Fraud detection in mobile payment systems using an XGBoost-based framework

P Hajek, MZ Abedin, U Sivarajah - Information Systems Frontiers, 2023 - Springer
Mobile payment systems are becoming more popular due to the increase in the number of
smartphones, which, in turn, attracts the interest of fraudsters. Extant research has therefore …

Anomaly detection in blockchain networks using unsupervised learning: A survey

C Cholevas, E Angeli, Z Sereti, E Mavrikos… - Algorithms, 2024 - mdpi.com
In decentralized systems, the quest for heightened security and integrity within blockchain
networks becomes an issue. This survey investigates anomaly detection techniques in …

Improving cryptocurrency crime detection: Coinjoin community detection approach

A Wahrstätter, J Gomes, S Khan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The potential of Bitcoin for money laundering and terrorist financing represents a significant
challenge in law enforcement. In recent years, the use of privacy-improving CoinJoin …

Structural identity representation learning for blockchain-enabled metaverse based on complex network analysis

B Tao, HN Dai, H **e, FL Wang - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The metaverse and its underlying blockchain technology have attracted extensive attention
in the past few years. How to mine, process, and analyze the tremendous data generated by …

Disrupting ransomware actors on the bitcoin blockchain: A graph embedding approach

B Ampel, K Otto, S Samtani… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Ransomware is a growing problem and significant threat to cybersecurity in the United
States. One primary vector for ransomware payments is the Bitcoin network. Network …

The nilcatenation problem and its application for detecting money laundering activities in cryptocurrency networks

C Tomacheski, A Milanés… - … Transactions in Operational …, 2024 - Wiley Online Library
This work considers a combinatorial optimization problem in graphs, the nilcatenation
problem, and investigates its potential application for detecting money laundering activities …

Classifying ransomware-Bitcoin nodes using graph embeddings

AB Turner, M Ikram, AJ Uhlmann - Pacific Asia Journal of the …, 2025 - aisel.aisnet.org
Background: Law enforcement agencies have been trying to find methods to systematically
identify ransomware transactions within cryptocurrency payment networks (Paquet-Clouston …

Ransomware-bitcoin threat intelligence sharing using structured threat information expression

AB Turner, S McCombie, AJ Uhlmann - IEEE Security & Privacy, 2022 - ieeexplore.ieee.org
To address the challenge of representing ransomware-cryptocurrency payments, this article
outlines a novel approach to the extraction and sharing of threat intelligence data from the …

Blokzincir ve Kötü Amaçlı Yazılımların Kesişimi: Kapsamlı Bir İnceleme ve Analiz

E Taşkın, İA Doğru - Gazi Mühendislik Bilimleri Dergisi, 2023 - dergipark.org.tr
Blokzincir, dağıtık defter teknolojisinin bir türü olarak, güvenilir ve şeffaf bir mekanizma
olarak ortaya çıkmıştır. Temel özellikleri değişmezlik, kriptografik şifreleme, denetlenebilirlik …

Towards Algorithmic Identification of Online Scams

EMH Badawi - 2021 - ruor.uottawa.ca
In “web-based scams”, scam websites provide fraudulent business or fake services to steal
money and sensitive information from unsuspecting victims. Despite the researchers' efforts …