Search Results for Fraud. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dFraud.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list 2026-04-05T17:13:38Z Fraud Prevention in Online Digital Advertising ent://SD_ILS/0/SD_ILS:618267 2026-04-05T17:13:38Z 2026-04-05T17:13:38Z Author&#160;Zhu, Xingquan. author. (orcid)0000-0003-4129-9611&#160;Tao, Haicheng. author.&#160;Wu, Zhiang. author.&#160;Cao, Jie. author.&#160;Kalish, Kristopher. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-56793-8">https://doi.org/10.1007/978-3-319-56793-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Identification and Mitigation of Fraudulent Online Transactions Using Authentication and Fraud Detection System ent://SD_ILS/0/SD_ILS:606269 2026-04-05T17:13:38Z 2026-04-05T17:13:38Z Author&#160;Khattri, Vipin. author.&#160;Kumar Nayak, Sandeep. author.&#160;Kumar Singh, Deepak. author.&#160;Bhateja, Vikrant. author. (orcid)0000-0002-3259-8874&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-4888-4">https://doi.org/10.1007/978-981-97-4888-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Passive and Active Measurement 26th International Conference, PAM 2025, Virtual Event, March 10-12, 2025, Proceedings ent://SD_ILS/0/SD_ILS:607570 2026-04-05T17:13:38Z 2026-04-05T17:13:38Z Author&#160;Testart, Cecilia. editor.&#160;van Rijswijk-Deij, Roland. editor.&#160;Stiller, Burkhard. editor. (orcid)0000-0002-7461-7463&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-85960-1">https://doi.org/10.1007/978-3-031-85960-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Demystifying AI and ML for Cyber-Threat Intelligence ent://SD_ILS/0/SD_ILS:609747 2026-04-05T17:13:38Z 2026-04-05T17:13:38Z Author&#160;Yang, Ming. editor.&#160;Mohanty, Sachi Nandan. editor.&#160;Satpathy, Suneeta. editor.&#160;Hu, Shu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-90723-4">https://doi.org/10.1007/978-3-031-90723-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing the Connected World Exploring Emerging Threats and Innovative Solutions ent://SD_ILS/0/SD_ILS:608011 2026-04-05T17:13:38Z 2026-04-05T17:13:38Z Author&#160;Thampi, Sabu M. editor. (orcid)0000-0001-6453-5520&#160;Thomas, Tony. editor. (orcid)0000-0002-9323-6607&#160;Mukherjee, Preetam. editor. (orcid)0000-0003-2549-6578&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82826-3">https://doi.org/10.1007/978-3-031-82826-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Planning A Practical Approach ent://SD_ILS/0/SD_ILS:602364 2026-04-05T17:13:38Z 2026-04-05T17:13:38Z Author&#160;Lincke, Susan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-43118-0">https://doi.org/10.1007/978-3-031-43118-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:612685 2026-04-05T17:13:38Z 2026-04-05T17:13:38Z Author&#160;Grossklags, Jens. editor.&#160;Preneel, Bart. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-54970-4">https://doi.org/10.1007/978-3-662-54970-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practices Emerging Threats and Perspectives ent://SD_ILS/0/SD_ILS:616353 2026-04-05T17:13:38Z 2026-04-05T17:13:38Z Author&#160;Traor&eacute;, Issa. editor.&#160;Awad, Ahmed. editor.&#160;Woungang, Isaac. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-48947-6">https://doi.org/10.1007/978-3-319-48947-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Phone Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:615733 2026-04-05T17:13:38Z 2026-04-05T17:13:38Z Author&#160;Androulidakis, Iosif I. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29742-2">https://doi.org/10.1007/978-3-319-29742-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>