10 skills found
git-disl / EllipticPlusPlusElliptic++ Dataset: A Graph Network of Bitcoin Blockchain Transactions and Wallet Addresses
randallscott25-star / Epstein Forensic FinanceEpstein Financial Forensics Automated forensic financial reconstruction from 1.48 million DOJ EFTA documents + 503K cataloged media items
TommasoBelluzzo / HFMRDA framework for detecting misreported returns in hedge funds.
manik-marwaha / Predicting Fraudulent Transactions In Cryptosusing the Elliptic Data Set (https://www.kaggle.com/ellipticco/elliptic-data-set) and working to improve on the orignals results by Weber, Mark, et al. "Anti-money laundering in bitcoin: Experimenting with graph convolutional networks for financial forensics." arXiv preprint arXiv:1908.02591 (2019). We use ML models such as SVM and Random Forest. Oversampling techiques such as SMOTE, ctCAN and GMM were used to address the class imbalance problem in the dataset. Also, we generated node embeddings using DeepWalk and trained ML models on them.
birukG09 / EduChainXA full-stack secure academic transcript verification platform using Solidity smart contracts for immutable data, Rust for high-performance financial forensics engine, and Java for admin services and integrations. Includes real-time anomaly detection for financial flows related to student tuition, grants, and institutional transactions
jironmarlon562 / Bitcoin And Other Crypto Assets Investments RecoveryDatrek Recovery provides the best-in-class services for individuals who have been defrauded by both regulated or unregulated investment platforms. They continue to develop successful investigative techniques and world class legal relationships, earning the trust and respect of our clients. Also have established long term relationships with some of the best forensic engineers in the real of financial fraud.
TommasoBelluzzo / BenfordLawA framework for Benford's Law conformity assessment.
PraveenMudalgeri / V0 Financial Forensics EngineNo description available
Atrangi-Coders / Financial Forensics EngineA production-grade web application that detects money muling networks in financial transaction data through graph analysis, statistical anomaly detection, and interactive visualization.
RieckyWilliams / Cyber Security Imperative For Healthcare IndustryIn healthcare sector where the expenses of a treatment or the cost of a more advanced surgical instrument or machine are skyrocketing, the only thing cheap is – storing the medical histories of patients’ on electronic health records (EHRs) in the Cloud. When doctors are able to use Internet of Things for research and peer-reviewed studies, they can perform better. Diseases can be cured and prevented with facts and remedies from around the world. Telemedicine technologies can be used to provide critical medical care to people in rural and remote areas. Such digital advancements are taking the healthcare industry into the future. However, these opportunities come with a significant security risk. In order to improve the cardiac monitoring of a patient, a lot of new medical devices can be installed, but they bring along the risk of new entry points for cyber criminals. According to the 2017 KPMG/Forbes Insights Cyber-Security Survey, 55% organizations have seen an employee falling prey to phishing scam and 34% have seen theft from secured database by internal bad actor. Cyber and privacy breaches bring along the risk of loss of digital assets and also cause irreparable damage to the reputation of the organization. Patient data will always remain a critical asset in the healthcare industry. However, cyber criminals are in the want of stealing this protected health information (PHI). The value of medical data is ten times more than that of financial data in the black market of dark web. In the last two years, 47% of healthcare organizations have had a security breach related to HIPAA. Sensor-based wireless devices have proven to be a boon as well as a bane for the healthcare industry. Wireless devices allow efficient communication and seamless patient management. But they also act as an entryway into the network of the hospital. For cyber criminals this is an easy way to access sensitive information from the hospital’s networks. Continuous technology assessments are critical to cyber security. It is imperative that healthcare organizations address all the vulnerabilities before integrating new technologies. Awareness about the potential attacks is of utmost importance. ACS Guaranty’s Cyber-Security Solutions assist critical infrastructure organizations altering their security and privacy controls into business-enabling platforms. ACS, a Guaranteed Secured Centre safeguards IT networks and secures critical data from any cyber-attack. The company covers all the needs from pre- to post-breach in terms of cyber security. Solutions include threat intelligence, cyber forensics, and other cyber risk services. Most common methods of attack are malware (72%), ransomware (32%) and internal theft (47%). Sharing data with third parties is on the top of perceived vulnerabilities list with 63% organizations complaining about it. Other vulnerabilities on the list include internet devices not controlled by IT (59%), external attackers (50%), and employee breaches (27%). Hence, a balanced cyber security program is required. Healthcare organizations must implement advanced cyber security solutions, and should train and aware their staff regularly about the potential risks. Organizations ignoring this risk are vulnerable to incalculable damage to their reputation as well as their finances.