Results 51 to 60 of about 12,885 (184)

Fraud Detection Framework for Blockchain Finance: Tackling Arbitrage, Liquidity Exploits, and Money Laundering

open access: yesInternational Journal of Intelligent Systems, Volume 2026, Issue 1, 2026.
Blockchain technology has revolutionized numerous industries by providing decentralized, transparent, and immutable ledgers. However, its adoption is hindered by persistent security challenges, including arbitrage attacks, liquidity exploits, and noncompliance with antimoney laundering (AML) regulations.
Aleaddin Ozer   +2 more
wiley   +1 more source

KDPII: A New Korean Dialogic Dataset for the Deidentification of Personally Identifiable Information

open access: yesIEEE Access
The rapid growth of social media in the era of big data and artificial intelligence has raised significant safety concerns related to the communication of sensitive personal information.
Li Fei   +5 more
doaj   +1 more source

An effective privacy enhanced interface to support record linkage decisions

open access: yesInternational Journal of Population Data Science, 2018
Introduction Privacy enhanced technologies (PET) are those that measure and protect privacy by preventing unnecessary use of personal data without loss of the functionality of the information system.
Hye-Chung Kum   +4 more
doaj   +1 more source

Improving Cohort-Hospital Matching Accuracy through Standardization and Validation of Participant Identifiable Information

open access: yesChildren, 2022
Linking very large, consented birth cohorts to birthing hospitals clinical data could elucidate the lifecourse outcomes of health care and exposures during the pregnancy, birth and newborn periods.
Yanhong Jessika Hu   +9 more
doaj   +1 more source

The integration of generative artificial intelligence and machine learning in healthcare: Current applications and future directions

open access: yesJournal of Intelligent Medicine, Volume 2, Issue 4, Page 179-192, December 2025.
Abstract Machine learning (ML) and generative artificial intelligence (GAI) in recent years are rapidly revolutionizing the healthcare industry offering improved precision and efficiency of healthcare delivery. The use of these advanced technologies in healthcare such as medical imaging, drug discoveries, predictive analytics, and personalized medicine
Muhammad Umar   +10 more
wiley   +1 more source

Toward a Secure Future: An Integrated Framework for PII Detection Using NLP and Visual Analysis

open access: yesIEEE Access
Safeguarding Personally Identifiable Information (PII) is critical to prevent data breaches and identity theft in the era of digital services. This paper presents a hybrid PII detection and secure verification system that integrates rule-based regular ...
S. Sheela   +3 more
doaj   +1 more source

A combined Blockchain and zero-knowledge model for healthcare B2B and B2C data sharing

open access: yesArab Journal of Basic and Applied Sciences, 2023
The two main forms of healthcare data exchange among entities are business-to-business (B2B) and business-to-customer (B2C). The former uses the electronic data interchange (EDI) technology between healthcare institutions, while the latter is usually ...
Hesham Moosa   +4 more
doaj   +1 more source

Guardians of the Network: An Ensemble Learning Framework With Adversarial Alignment for Evasive Cyber Threat Detection

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
Machine learning‐enhanced NIDS, integrating diverse data sources and rigorous feature selection, achieves near‐perfect detection of sophisticated evasive cyber threats—including APTs, DDoS, zero‐day exploits, and MitM attacks—surpassing industry benchmarks in accuracy, precision, recall, and F1$$ {\mathrm{F}}_1 $$‐score. ABSTRACT Advanced cyber threats
Khandakar Md Shafin   +2 more
wiley   +1 more source

Improving targeted password guessing attacks by using personally identifiable information and old password

open access: yesCybersecurity
Text-based passwords serve as a primary means of authentication and play a crucial role in securing information systems. However, easy-to-remember passwords are often vulnerable to targeted password guessing attacks.
Wei Ou   +5 more
doaj   +1 more source

The datafication of student information on X (Twitter)

open access: yesComputers and Education Open
The sharing of personally identifiable information (PII) through social media platforms poses known risks to children's online privacy and safety. While the risks of oversharing PII through a range of digital contexts are becoming better understood ...
Cody Pritchard   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy