Academic literature on the topic 'Cyber frauds'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyber frauds.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyber frauds"

1

Dr., Manish Bhatnagar &. Dr. Pragati Bhatnagar. "CYBER CRME AND ITS PROTECTION." Scholarly Research Journal for Interdisciplinary studies 13, no. 87 (2025): 102–8. https://doi.org/10.5281/zenodo.15148000.

Full text
Abstract:
<strong><em>&nbsp;</em></strong><em>Present era is an era of digital technologies and artificial intelligence. AI and new digital technologies are bringing drastic changes in our life. We are performing our routine tasks through technology .We are using digital devices for routing financial transactions, for our academic and research purpose, for our business, for e-shopping, for booking our tickets etc. Although the use of technology has made our many tasks very easy and efficient but it has brought to us the danger of cyber frauds. Daily in news papers we are reading about the cyber frauds h
APA, Harvard, Vancouver, ISO, and other styles
2

Zare, Chaitali B., and L. D. Bodile. "DETERMINATION OF FINANCIAL AWARENESS ABOUT ATM FRAUDS BASED ON DEMOGRAPHICAL FACTORS IN AKOLA AND AMRAVATI DISTRICTS OF MAHARASHTRA." International Journal of Innovations & Research Analysis 04, no. 02(II) (2024): 102–9. http://dx.doi.org/10.62823/4.2(ii).6694.

Full text
Abstract:
After the wider use of Automated Teller Machine (ATM), the number of frauds has increased rapidly. In Maharashtra state, financial cyber frauds are highest. There were less crimes regarding ATMs, in Akola district compared to district of Amravati. The main objective of the research paper is to find out the awareness in respect to ATM frauds in Akola and Amravati districts of Maharashtra using demographic factors. For primary data collection, a structured questionnaire was prepared and 500 responses were recorded i.e. 250 each from Akola and Amravati districts of Maharashtra state. Secondary da
APA, Harvard, Vancouver, ISO, and other styles
3

Whitty, Monica T. "Predicting susceptibility to cyber-fraud victimhood." Journal of Financial Crime 26, no. 1 (2019): 277–92. http://dx.doi.org/10.1108/jfc-10-2017-0095.

Full text
Abstract:
Purpose This paper aims to develop a theoretical framework to predict susceptibility to cyber-fraud victimhood. Design/methodology/approach A survey was constructed to examine whether personality, socio-demographic characteristics and online routine activities predicted one-off and repeat victimhood of cyber-fraud. Overall, 11,780 participants completed a survey (one-off victims, N = 728; repeat victims = 329). Findings The final saturated model revealed that psychological and socio-demographic characteristics and online routine activities should be considered when predicting victimhood. Consi
APA, Harvard, Vancouver, ISO, and other styles
4

Malik, Aftab Ahmad. "Online shopping, Cyber frauds and Fraud prevention Strategies." International Journal for Electronic Crime Investigation 8, no. 1 (2024): 49–56. http://dx.doi.org/10.54692/ijeci.2024.0801186.

Full text
Abstract:
Online shopping is increasingly being targeted by hackers and cyber criminals, who exploit the anonymity of the internet to deceive unsuspecting shoppers. These scams involve fake websites or ads, posing as legitimate sellers, damaging innocent citizens' bank accounts and databases, and causing damage to customers. Online shopping fraud involves using stolen credit or debit cards for purchases, while identity theft involves stealing personal information for fraudulent purposes like credit or illegal purchases. We discuss, the safety tips to avoid online shopping scams, using these safety tips
APA, Harvard, Vancouver, ISO, and other styles
5

Kumar Goutam, Rajesh, and Deepak Kumar Verma. "Top Five Cyber Frauds." International Journal of Computer Applications 119, no. 7 (2015): 23–25. http://dx.doi.org/10.5120/21080-3759.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kumar, Ayush. "Critical Analysis of the Law Relating to Cyber Crime." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (2022): 2081–82. http://dx.doi.org/10.22214/ijraset.2022.47771.

