Showing 81 - 100 results of 1,784 for search '"Theft"', query time: 0.09s Refine Results
  1. 81
  2. 82
  3. 83

    On the effect of sampling frequency on the electricity theft detection performance by Fatemeh Soleimani Nasab, Foad Ghaderi

    Published 2022-12-01
    “…Abstract Electricity theft is a common problem in many countries and affects the revenue of the electricity industry significantly. …”
    Get full text
    Article
  4. 84

    Overview of blockchain assets theft attacks and defense technology by Beiyuan YU, Shanyao REN, Jianwei LIU

    Published 2023-02-01
    “…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
    Get full text
    Article
  5. 85

    Crime Statistics: Modeling Theft in Favour of Victims’ Choices by Johannes Idsø, Torbjørn Årethun

    Published 2018-04-01
    “…The number of reported property thefts has dropped steeply in many European countries over the last 15 years. …”
    Get full text
    Article
  6. 86

    An Empirical Analysis of the Relationship between Unemployment and Theft Crimes by Majid Maddah

    Published 2012-12-01
    “… The purpose of this study is to examine the effect of unemployment rate on theft crimes among the provinces of Iran. This study covered the annual data from 1997 to 2006 by using of GMM method. …”
    Get full text
    Article
  7. 87

    Juridical Study on the Criminal Acts of theft by Minors at the Surakarta by Supardi, Bastianto Nugroho, Supolo Setyo Wibowo

    Published 2022-12-01
    “…The results of the study of the Juridical Study of the Criminalization Conducted by Judges Against the Crime of Theft Perpetrated by Minors in the Surakarta District Court based on Law No. 3 of 1997 concerning Juvenile Court. …”
    Get full text
    Article
  8. 88

    Medical Identity Theft in the Emergency Department: Awareness is Crucial by Michelino Mancini

    Published 2014-11-01
    “…Medical Identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. …”
    Get full text
    Article
  9. 89
  10. 90

    New consumer load prototype for electricity theft monitoring by Abdullateef, Adoyele Isqeel, Salami, Momoh Jimoh Eyiomika, Musse, Mohamud Ahmed, Onasanya, Mobolaji Agbolade, Alebiosu, M. I.

    Published 2013
    “…The prototype will assist researchers and power utilities, currently facing challenges in getting real time data for the study and monitoring of electricity theft. The simulation of electricity theft in real time is one of the contributions of this prototype. …”
    Get full text
    Article
  11. 91
  12. 92

    Theft prevention using wireless security system (WSS) by Ng, Chee Kyun, Wee, Kong Seng, Noordin, Nor Kamariah, Saripan, M. Iqbal, Raja Abdullah, Raja Syamsul Azmir

    Published 2008
    “…This paper presents a developed RFID based theft prevention system such that luxurious belongings, such as laptops which are monitored from being stolen. …”
    Get full text
    Conference or Workshop Item
  13. 93

    Development of GSM-Based Vehicle Anti-Theft System by Hamid, Khairul Hamzani

    Published 2006
    “…Vehicle theft is a universal problem. The statistic of the vehicle gets stolen or vandalized increases at an alarming rate every year. …”
    Get full text
    Thesis
  14. 94

    Online identity theft, security issues, and reputational damage by Ahmad Zukarnain, Zuriati, Sinnathamby Sehgar, Sopna

    Published 2021
    “…Online identity-based theft is known to be one of the most serious and growing threats to victims, such as individuals and organizations, over the last 10 years due to the enormous economic damage these crimes have caused. …”
    Article
  15. 95

    Development of car theft crime index in Peninsular Malaysia by Zulkifli, Malina, Ismail, Noriszura, Razali, Ahmad Mahir, Mat Kasim, Maznah

    Published 2014
    “…Vehicle theft is classified as property crime and is considered as the most frequently reported crime in Malaysia.The rising number of vehicle thefts requires proper control by relevant authorities, especially through planning and implementation of strategic and effective measures.Nevertheless, the effort to control this crime would be much easier if there is an indication or index which is more specific to vehicle theft.This study aims to build an index crime which is specific to vehicle theft.The development of vehicle theft index proposed in this study requires three main steps; the first involves identification of criteria related to vehicle theft, the second requires calculation of degrees of importance, or weighting criteria, which involves application of correlation and entropy methods, and the final involves building of vehicle theft index using method of linear combination, or weighted arithmetic average.The results show that the two methods used for determining weights of vehicle theft index are similar.Information generated from the results can be used as a primary source for local authorities to plan strategies for reduction of vehicle theft and for insurance companies to determine premium rates of automobile insurance.…”
    Conference or Workshop Item
  16. 96

    Modeling the number of car theft using Poisson regression by Zulkifli, Malina, Ling, Agnes Beh Yen, Mat Kasim, Maznah, Ismail, Noriszura

    Published 2016
    “…Regression analysis is the most popular statistical methods used to express the relationship between the variables of response with the covariates.The aim of this paper is to evaluate the factors that influence the number of car theft using Poisson regression model. This paper will focus on the number of car thefts that occurred in districts in Peninsular Malaysia. …”
    Conference or Workshop Item
  17. 97
  18. 98
  19. 99
  20. 100