Search Results

Results (9)

Search Parameters:

Keyword: Fraud
Order results
Results per page
Open AccessArticle
11 Pages, 1,752 KB Download PDF

An Adaptive Heterogeneous Ensemble Learning Model for Credit Card Fraud Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 3, Page # 01–11, 2024; DOI: 10.25046/aj090301
Abstract:

The proliferation of internet economies has given the corporate world manifold advantages to businesses, as they can now incorporate the latest innovations into their operations, thereby enhancing ease of doing business. For instance, financial institutions have leveraged credit card usage on the aforesaid proliferation. However, this exposes clients to cybercrime, as fraudsters always find ways…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 1,092 KB Download PDF

Fraud Detection Call Detail Record Using Machine Learning in Telecommunications Company

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 63–69, 2020; DOI: 10.25046/aj050409
Abstract:

Fraud calls have a serious impact on telecommunications operator revenues. Fraud detection is very important because service providers can feel a significant loss of income. We conducted a fraud research case study on one of the operators that experienced fraud in 2009 and 2018. Call Detail Record (CDR) containing records of customer conversations such as…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 1,105 KB Download PDF

Approach to Combine an Ontology-Based on Payment System with Neural Network for Transaction Fraud Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 551–560, 2020; DOI: 10.25046/aj050269
Abstract:

Fraud, as regards means of payment, means the behavior of any legal or natural one that makes an abnormal or irregular use of a way of payment, elements of it or information contained therein, to improperly obtain an honest, service or enrichment, and or causing financial damage to the one that has distributed the means…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 784 KB Download PDF

Aggrandized Random Forest to Detect the Credit Card Frauds

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 121–127, 2019; DOI: 10.25046/aj040414
Abstract:

From the collection of supervised machine learning technique, an ensemble procedure is used in Random Forest. In the arena of Data mining, there is an excellent claim for machine learning techniques. Random Forest has tremendous latent of becoming a widespread technique for forthcoming classifiers as its performance has been found analogous with ensemble techniques bagging…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 946 KB Download PDF

Biometric System Vulnerabilities: A Typology of Metadata

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 1, Page # 191–200, 2020; DOI: 10.25046/aj050125
Abstract:

This study presents a root cause analysis of biometric vulnerabilities and provides a comprehensive typology of metadata in biometric adaptation. Although they are more reliable and secure than traditional authentication methods, biometric techniques are subject to vulnerabilities that pose challenges. Faced with the proliferation of cases of identity theft and fraud, biometrics is increasingly used…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 1,116 KB Download PDF

EKMC: Ensemble of kNN using MetaCost for Efficient Anomaly Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 401–408, 2019; DOI: 10.25046/aj040552
Abstract:

Anomaly detection aims at identification of suspicious items, observations or events by differing from most of the data. Intrusion Detection, Fault Detection, and Fraud Detection are some of the various applications of Anomaly Detection. The Machine learning classifier algorithms used in these applications would greatly affect the overall efficiency. This work is an extension of…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
8 Pages, 954 KB Download PDF

Smart Meter Data Analysis for Electricity Theft Detection using Neural Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 161–168, 2019; DOI: 10.25046/aj040420
Abstract:

The major problem in electric utility is Electrical Theft, which is harmful to electric power suppliers and causes economic loss. Detecting and controlling electrical theft is a challenging task that involves several aspects like economic, social, regional, managerial, political, infrastructural, literacy rate, etc. Numerous methods were proposed formerly for detecting electricity theft. However, the previous…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Electronic Engineering (EEE))
Open AccessArticle
11 Pages, 1,022 KB Download PDF

Behavioral Analysis of Bitcoin Users on Illegal Transactions

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 402–412, 2019; DOI: 10.25046/aj040250
Abstract:

Bitcoin is a popular crypto currency that is used as a mode of investment and a medium for trading goods and services. Anonymity, security and decentralization are significant features of Bitcoin. This creates several opportunities for criminals to involve in illegal and fraudulent activities. This research study aimed to automate the process of gaining the…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 1,013 KB Download PDF

Web Authentication: no Password; Listen and Touch

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 84–92, 2019; DOI: 10.25046/aj040109
Abstract:

Just as electricity has an essential role in our lives, the internet network and especially web services have become of vital importance nowadays. Without security service layers, apparently small things like checking a child’s school schedule on web may turn the daily routine into a nightmare. Web services users are still required to use many…

Read More
(This article belongs to the SP6 (Special Issue on Recent Advances in Engineering Systems 2018-19) & Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026