Full text
Abstract:
Abstract: The Cyber Crime is most popular Crime in the world the Cyber Criminals Crimes are the Committed day by day .This Crime commit the Computer and Internet in this Crime Criminals are hacking the Computer system, Mobile like that Hacking virus ,Worm attacks, DOS attack etc. The personal data are Theft Like that Bank account detail, e-mail, Mobile messages .The computer as a weapon using the computer system to commit real world Crimes like Cyber terrorism, IPR(Intellectual property infringing) contravention, credit card frauds, EFT (Electronic fund transfer) Frauds, Pornography etc. The C
APA, Harvard, Vancouver, ISO, and other styles
7

Natesan, Dr Gobi. "PREVENTION OF CYBER FRAUDS IN THE BANKING SECTOR." International Scientific Journal of Engineering and Management 03, no. 03 (2024): 1–22. http://dx.doi.org/10.55041/isjem01341.

Full text
Abstract:
The project under study explores the prevention of cyber fraud in the banking sector. With the rise of digital banking and increasing cyber threats, it is crucial to identify effective measures to combat cyber fraud and protect the integrity of the banking system. The key strategies for prevention, include education and awareness, technology solutions, fraud detection, and monitoring, as well as collaboration and regulatory measures. Educating customers and bank employees about cyber fraud risks, implementing multi-factor authentication systems, utilizing encryption techniques, and employing a
APA, Harvard, Vancouver, ISO, and other styles
8

Pranav Kumar, Ray. "A study on cyber financial frauds in the district of Jamtara, Jharkhand." Journal of Forensic Science and Research 6, no. 1 (2022): 042–44. http://dx.doi.org/10.29328/journal.jfsr.1001034.

Full text
Abstract:
The study has been undertaken to investigate the determination of digital financial fraud (cyber fraud) in Jamtara district of Jharkhand (the hub of cyber fraudsters) the basic tools &amp; techniques which are used by the offenders and to find out the socio-economic condition of their social life &amp; find the new challenging in cybercrime investigation and to find out the more secure way of digital financial flow, by using survey research method and work on secondary as well primary data which was related to this study, cybercrime especially financial fraud becomes the new challenging task f
APA, Harvard, Vancouver, ISO, and other styles
9

Chaturvedi, Mudit, Shilpa Sharma, and Gulrej Ahmed. "Optimized early financial fraud detection and prevention method to enhance the security." Journal of Information and Optimization Sciences 46, no. 2 (2025): 359–69. https://doi.org/10.47974/jios-1920.

Full text
Abstract:
Financial fraud poses a major threat to banking and financial organizations, leading to financial losses and erosion of public trust. This paper proposes an early financial fraud detection and prevention method to secure financial data in transit, at rest, and in process to mitigate risks of frauds such as unauthorized transactions, identity thefts, data breaches, and cyberattacks. The method involves assessing the current cybersecurity posture through surveys, defining optimal security controls baseline per regulatory guidelines, performing gap analysis to identify vulnerabilities, and sugges
APA, Harvard, Vancouver, ISO, and other styles
10

Parameshwara, Parameshwara. "E-Banking system in India and Cyber Frauds." International Journal of Scientific Research 2, no. 8 (2012): 81–83. http://dx.doi.org/10.15373/22778179/aug2013/25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cyber frauds"

1

Almuntaka, Abdelfattah. "Droit et cyber-blanchiment." Nice, 2006. http://www.theses.fr/2006NICE0016.

Full text
Abstract:
Juridiquement, le blanchiment d'argent est un crime passible d'une peine prévue par la loi quel que soit son modèle ou la façon dont il a été commis. L'utilisation de technologies ultrasophistiquées en matière de blanchiment d'argent, notamment l'Internet n'est qu'un phénomène récent qui sera bientôt remplacé par d'autres technologies plus développées. L'acte de crime se trouve plutôt dans l'action de donner une nouvelle apparence à l'argent sale. De nos jours, beaucoup de pays réalisent des bénéfices conséquents malgré l'intrusion de capitaux noirs dans leurs caisses. Par ailleurs, les économ
APA, Harvard, Vancouver, ISO, and other styles
2

Гриценко, Костянтин Григорович, Константин Григорьевич Гриценко та Kostiantyn Hryhorovych Hrytsenko. "Нечітко-множинна модель оцінки рівня захищеності банку від кібершахрайств". Thesis, Дніпро: ДНУ, 2018. https://essuir.sumdu.edu.ua/handle/123456789/80641.

