Deep learning: a comprehensive overview on techniques, taxonomy, applications and research directions

IH Sarker - SN computer science, 2021 - Springer
Deep learning (DL), a branch of machine learning (ML) and artificial intelligence (AI) is
nowadays considered as a core technology of today's Fourth Industrial Revolution (4IR or …

Deep cybersecurity: a comprehensive overview from neural network and deep learning perspective

IH Sarker - SN Computer Science, 2021 - Springer
Deep learning, which is originated from an artificial neural network (ANN), is one of the
major technologies of today's smart cybersecurity systems or policies to function in an …

Machine learning through the lens of e-commerce initiatives: An up-to-date systematic literature review

LM Policarpo, DE da Silveira, R da Rosa Righi… - Computer Science …, 2021 - Elsevier
E-commerce platforms are a primary place for people to find, compare, and ultimately
purchase products. They employ Machine Learning (ML), Business Intelligence (BI) …

[HTML][HTML] How to keep your information secure? Toward a better understanding of users security behavior

Á Arenas, G Ray, A Hidalgo, A Urueña - Technological Forecasting and …, 2024 - Elsevier
Use of computers and the Internet is an integral part of our lives, with business becoming
more digital. As a result, individuals are using their home computers to perform diverse tasks …

Smartphone addiction and cybercrime victimization in the context of lifestyles routine activities and self-control theories: The user's dual vulnerability model of …

J Herrero, A Torres, P Vivas, A Hidalgo… - International journal of …, 2021 - mdpi.com
(1) Background: This paper combines lifestyle-routine activities (L-RAT) and self-control
(SCT) theories along with the literature on smartphone addiction in a joint model that …

A bibliometric analysis of financial fraud exploiting the elderly in the digital age

ME Lindez-Macarro, R Gallego-Losada… - International Journal of …, 2025 - emerald.com
Purpose The purpose of this review is to conduct a bibliometric analysis of financial fraud
exploiting the elderly by mapping its evolution, identifying major metrics and discussing …

Understanding online shopping fraud among Chinese elderly: Extending routine activity theory in the online context

H Chen, M He, L Peng - Telematics and Informatics, 2025 - Elsevier
Drawing from routine activity theory (RAT), this study explored the antecedents of older
adults' exposure to online shopping fraud and evaluated the moderators of the linkage …

Travel direction recommendation˙ model based on photos of user social network profile

P Stefanovič, S Ramanauskaitė - IEEE Access, 2023 - ieeexplore.ieee.org
Travelling is one of the most enjoyable activities for people of all ages. It is constantly
looking for innovative solutions on how to tailor travel recommendations to the needs of its …

[PDF][PDF] Olfactory virtual reality (OVR) for wellbeing and reduction of stress, anxiety and pain

D Tomasi - 2021 - philarchive.org
Olfactory Virtual Reality (OVR) for Wellbeing and Reduction of Stress, Anxiety and Pain
Page 1 See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/350157692 …

Fraud prevention in the leasing industry using the Kohonen self-organising maps

MP Bach, N Vlahović, J Pivar - Organizacija, 2020 - sciendo.com
Background and Purpose: Data mining techniques are intensely used in various industries
for the purpose of fraud prevention and detection. Research that focuses on the leasing …