Showing 281 - 300 results of 358 for search '"fraud"', query time: 0.05s Refine Results
  1. 281

    Malicious user detection in Momo application based on spatio-temporal behavior and static attribute analysis by YANG Haifeng, DU Shaoyong, WEI Guo, SHI Wenqi, LUO Xiangyang

    Published 2024-08-01
    “…Momo, a popular mobile social application, has attracted a significant number of malicious users engaged in illegal online activities such as fraud, online gambling, and illegal lending. The detection of these malicious users is of great importance. …”
    Get full text
    Article
  2. 282

    DIGITAL TRANSFORMATION AND THE USE OF ARTIFICIAL INTELLIGENCE IN SOCIAL INSURANCE AND INSURANCE by Elizaveta Pletneva, Daria Zagorska

    Published 2024-06-01
    “…The advantages of digitization and the use of AI include improved accuracy of risk assessment, process automation, product personalization, fraud detection, and enhanced investment decision-making. …”
    Get full text
    Article
  3. 283

    Molecular and Biochemical Characterization of the Greek Pepper ( Capsicum annuum ) Cultivars ‘Florinis’ and ‘Karatzova’ by Niki Mougiou, Foteini Trikka, Sofia Michailidou, Mariana Pantoura, Anagnostis Argiriou

    Published 2021-03-01
    “…Such an analysis could be used for the discrimination of pepper cultivars sharing common morphological traits ensuring the unique identity of each cultivar and protecting farmers and consumers from fraud.…”
    Get full text
    Article
  4. 284

    New Heuristics Method for Malicious URLs Detection Using Machine Learning by Maher Kassem Hasan

    Published 2024-09-01
    “… Malicious URLs are a very prominent, dangerous form of cyber threats in view of the fact that they can enable many evils like phishing attacks, malware distribution, and several other kinds of cyber fraud. The techniques of detection conventionally applied are based on blacklisting and heuristic analyses, which are gradually becoming inefficient against sophisticated, rapidly evolving threats. …”
    Get full text
    Article
  5. 285

    A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023 by Shalini Kumari, Chander Prabha, Asif Karim, Md. Mehedi Hassan, Sami Azam

    Published 2024-01-01
    “…AD is crucial for various applications, including network security, fraud detection, predictive maintenance, fault diagnosis, and industrial and healthcare monitoring. …”
    Get full text
    Article
  6. 286

    Transforming Education Through Blockchain: A Systematic Review of Applications, Projects, and Challenges by Xianxian Wang, Muhammad Younas, Yicun Jiang, Muhammad Imran, Norah Almusharraf

    Published 2025-01-01
    “…Within the education sphere, blockchain applications protect academic records, ensure their trustworthiness, reduce fraud, and improve the value of educational assets. …”
    Get full text
    Article
  7. 287

    Performance determinants of higher education institutions and the mediating role of quality culture: internal auditors’ perspectives by Helmi Yazid, Lili Sugeng Wiyantoro, Tubagus Ismail, Iis Ismawati

    Published 2025-12-01
    “…Internal audit scopes (IAS), professional skills (PS), organizational commitment (OC), applied procedure (AP), internal auditor experience (IAE), fraud prevention (FP), information technology (IT), ITIC internal controls (ITICs) and quality culture (QC) all have an impact on the performance of HEIs (PHEIs) audited by internal auditors. …”
    Get full text
    Article
  8. 288

    Gluten Detection by Real-Time PCR: an Alternative for Tracking Processed Foods by Wemerson de Castro Oliveira, Hans Fröder, Eléia Righi

    Published 2025-02-01
    “…The real-time PCR protocol was validated in different meats (beef, chicken, pork, horse and lamb) with an average Cq of 25.69. Tests to verify fraud in industrialized foods were carried out with the following products: cereal bars, chocolate, crackers and two types of snacks. …”
    Get full text
    Article
  9. 289

    Electricity theft detection in integrated energy systems considering multi-energy loads by Wenlong Liao, Dechang Yang, Leijiao Ge, Yixiong Jia, Zhe Yang

    Published 2025-03-01
    “…Additionally, the detection performance of the proposed ChebGCN is consistently better than both classical and state-of-the-art machine learning models, no matter whether the fraud rate of the dataset is low or high.…”
    Get full text
    Article
  10. 290

    Data augmentation based multi-view contrastive learning graph anomaly detection by LI Yifan, LI Jiayin, LIN Xingpeng, DAI Yuanfei, XU Li

    Published 2024-10-01
    “…Graph anomaly detection is valuable in preventing harmful events such as financial fraud and network intrusion. Although contrast-based anomaly detection methods could effectively mine anomaly information based on the inconsistency of anomalous node instance pairs, avoiding the drawback of using self-coding architecture that led to the need for full graph training for the model. …”
    Get full text
    Article
  11. 291

    Features of conducting a forensic commodity examination of furniture products by M. V. Hаrbuz, L. Yu. Ulybіnа

    Published 2023-09-01
    “…In practice, there are cases of fraud on the part of companies and individuals, for example, when users intentionally damage parts or components of a product in order to return a product under warranty and receive monetary compensation for an allegedly defective product. …”
    Get full text
    Article
  12. 292

    Research on link detection technology based on dynamic browser fingerprint by Fan GAO, Jian WANG, Jiqiang LIU