Full text
Abstract:
Банківські установи являються об’єктами критичної інфраструктури держави. Вони надзвичайно привабливі для злочинців. У зв’язку з цим, обґрунтування вибору банківської установи для незалежного аудиту її кібербезпеки є актуальним завданням. Завдяки аудиту кібербезпеки можна сформулювати конкретні практичні рекомендації щодо поліпшення кібербезпеки. Інструментом попереджувального кіберзахисту є нечітка модель оцінки рівня захищеності банківської установи від кібершахрайств, що використовує як кількісні показники, так і якісні анкетні дані. Вона може бути використана для обґрунтування вибору банкі
APA, Harvard, Vancouver, ISO, and other styles
3

Al, Adwan Ahmad. "A cyber-consumer protection framework for prevention of online deceptive advertising." Thesis, Curtin University, 2012. http://hdl.handle.net/20.500.11937/1744.

Full text
Abstract:
Online deceptive advertisements engender distrust among cyber-consumers; we found that such incidents occur in every country in the world. This research addressed issues with online fraud and deceptive advertising related to cyber-consumer transactions (CCT) and online consumer protection. This study includes a framework which provides potential solutions and redress methods in order to minimise online fraud and deceptiveness as well as protecting the cyber-consumer globally.
APA, Harvard, Vancouver, ISO, and other styles
4

Erdonmez, Erhan. "Investigation of Computer Crimes." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3185/.

Full text
Abstract:
In this study, the development of the computer related crime will be examined in the first chapter. After a detailed introduction to computer crimes, the most common types of the computer crimes will be examined and the characteristics of the offenders and their motivates will be identified. The general investigation process of the computer crime investigation will be outlined in the second chapter. After attempting to define computer crime, computer criminals and investigation process, a case study related to the topic will be examined and the characteristics and the motives of the criminals
APA, Harvard, Vancouver, ISO, and other styles
5

Olsson, Jens. "Digital Evidence with Emphasis on Time." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3774.

Full text
Abstract:
Computer Forensics is mainly about investigating crimes where computers has been involved. There are many tools available to aid the investigator with this task. We have created a prototype of a completely new type of tool where all evidences are indexed by its time variable and plotted on a timeline. We believed that this way would make it easier and more intuitive to find coherent evidence and would make it faster to work with for the investigator. We have performed a user test where a group of people has evaluated our prototype tool against a modern commercial computer forensic tool and the
APA, Harvard, Vancouver, ISO, and other styles
6

Яровенко, Ганна Миколаївна, Анна Николаевна Яровенко, Hanna Mykolaivna Yarovenko та І. Д. Нечепоренко. "Сучасні технології кіберзахисту щодо виявлення шахрайств, що здійснюються персоналом банку". Thesis, Сумський державний університет, 2019. https://essuir.sumdu.edu.ua/handle/123456789/77725.

Full text
Abstract:
Шахрайство з грошовими засобами є розповсюдженим способом незаконного збагачення, незалежно від того, яким чином воно здійснювалося. Особливо актуальною ця проблема є для фінансово-кредитних установ, які безпосередньо мають справу з фінансовими операціями. Але шахрайські дії в банківській сфері за часту важко виявити на тлі величезної кількості автентичних транзакцій, що проводяться щодня. З іншого боку, не виявлення зловживань, фінансових махінацій, відмивання кримінальних доходів, незаконне отримання коштів з клієнтських рахунків, тощо може завдати шкоди репутації банку. Найтривожніш
APA, Harvard, Vancouver, ISO, and other styles
7

Sun, Yan. "An investigation into financial fraud in online banking and card payment systems in the UK and China." Thesis, Loughborough University, 2011. https://dspace.lboro.ac.uk/2134/8290.

