-
61
Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things
Published 2019-04-01“…When attacks on IoT networks go undetected for longer periods, it affects availability of critical systems for end users, increases the number of data breaches and identity theft, drives up the costs and impacts the revenue. …”
Get full text
Article -
62
Leveraging Machine Learning for Fraudulent Social Media Profile Detection
Published 2024-03-01“…Fake social media profiles are responsible for various cyber-attacks, spreading fake news, identity theft, business and payment fraud, abuse, and more. …”
Get full text
Article -
63
Personalized Privacy Assistant: Identity Construction and Privacy in the Internet of Things
Published 2023-04-01“…We build a statistical model to simulate the identity theft and to help calculate the privacy risk score based on the identity attributes collected by IoT devices. …”
Get full text
Article -
64
Honour among (cyber)thieves?
Published 2018“…Illicit enterprises now range enormously in scope from identity theft and fraud to blackmail and extortion to intellectual property violations and spam among others. …”
Journal article -
65
Anti-spoofing method for fingerprint recognition using patch based deep learning machine
Published 2020“…Today's with increasing identity theft, biometric systems based on fingerprints have a growing importance in protection and access restrictions. …”
Article -
66
Gait feature based on human identification & classification by using artificial neural network and project management approaches for its implementation
Published 2019“…With the increased threat of terrorism and identity theft, human recognition is one of the basic elements of present era’s security applications installed in commercial malls, banks, hospitals, military installations, airports, religious places etc. …”
Article -
67
New hybrid features for phish website prediction
Published 2016“…Phishing is a serious threat to the web economy and the Internet communication, because phishers put both users and organizations at risk of identity theft and financial losses. Phishers continually exploit new sophisticated features to impersonate legitimate web pages, modify their components and host their phishes. …”
Article -
68
Hybrid features-based prediction for novel phish websites
Published 2016“…Phishers frequently craft novel deceptions on their websites and circumvent existing anti-phishing techniques for insecure intrusions, users’ digital identity theft, and then illegal profits. This raises the needs to incorporate new features for detecting novel phish websites and optimizing the existing anti-phishing techniques. …”
Get full text
Article -
69
Information Management Security Vulnerabilities in Smartphones Used by University Students: A Case Study in the Southwest of Colombia
Published 2022-03-01“…The threats identified in Android smartphones used by university students in the southwest of Colombia were based on various techniques (phishing, DNS poisoning, identity theft, Man in the middle, foot-printing, spyware). …”
Get full text
Article -
70
Analisis Bibliometrik Publikasi Isu Kebocoran Data Menggunakan VOSviewer
Published 2023-09-01“… Data leakage can harm individuals who experience it, such as identity theft, financial fraud, or even physical security threats. …”
Get full text
Article -
71
A wormhole attack detection method for tactical wireless sensor networks
Published 2023-08-01“…WSNs are commonly affected by various attacks, such as identity theft, black holes, wormholes, protocol spoofing, etc. …”
Get full text
Article -
72
Intelligent Data Security Solutions for e-Health Applications /
Published 2020“…Currently, medical-related identity theft costs billions of dollars each year and altered medical information can put a person’s health at risk through misdiagnosis, delayed treatment or incorrect prescriptions. …”
Get full text
software, multimedia -
73
Threats and Challenges for Security Measures on the Internet of Things
Published 2022-05-01“…Due to the billions of connected devices, there is a potential risk of data loss, identity theft, device manipulation, trust issues, falsification of data, network/server manipulation, and various impacts in the application of IoT platforms. …”
Get full text
Article -
74
Internet fraud and transnational organized crime
Published 2020-03-01“…The main task of this article is to determine the most common forms of online financial crimes, such as “Hacking” or electronic transmission unintended for the interceptor, such as passwords, credit card information, or other types of identity theft. The article discusses the features of legal regulation and the activities of the Ukraine to protect citizens form Internet frauds and to avoid Internet scams, phishing and other cybercrimes in Internet. …”
Get full text
Article -
75
Privacy Threat MOdeling Language
Published 2023-01-01“…Users of OSNs become victims of identity theft, cyberstalking, and information leakage, which are real threats to privacy. …”
Get full text
Article -
76
EEG-based identification system using deep neural networks with frequency features
Published 2024-02-01“…Among various methods, electroencephalography-based (EEG-based) identification is a dependable way to prevent identity theft and impersonation. Due to the distractions present in the identification environment, such as lack of focus, mental engagement, small body movements, blinking, and other noises, it is essential to analyze data that reflects these conditions. …”
Get full text
Article -
77
Email and Website-Based Phishing Attack: Examining Online Users Security Behavior in Cyberspace Environment
Published 2023-01-01“…As a result, phishing, an identity theft cyber-attack that targets humans rather than computers, was born to harvest internet users' confidential information by taking advantage of human behavior and hurting an organization's continuity, reputation, and credibility. …”
Get full text
Article -
78
Securing Health Sensing Using Integrated Circuit Metric
Published 2015-10-01“…An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. …”
Get full text
Article -
79
Life-long phishing attack detection using continual learning
Published 2023-07-01“…Abstract Phishing is an identity theft that employs social engineering methods to get confidential data from unwary users. …”
Get full text
Article -
80
Confusion, control and comfort: premediating identity management in film and television
Published 2013“…Our analysis suggests that a whole range of future IM (knowledge- and token-based, as well as biometric/implant) technologies is imagined here, with biometric and implant technologies most likely to be taken to (dystopian) extremes. Stories of identity theft and confusion, surveillance and control, comfort and corruption construct them as potentially problematic and always under threat, as well as calling up existential concerns about what it means to be human. …”
Journal article