Showing 61 - 80 results of 137 for search '"identity theft"', query time: 0.35s Refine Results
  1. 61

    Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things by Geethapriya Thamilarasu, Shiven Chawla

    Published 2019-04-01
    “…When attacks on IoT networks go undetected for longer periods, it affects availability of critical systems for end users, increases the number of data breaches and identity theft, drives up the costs and impacts the revenue. …”
    Get full text
    Article
  2. 62

    Leveraging Machine Learning for Fraudulent Social Media Profile Detection by Ramdas Soorya, Agnes Neenu N. T.

    Published 2024-03-01
    “…Fake social media profiles are responsible for various cyber-attacks, spreading fake news, identity theft, business and payment fraud, abuse, and more. …”
    Get full text
    Article
  3. 63

    Personalized Privacy Assistant: Identity Construction and Privacy in the Internet of Things by Kai-Chih Chang, Suzanne Barber

    Published 2023-04-01
    “…We build a statistical model to simulate the identity theft and to help calculate the privacy risk score based on the identity attributes collected by IoT devices. …”
    Get full text
    Article
  4. 64

    Honour among (cyber)thieves? by Lusthaus, J

    Published 2018
    “…Illicit enterprises now range enormously in scope from identity theft and fraud to blackmail and extortion to intellectual property violations and spam among others. …”
    Journal article
  5. 65

    Anti-spoofing method for fingerprint recognition using patch based deep learning machine by Uliyan, Diaa Mohammed, Sadeghi, Somayeh, Jalab, Hamid Abdullah

    Published 2020
    “…Today's with increasing identity theft, biometric systems based on fingerprints have a growing importance in protection and access restrictions. …”
    Article
  6. 66

    Gait feature based on human identification & classification by using artificial neural network and project management approaches for its implementation by Tariq, Waqar, Daud, Muhammad Lutfi, Akhtar, Shameem, Tariq, Fareeha

    Published 2019
    “…With the increased threat of terrorism and identity theft, human recognition is one of the basic elements of present era’s security applications installed in commercial malls, banks, hospitals, military installations, airports, religious places etc. …”
    Article
  7. 67

    New hybrid features for phish website prediction by Zuhair, H., Selamat, A., Salleh, M.

    Published 2016
    “…Phishing is a serious threat to the web economy and the Internet communication, because phishers put both users and organizations at risk of identity theft and financial losses. Phishers continually exploit new sophisticated features to impersonate legitimate web pages, modify their components and host their phishes. …”
    Article
  8. 68

    Hybrid features-based prediction for novel phish websites by Zuhair, H., Salleh, M., Selama, A.

    Published 2016
    “…Phishers frequently craft novel deceptions on their websites and circumvent existing anti-phishing techniques for insecure intrusions, users’ digital identity theft, and then illegal profits. This raises the needs to incorporate new features for detecting novel phish websites and optimizing the existing anti-phishing techniques. …”
    Get full text
    Article
  9. 69

    Information Management Security Vulnerabilities in Smartphones Used by University Students: A Case Study in the Southwest of Colombia by Cristian-Camilo Ordoñez-Quintero, Hugo-Armando Ordoñez-Eraso, Jose-Armando Ordoñez-Córdoba

    Published 2022-03-01
    “…The threats identified in Android smartphones used by university students in the southwest of Colombia were based on various techniques (phishing, DNS poisoning, identity theft, Man in the middle, foot-printing, spyware). …”
    Get full text
    Article
  10. 70

    Analisis Bibliometrik Publikasi Isu Kebocoran Data Menggunakan VOSviewer by Hanissa Rizki Kurnia, Aisyah Zahrah, Elvia Ichsazene Dina Adha, Nur Aini Rakhmawati

    Published 2023-09-01
    “… Data leakage can harm individuals who experience it, such as identity theft, financial fraud, or even physical security threats. …”
    Get full text
    Article
  11. 71

    A wormhole attack detection method for tactical wireless sensor networks by Ke Zhang

    Published 2023-08-01
    “…WSNs are commonly affected by various attacks, such as identity theft, black holes, wormholes, protocol spoofing, etc. …”
    Get full text
    Article
  12. 72

    Intelligent Data Security Solutions for e-Health Applications / by Singh, Amit Kumar, editor 651061, Elhoseny, Mohamed, editor 650905, ScienceDirect (Online service) 7722

    Published 2020
    “…Currently, medical-related identity theft costs billions of dollars each year and altered medical information can put a person’s health at risk through misdiagnosis, delayed treatment or incorrect prescriptions. …”
    Get full text
    software, multimedia
  13. 73

    Threats and Challenges for Security Measures on the Internet of Things by Mohammad Faiz, A.K. Daniel

    Published 2022-05-01
    “…Due to the billions of connected devices, there is a potential risk of data loss, identity theft, device manipulation, trust issues, falsification of data, network/server manipulation, and various impacts in the application of IoT platforms. …”
    Get full text
    Article
  14. 74

    Internet fraud and transnational organized crime by Nadiia Shulzhenko, Snizhana Romashkin

    Published 2020-03-01
    “…The main task of this article is to determine the most common forms of online financial crimes, such as “Hacking” or electronic transmission unintended for the interceptor, such as passwords, credit card information, or other types of identity theft. The article discusses the features of legal regulation and the activities of the Ukraine to protect citizens form Internet frauds and to avoid Internet scams, phishing and other cybercrimes in Internet. …”
    Get full text
    Article
  15. 75

    Privacy Threat MOdeling Language by Andrey Rodrigues, Maria Lucia Bento Villela, Eduardo Luzeiro Feitosa

    Published 2023-01-01
    “…Users of OSNs become victims of identity theft, cyberstalking, and information leakage, which are real threats to privacy. …”
    Get full text
    Article
  16. 76

    EEG-based identification system using deep neural networks with frequency features by Yasaman Akbarnia, Mohammad Reza Daliri

    Published 2024-02-01
    “…Among various methods, electroencephalography-based (EEG-based) identification is a dependable way to prevent identity theft and impersonation. Due to the distractions present in the identification environment, such as lack of focus, mental engagement, small body movements, blinking, and other noises, it is essential to analyze data that reflects these conditions. …”
    Get full text
    Article
  17. 77

    Email and Website-Based Phishing Attack: Examining Online Users Security Behavior in Cyberspace Environment by kibreab adane, Berhanu Beyene

    Published 2023-01-01
    “…As a result, phishing, an identity theft cyber-attack that targets humans rather than computers, was born to harvest internet users' confidential information by taking advantage of human behavior and hurting an organization's continuity, reputation, and credibility. …”
    Get full text
    Article
  18. 78

    Securing Health Sensing Using Integrated Circuit Metric by Ruhma Tahir, Hasan Tahir, Klaus McDonald-Maier

    Published 2015-10-01
    “…An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. …”
    Get full text
    Article
  19. 79

    Life-long phishing attack detection using continual learning by Asif Ejaz, Adnan Noor Mian, Sanaullah Manzoor

    Published 2023-07-01
    “…Abstract Phishing is an identity theft that employs social engineering methods to get confidential data from unwary users. …”
    Get full text
    Article
  20. 80

    Confusion, control and comfort: premediating identity management in film and television by Turner, G, van Zoonen, L, Harvey, J

    Published 2013
    “…Our analysis suggests that a whole range of future IM (knowledge- and token-based, as well as biometric/implant) technologies is imagined here, with biometric and implant technologies most likely to be taken to (dystopian) extremes. Stories of identity theft and confusion, surveillance and control, comfort and corruption construct them as potentially problematic and always under threat, as well as calling up existential concerns about what it means to be human. …”
    Journal article