Full text
Abstract:
This doctoral thesis represents an investigation into financial fraud in online banking and card payment systems in the UK and China, involving network security, online financial transactions, internet fraud, card payment systems and individuals' perception of and behaviours towards electronic environments. In contrast to previous studies, the research questions were tackled by survey questionnaires both in the UK and China, with a particular interest in fraud and attempted fraud. The main findings from the UK respondents were that those with higher IT skill and younger respondents are more li
APA, Harvard, Vancouver, ISO, and other styles
8

Ghemmogne, Fossi Leopold. "Gestion des règles basée sur l'indice de puissance pour la détection de fraude : Approches supervisées et semi-supervisées." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEI079.

Full text
Abstract:
Cette thèse traite de la détection de fraude par carte de crédit. Selon la Banque Centrale Européenne, la valeur des fraudes utilisant des cartes en 2016 s'élevait à 1,8 milliard d'euros. Le défis pour les institutions est de réduire ces fraudes. En règle générale, les systèmes de détection de la fraude sont consistués d'un système automatique construit à base de règles "si-alors" qui contrôlent toutes les transactions en entrée et déclenchent une alerte si la transaction est considérée suspecte. Un groupe expert vérifie l'alerte et décide si cette dernière est vrai ou pas. Les critères utilis
APA, Harvard, Vancouver, ISO, and other styles
9

Скринька, Л. О., та L. O. Skrynka. "Економіко-математичне моделювання ефективності національної системи протидії кібершахрайствам та легалізації кримінальних доходів на основі методів виживання". Master's thesis, Сумський державний університет, 2021. https://essuir.sumdu.edu.ua/handle/123456789/85073.

Full text
Abstract:
У роботі розроблено структурно-логічну модель оцінювання ефективності національної системи протидії кібершахрайствам та легалізації кримінальних доходів. У резуьтаті дослідження було здійснено аналіз ефективності національної системи протидії кібершахрайствам та легалізації кримінальних доходів на основі методу Каплана-Мейєра. Виявлено залежності ефективності національної системи протидії кібершахрайствам та легалізації кримінальних доходів від часового інтервалу після виявлення фактів порушення.<br>The paper examines provides a bibliometric analysis of scientific publications on the effective
APA, Harvard, Vancouver, ISO, and other styles
10

Roberts, Anthea Elizabeth. "Is International Law International?" Phd thesis, Canberra, ACT : The Australian National University, 2017. http://hdl.handle.net/1885/124611.

Full text
Abstract:
International lawyers are familiar with the question: “Is international law law?” But this thesis instead asks the question: “Is international law international?” Using a variety of methods, this work sheds light on some of the ways in which international law as a transnational legal field is constructed by international law academics, and is conceptualized in international law textbooks, in the five permanent members of the Security Council: the People’s Republic of China, the French Republic, the Russian Federation, the United Kingdom of Great Bri
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cyber frauds"

1

Button, Mark, and Cassandra Cross. Cyber Frauds, Scams and their Victims. Routledge, 2017. http://dx.doi.org/10.4324/9781315679877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cole, Liz. Perfect prey: Surviving a cyber shark's romantic fraud. Manor House Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jeremy, Silverfine, and Massachusetts Continuing Legal Education, Inc. (1982-), eds. Practical considerations in financial and cyber crimes: Identifying fraud, understanding computer crime tools and forensics. MCLE, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Commerce, United States Congress House Committee on Energy and. Securely Protect Yourself Against Cyber Trespass Act: Report (to accompany H.R. 2929) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States. Congress. House. Committee on Energy and Commerce. Securely Protect Yourself Against Cyber Trespass Act: Report (to accompany H.R. 2929) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

United States. Congress. House. Committee on Energy and Commerce. Securely Protect Yourself Against Cyber Trespass Act: Report (to accompany H.R. 2929) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States. Congress. Senate. Committee on the Judiciary. Cyber crime: Updating the Computer Fraud and Abuse Act to protect cyber space and combat emerging threats : hearing before the Committee on the Judiciary, United States Senate, One Hundred Twelfth Congress, first session, September 7, 2011. U.S. G.P.O., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Congress. House. Committee on Energy and Commerce. Securely Protect Yourself Against Cyber Trespass Act (SPY ACT): Report (to accompany H.R. 964) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United States. Congress. House. Committee on Energy and Commerce. Securely Protect Yourself Against Cyber Trespass Act (SPY ACT): Report (to accompany H.R. 964) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

