Showing 141 - 160 results of 358 for search '"fraud"', query time: 0.05s Refine Results
  1. 141
  2. 142
  3. 143
  4. 144
  5. 145
  6. 146
  7. 147
  8. 148
  9. 149
  10. 150
  11. 151
  12. 152
  13. 153
  14. 154
  15. 155
  16. 156
  17. 157

    The Risk of Corruption and Money Laundering: An Analysis of Personal Predespositions and Socio-Economic Challenges by Andrey Hasiholan Pulungan, Hardhana Setiawan, Faris Windiarti

    Published 2024-12-01
    “…Using logistic regression (LR), the research found that age and workplace are associated positively to the likelihood of ones to commit to fraud. Elder fraudsters are documented to have 1,72 higher possibility to commit to fraud compared to younger fraudsters. …”
    Get full text
    Article
  18. 158

    Detecting Rug-Pull: Analyzing Smart Contract Backdoor Codes in Ethereum by Kwan Woo Yu, Byung Mun Lee

    Published 2025-01-01
    “…However, the absence of such a certification authority increases the risk of fraud. Rug-pull, a typical form of fraud, involves developers hiding backdoor codes in smart contracts to steal funds under certain conditions, causing significant damage to users. …”
    Get full text
    Article
  19. 159

    An integrated optimization model of network behavior victimization identification based on association rule feature extraction by Shengli ZHOU, Linqi RUAN, Rui XU, Xikang ZHANG, Quanzhe ZHAO, Yuanbo LIAN

    Published 2023-08-01
    “…The identification of the risk of network behavior victimization was of great significance for the prevention and warning of telecom network fraud.Insufficient mining of network behavior features and difficulty in determining relationships, an integrated optimization model for network behavior victimization identification based on association rule feature extraction was proposed.The interactive traffic data packets generated when users accessed websites were captured by the model, and the implicit and explicit behavior features in network traffic were extracted.Then, the association rules between features were mined, and the feature sequences were reconstructed using the FP-Growth algorithm.Finally, an analysis model of telecom network fraud victimization based on network traffic analysis was established, combined with the stochastic forest algorithm of particle swarm optimization.The experiments show that compared with general binary classification models, the proposed model has better precision and recall rates and can effectively improve the accuracy of network fraud victimization identification.…”
    Get full text
    Article
  20. 160

    Explainable unsupervised anomaly detection for healthcare insurance data by Hannes De Meulemeester, Frank De Smet, Johan van Dorst, Elise Derroitte, Bart De Moor

    Published 2025-01-01
    “…Abstract Background Waste and fraud are important problems for health insurers to deal with. …”
    Get full text
    Article