Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Fraud detection in mobile payment systems using an XGBoost-based framework
P Hajek, MZ Abedin, U Sivarajah - Information Systems Frontiers, 2023 - Springer
Mobile payment systems are becoming more popular due to the increase in the number of
smartphones, which, in turn, attracts the interest of fraudsters. Extant research has therefore …
smartphones, which, in turn, attracts the interest of fraudsters. Extant research has therefore …
Anomaly detection in blockchain networks using unsupervised learning: A survey
C Cholevas, E Angeli, Z Sereti, E Mavrikos… - Algorithms, 2024 - mdpi.com
In decentralized systems, the quest for heightened security and integrity within blockchain
networks becomes an issue. This survey investigates anomaly detection techniques in …
networks becomes an issue. This survey investigates anomaly detection techniques in …
Improving cryptocurrency crime detection: Coinjoin community detection approach
The potential of Bitcoin for money laundering and terrorist financing represents a significant
challenge in law enforcement. In recent years, the use of privacy-improving CoinJoin …
challenge in law enforcement. In recent years, the use of privacy-improving CoinJoin …
Structural identity representation learning for blockchain-enabled metaverse based on complex network analysis
The metaverse and its underlying blockchain technology have attracted extensive attention
in the past few years. How to mine, process, and analyze the tremendous data generated by …
in the past few years. How to mine, process, and analyze the tremendous data generated by …
Disrupting ransomware actors on the bitcoin blockchain: A graph embedding approach
Ransomware is a growing problem and significant threat to cybersecurity in the United
States. One primary vector for ransomware payments is the Bitcoin network. Network …
States. One primary vector for ransomware payments is the Bitcoin network. Network …
The nilcatenation problem and its application for detecting money laundering activities in cryptocurrency networks
C Tomacheski, A Milanés… - … Transactions in Operational …, 2024 - Wiley Online Library
This work considers a combinatorial optimization problem in graphs, the nilcatenation
problem, and investigates its potential application for detecting money laundering activities …
problem, and investigates its potential application for detecting money laundering activities …
Classifying ransomware-Bitcoin nodes using graph embeddings
Background: Law enforcement agencies have been trying to find methods to systematically
identify ransomware transactions within cryptocurrency payment networks (Paquet-Clouston …
identify ransomware transactions within cryptocurrency payment networks (Paquet-Clouston …
Ransomware-bitcoin threat intelligence sharing using structured threat information expression
To address the challenge of representing ransomware-cryptocurrency payments, this article
outlines a novel approach to the extraction and sharing of threat intelligence data from the …
outlines a novel approach to the extraction and sharing of threat intelligence data from the …
Blokzincir ve Kötü Amaçlı Yazılımların Kesişimi: Kapsamlı Bir İnceleme ve Analiz
Blokzincir, dağıtık defter teknolojisinin bir türü olarak, güvenilir ve şeffaf bir mekanizma
olarak ortaya çıkmıştır. Temel özellikleri değişmezlik, kriptografik şifreleme, denetlenebilirlik …
olarak ortaya çıkmıştır. Temel özellikleri değişmezlik, kriptografik şifreleme, denetlenebilirlik …
Towards Algorithmic Identification of Online Scams
EMH Badawi - 2021 - ruor.uottawa.ca
In “web-based scams”, scam websites provide fraudulent business or fake services to steal
money and sensitive information from unsuspecting victims. Despite the researchers' efforts …
money and sensitive information from unsuspecting victims. Despite the researchers' efforts …