greek Pepper ( Capsicum annuum ) Cultivars ‘Florinis’ and ‘Karatzova’
Published 2021-03-01“…Such an analysis could be used for the discrimination of pepper cultivars sharing common morphological traits ensuring the unique identity of each cultivar and protecting farmers and consumers from fraud.…”
Get full text
Article -
284
New Heuristics Method for Malicious URLs Detection Using Machine Learning
Published 2024-09-01“… Malicious URLs are a very prominent, dangerous form of cyber threats in view of the fact that they can enable many evils like phishing attacks, malware distribution, and several other kinds of cyber fraud. The techniques of detection conventionally applied are based on blacklisting and heuristic analyses, which are gradually becoming inefficient against sophisticated, rapidly evolving threats. …”
Get full text
Article -
285
A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023
Published 2024-01-01“…AD is crucial for various applications, including network security, fraud detection, predictive maintenance, fault diagnosis, and industrial and healthcare monitoring. …”
Get full text
Article -
286
Transforming Education Through Blockchain: A Systematic Review of Applications, Projects, and Challenges
Published 2025-01-01“…Within the education sphere, blockchain applications protect academic records, ensure their trustworthiness, reduce fraud, and improve the value of educational assets. …”
Get full text
Article -
287
Performance determinants of higher education institutions and the mediating role of quality culture: internal auditors’ perspectives
Published 2025-12-01“…Internal audit scopes (IAS), professional skills (PS), organizational commitment (OC), applied procedure (AP), internal auditor experience (IAE), fraud prevention (FP), information technology (IT), ITIC internal controls (ITICs) and quality culture (QC) all have an impact on the performance of HEIs (PHEIs) audited by internal auditors. …”
Get full text
Article -
288
Gluten Detection by Real-Time PCR: an Alternative for Tracking Processed Foods
Published 2025-02-01“…The real-time PCR protocol was validated in different meats (beef, chicken, pork, horse and lamb) with an average Cq of 25.69. Tests to verify fraud in industrialized foods were carried out with the following products: cereal bars, chocolate, crackers and two types of snacks. …”
Get full text
Article -
289
Electricity theft detection in integrated energy systems considering multi-energy loads
Published 2025-03-01“…Additionally, the detection performance of the proposed ChebGCN is consistently better than both classical and state-of-the-art machine learning models, no matter whether the fraud rate of the dataset is low or high.…”
Get full text
Article -
290
Data augmentation based multi-view contrastive learning graph anomaly detection
Published 2024-10-01“…Graph anomaly detection is valuable in preventing harmful events such as financial fraud and network intrusion. Although contrast-based anomaly detection methods could effectively mine anomaly information based on the inconsistency of anomalous node instance pairs, avoiding the drawback of using self-coding architecture that led to the need for full graph training for the model. …”
Get full text
Article -
291
Features of conducting a forensic commodity examination of furniture products
Published 2023-09-01“…In practice, there are cases of fraud on the part of companies and individuals, for example, when users intentionally damage parts or components of a product in order to return a product under warranty and receive monetary compensation for an allegedly defective product. …”
Get full text
Article -
292
Research on link detection technology based on dynamic browser fingerprint
Published 2022-08-01“…With the emergence of user privacy leakage and online fraud, traditional detection mechanisms can no longer stop the intensified attacks and new methods are needed to assist in web security detection.As a bridge between users and network data, browsers are widely used in the interaction between users and various applications.The browser fingerprint contains various characteristic information of the user’s browser and device, and its uniqueness can greatly improve the accuracy of user identification.However, browser fingerprints may change over time, and solutions based on static fingerprints cannot meet the requirements of dynamic fingerprints detection.Motivated by this challenge, it’s necessary to improve the recognition and link detection capabilities of dynamic browser fingerprints.Besides, parameters from multi-dimensional perspective need to be obtained and screened to get fine-grained and high-discrimination features for model detecting, preventing the calculation cost caused by too many unnecessary parameters.Bidirectional Gating Recurrent Unit (BiGRU) was introduced into the fingerprint detection, and a stacked BiGRU detection model based on dynamic browser fingerprints was proposed.It solved the problem of low detection accuracy caused by ignoring the interaction of forward and backward information in the process of fingerprints detection, and it also had a certain improvement in indicators such as accuracy and linking time.Furthermore, in view of the different importance of different feature parameters, the same weight given to parameters will result in detection error.Combined with the attention mechanism to focus more stable fingerprint features, an Att-BiGRU fingerprint detection model based on dynamic browser fingerprints was proposed.It optimized the detection ability compared to BiGRU, further improved the detection accuracy of browser fingerprinting, and showed good linking ability on the comprehensive index under the benchmark model.…”
Get full text
Article -
293
Circumstances for Committing Crimes in the Banking Sector: Normative and Legal Aspect
Published 2020-12-01“…The key factors in the situation of committing crimes in the presented area are: search for opportunities for criminal enrichment by using existing powers; conspiracy of officials of commercial banks with representatives of supervisory agencies (curators from some units of the National Bank of UKraine) in order to cover up criminal activity; development of a plan of financial fraud with representatives of commercial organizations in order to steal the entrusted funds and their further legalization. …”
Get full text
Article -
294
The influence of facial stigma and physical attractiveness on the impressions formation about person
Published 2022-01-01“…For physically attractive individuals, the violation of continuty contributed to an increase in the attributed likelihood of committing murder and fraud, for physically unattractive a decrease in the perceived danger and the possibility degree of committing fraudulent activities. …”
Get full text
Article -
295
Advanced R-GAN: Generating anomaly data for improved detection in imbalanced datasets using regularized generative adversarial networks
Published 2025-01-01“…The high prevalence of fraud in contemporary financial transactions necessitates advanced anomaly detection systems to address the significant imbalance between legitimate and anomalous transactions in real-time datasets. …”
Get full text
Article -
296
A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity
Published 2025-01-01“…This study offers a comprehensive literature review on the role, effect, and future prospects of AI across five critical areas of cybersecurity: threat detection, endpoint security, phishing and fraud detection, network security, and adaptive authentication. …”
Get full text
Article -
297
Digitalisation Profile of the Elderly and ‘Grey Digital Violence’
Published 2024-12-01“…The elderly are sometimes exposed to actions such as deception, fraud, insult and humiliation by those who use digital technologies with bad intentions. …”
Get full text
Article -
298
Auditing and Performance of Micro Finance Institutions: A Case Study of Rukiga SACCO Kabale Branch.
Published 2024“…The study findings on the relationship between auditing and the performance of Micro Finance Institutions, the highest number of respondents mentioned that effective auditing helps identify and assess risks within MFIs, such as credit risk, operational risk, and compliance risk and the least number of respondents mentioned that auditing helps identify inefficiencies in the operations of MFIs, such as wasteful spending, fraud, or ineffective internal controls. The study recommended that there should be ensuring that all internal policies, procedures, and audit findings are well-documented and accessible to relevant staff and maintain an organized repository for audit-related documents to facilitate easy reference.…”
Get full text
Thesis -
299
Indonesia rupiah currency detection for visually impaired people using transfer learning VGG-19
Published 2025-01-01“…People with visual impairments often face difficulties in determining the authenticity of paper money, which is a crucial skill to avoid fraud. The limitations of traditional methods, like blind codes for visually impaired people, require a more advanced and efficient solution. …”
Get full text
Article -
300
Young urban people’s impulsive online shopping behavior and its financial literacy
Published 2025-12-01“…The skill of managing money can reduce the potential online shopping fraud yet this research shows that respondents admitted that they had been victims of it. …”
Get full text
Article