Cybersecurity Attacks and Detection Methods in Web 3.0 Technology: A Review. [PDF]
Alotaibi B.
europepmc +1 more source
Unsuspectingly Vulnerable: A Rapid Evidence Assessment on the vulnerability of University Students to Criminal Exploitation. [PDF]
Meredith I +3 more
europepmc +1 more source
ETHIAD: A novel explainable model for detecting illicit accounts on Ethereum. [PDF]
Lu J, Liao B, Liu Y, Yao KE.
europepmc +1 more source
Graph convolution network for fraud detection in bitcoin transactions. [PDF]
Asiri A, Somasundaram K.
europepmc +1 more source
Minimizing unnecessary tax audits using multi-objective hyperparameter tuning of XGBoost with focal loss. [PDF]
Malashin IP +5 more
europepmc +1 more source
Automated detection of corruption reports in text via deep reinforcement learning. [PDF]
Xiao Q.
europepmc +1 more source
A byzantine-resistant blockchain framework for secure and scalable immigration management. [PDF]
Shafin KM, Reno S.
europepmc +1 more source
Hidden community interlayer spillover detection in financial multilayer networks: Generalization of hierarchical clustering to multilayer networks. [PDF]
Ardalankia J +3 more
europepmc +1 more source