United States. Congress. House. Committee on Energy and Commerce. Securely Protect Yourself Against Cyber Trespass Act or SPY Act: Report (to accompany H.R. 29) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cyber frauds"

1

Jain, S., J. Sharma, S. Sharma, A. Kaushik, and N. Rajawat. "Bibliometric Analysis of Literature on Fintech and Cyber Frauds in Banking." In MULTIDISCIPLINARY APPROACHES FOR SUSTAINABLE DEVELOPMENT. CRC Press, 2024. http://dx.doi.org/10.1201/9781003543633-22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bhanawat, Hemant, and Alex Khang. "An Examination of Data Protection and Cyber Frauds in the Financial Sector." In Data-Driven Modelling and Predictive Analytics in Business and Finance. Auerbach Publications, 2024. http://dx.doi.org/10.1201/9781032618845-19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dey, Sayandeep, Srinath Neogi, Tiansheng Yang, Rajkumar Singh Rathore, Soumayan Ghosh, and Nilamadhab Mishra. "Shielding the Vaults: Cyber Monitoring Strategies for Mitigating Banking Threats, Frauds, and UPI Hacking Risks." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-3244-2_54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Naik, Amit A., and Mamta B. Goswami. "Online Shopping & Stalking– opportunity to cyber frauds and related harassments – Shoppers perspective and Legal provisions." In Advances in Economics, Business and Management Research. Atlantis Press International BV, 2024. https://doi.org/10.2991/978-94-6463-612-3_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kreuter, Eric A. "Cyber Psycho." In Internet Fraud Casebook. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119200475.ch39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Johari, R. J., I. Rosnidah, and N. F. M. Saaid. "Cyber crime fraud: Malaysian perspective." In Acceleration of Digital Innovation & Technology towards Society 5.0. Routledge, 2022. http://dx.doi.org/10.1201/9781003222927-42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Halpin, Daniel, and Sheri Todd. "Public-Private Collaboration for Combatting Cyber Fraud." In Ius Gentium: Comparative Perspectives on Law and Justice. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-59547-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shekokar, Narendra M., and Aditi Vora. "Analysis of Intelligent Techniques for Financial Fraud Detection." In Intelligent Approaches to Cyber Security. Chapman and Hall/CRC, 2023. http://dx.doi.org/10.1201/9781003408307-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sharma, Mudita, Harshita Sharma, Pawan Bhutani, and Ira Sharma. "Credit Card Fraud Detection Using Machine Learning Algorithms." In Innovations in Cyber Physical Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4149-7_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bachmann, Michael, and Brittany Smith. "Internet Fraud." In Encyclopedia of Cyber Behavior. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0315-8.ch077.

Full text
Abstract:
This article provides an introduction into the topic of Internet fraud. A precise definition and detailed descriptions of the most prevalent Internet fraud schemes are provided. The entry presents a history of frauds committed on the Internet and introduces the leading scholars on the subject. Predominant areas of research are discussed, and future directions of the problem of Internet fraud schemes are outlined. The entry concludes with a critique of current limitations and advancements needed to better address the increasing problem of online frauds.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cyber frauds"