    Published 2022-08-01
    “…With the emergence of user privacy leakage and online fraud, traditional detection mechanisms can no longer stop the intensified attacks and new methods are needed to assist in web security detection.As a bridge between users and network data, browsers are widely used in the interaction between users and various applications.The browser fingerprint contains various characteristic information of the user’s browser and device, and its uniqueness can greatly improve the accuracy of user identification.However, browser fingerprints may change over time, and solutions based on static fingerprints cannot meet the requirements of dynamic fingerprints detection.Motivated by this challenge, it’s necessary to improve the recognition and link detection capabilities of dynamic browser fingerprints.Besides, parameters from multi-dimensional perspective need to be obtained and screened to get fine-grained and high-discrimination features for model detecting, preventing the calculation cost caused by too many unnecessary parameters.Bidirectional Gating Recurrent Unit (BiGRU) was introduced into the fingerprint detection, and a stacked BiGRU detection model based on dynamic browser fingerprints was proposed.It solved the problem of low detection accuracy caused by ignoring the interaction of forward and backward information in the process of fingerprints detection, and it also had a certain improvement in indicators such as accuracy and linking time.Furthermore, in view of the different importance of different feature parameters, the same weight given to parameters will result in detection error.Combined with the attention mechanism to focus more stable fingerprint features, an Att-BiGRU fingerprint detection model based on dynamic browser fingerprints was proposed.It optimized the detection ability compared to BiGRU, further improved the detection accuracy of browser fingerprinting, and showed good linking ability on the comprehensive index under the benchmark model.…”
    Get full text
    Article
  13. 293

    Circumstances for Committing Crimes in the Banking Sector: Normative and Legal Aspect by V. V. Korniienko

    Published 2020-12-01
    “…The key factors in the situation of committing crimes in the presented area are: search for opportunities for criminal enrichment by using existing powers; conspiracy of officials of commercial banks with representatives of supervisory agencies (curators from some units of the National Bank of UKraine) in order to cover up criminal activity; development of a plan of financial fraud with representatives of commercial organizations in order to steal the entrusted funds and their further legalization. …”
    Get full text
    Article
  14. 294

    The influence of facial stigma and physical attractiveness on the impressions formation about person by Svetlana V. Zorina

    Published 2022-01-01
    “…For physically attractive individuals, the violation of continuty contributed to an increase in the attributed likelihood of committing murder and fraud, for physically unattractive a decrease in the perceived danger and the possibility degree of committing fraudulent activities. …”
    Get full text
    Article
  15. 295

    Advanced R-GAN: Generating anomaly data for improved detection in imbalanced datasets using regularized generative adversarial networks by Junhak Lee, Dayeon Jung, Jihoon Moon, Seungmin Rho

    Published 2025-01-01
    “…The high prevalence of fraud in contemporary financial transactions necessitates advanced anomaly detection systems to address the significant imbalance between legitimate and anomalous transactions in real-time datasets. …”
    Get full text
    Article
  16. 296

    A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity by Abdullah Al Siam, Moutaz Alazab, Albara Awajan, Nuruzzaman Faruqui

    Published 2025-01-01
    “…This study offers a comprehensive literature review on the role, effect, and future prospects of AI across five critical areas of cybersecurity: threat detection, endpoint security, phishing and fraud detection, network security, and adaptive authentication. …”
    Get full text
    Article
  17. 297

    Digitalisation Profile of the Elderly and ‘Grey Digital Violence’ by Hatice Oğuz Özgür

    Published 2024-12-01
    “…The elderly are sometimes exposed to actions such as deception, fraud, insult and humiliation by those who use digital technologies with bad intentions. …”
    Get full text
    Article
  18. 298

    Auditing and Performance of Micro Finance Institutions: A Case Study of Rukiga SACCO Kabale Branch. by Niwamanya, Sarah

    Published 2024
    “…The study findings on the relationship between auditing and the performance of Micro Finance Institutions, the highest number of respondents mentioned that effective auditing helps identify and assess risks within MFIs, such as credit risk, operational risk, and compliance risk and the least number of respondents mentioned that auditing helps identify inefficiencies in the operations of MFIs, such as wasteful spending, fraud, or ineffective internal controls. The study recommended that there should be ensuring that all internal policies, procedures, and audit findings are well-documented and accessible to relevant staff and maintain an organized repository for audit-related documents to facilitate easy reference.…”
    Get full text
    Thesis
  19. 299

    Indonesia rupiah currency detection for visually impaired people using transfer learning VGG-19 by Raissa Alfatikarani, Laras Suciningtyas, Genta Garuda Bimasakti, Faqisna Putra Mardhatillah, Jessie R. Paragas, Hapsari Peni Agustin Tjahyaningtijas

    Published 2025-01-01
    “…People with visual impairments often face difficulties in determining the authenticity of paper money, which is a crucial skill to avoid fraud. The limitations of traditional methods, like blind codes for visually impaired people, require a more advanced and efficient solution. …”
    Get full text
    Article
  20. 300

    Young urban people’s impulsive online shopping behavior and its financial literacy by Bagong Suyanto, Nadia Egalita, Rahma Sugihartati, Siti Mas’udah, Pingkan Sekar Savira, Claudia Anridho, Nur Syamsiyah

    Published 2025-12-01
    “…The skill of managing money can reduce the potential online shopping fraud yet this research shows that respondents admitted that they had been victims of it. …”
    Get full text
    Article