1

Parida, Sahil, Neeraj, Himanshu Rawat, and Rashmi Agrawal. "Decoding Cyber Fraud Schemes and the Rise of ‘Fraud-as-a-Service’." In 2025 2nd International Conference on Computational Intelligence, Communication Technology and Networking (CICTN). IEEE, 2025. https://doi.org/10.1109/cictn64563.2025.10932616.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nanda, Simranjeet, Latha B, Ashok Kumar Sahoo, Jamuna K. V, Tushar R. Jadhav, and S. Hemelatha. "Application of Machine Learning for the Detection of Secure Cyber Fraud." In 2024 Global Conference on Communications and Information Technologies (GCCIT). IEEE, 2024. https://doi.org/10.1109/gccit63234.2024.10862475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Islam Prova, Nuzhat Noor. "Healthcare Fraud Detection Using Machine Learning." In 2024 Second International Conference on Intelligent Cyber Physical Systems and Internet of Things (ICoICI). IEEE, 2024. http://dx.doi.org/10.1109/icoici62503.2024.10696476.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Yuhao, Zengwei Zheng, Jianhua Ma, and Binbin Zhou. "A Graph Neural Network with Imbalance-Aware Mechanism for Enhanced Fraud Detection." In 2024 IEEE Cyber Science and Technology Congress (CyberSciTech). IEEE, 2024. https://doi.org/10.1109/cyberscitech64112.2024.00041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Btoush, Eyad, Xujuan Zhou, Raj Gururajan, KC Chan, and Omar Alsodi. "Optimising Security: A Hybrid CNN-BiLSTM Model for Credit Card Cyber Fraud Detection." In 2024 Twelfth International Conference on Advanced Cloud and Big Data (CBD). IEEE, 2024. https://doi.org/10.1109/cbd65573.2024.00074.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Haque, Md Ezazul, Md Tarake Siddique, Safayet Hossain, Md Mehedi Hassan, and Md Sumon Reza. "Artificial Intelligence in Cyber Security:Generalized Model Approach to Accurate Fraud Detection in Credit Card." In 2024 International Conference on Computer and Applications (ICCA). IEEE, 2024. https://doi.org/10.1109/icca62237.2024.10927813.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Garg, Yashika, and Nishi Gupta. "Cyber Sentinel: Real-Time Fraud Detection in Online Transactions Using Advanced Machine Learning Techniques." In 2024 International Conference on Futuristic Technologies in Control Systems & Renewable Energy (ICFCR). IEEE, 2024. https://doi.org/10.1109/icfcr64128.2024.10762982.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kant, Vishnu. "Optimizing Logistic Regression for Flawless Fraud Detection in Digital Payments." In 2024 Second International Conference on Intelligent Cyber Physical Systems and Internet of Things (ICoICI). IEEE, 2024. http://dx.doi.org/10.1109/icoici62503.2024.10696469.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Christiawan, Jefry, Collin Kliveson, Derwin Suhartono, and Henry Lucky. "Classifying Fraud in Indonesia Short Message Service (SMS) Using Machine Learning and Deep Learning." In 2024 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS). IEEE, 2024. https://doi.org/10.1109/icimcis63449.2024.10956456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hossain, Gahangir, Tylor Hurt, and Mikyung Shin. "WIP : Fundamentals on Cyber Fraud Detection and Investigation: Empowering High School Students for a Secure Digital Future." In 2024 IEEE Frontiers in Education Conference (FIE). IEEE, 2024. https://doi.org/10.1109/fie61694.2024.10893042.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cyber frauds"

1

Cummings, Adam, Todd Lewellen, David McIntire, Andrew P. Moore, and Randall Trzeciak. Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada610430.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tayeb, Shahab. Protecting Our Community from the Hidden Vulnerabilities of Today’s Intelligent Transportation Systems. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2132.

Full text
Abstract:
The ever-evolving technology interwoven into the transportation industry leaves it frequently at risk for cyber-attacks. This study analyzes the security of a common in-vehicle network, the Controller Area Network (CAN), standard in most vehicles being manufactured today. Like many other networks, CAN comes with inherent vulnerabilities that leave CAN implementations at risk of being targeted by cybercriminals. Such vulnerabilities range from eavesdropping, where the attacker can read the raw data traversing the vehicle, to spoofing, where the attacker can place fabricated traffic on the netwo
APA, Harvard, Vancouver, ISO, and other styles
3

Valera Ordaz, Lidia, and Guillermo López García. Agenda and frames in the websites of the People’s Party (PP) and the Spanish Socialist Workers’ Party (PSOE) in the 2011 cyber campaign. Revista Latina de Comunicación Social, 2014. http://dx.doi.org/10.4185/rlcs-2014-1000en.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!