Please use this identifier to cite or link to this item:
http://ir.futminna.edu.ng:8080/jspui/handle/123456789/27742
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hussaini, Y, | - |
dc.contributor.author | Waziri, V.O. | - |
dc.contributor.author | Isah, A. O. | - |
dc.contributor.author | Ojeniyi, J A | - |
dc.date.accessioned | 2024-05-01T11:00:45Z | - |
dc.date.available | 2024-05-01T11:00:45Z | - |
dc.date.issued | 2022 | - |
dc.identifier.uri | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/27742 | - |
dc.description.abstract | Cryptocurrency Fraud is growing at alarming rate and spreading rapidly despite on-going mitigating efforts. This brings a necessity to find more effective solutions to detect these Frauds and prevent users from losing digital assets. This study uses the PRISMA statement as a reference so to be transparent. This paper uses a SLR to identify where recent studies in cryptocurrency fraud detection have been focused on and offers a broad perspective relating to types of Techniques, Algorithms, dataset sources used and also the categories of Fraud types in the research area within the range of 2018 to 2022. A total of 38 selected papers met the inclusion criteria based on title of articles, exclusion criteria, reading abstract and content of the selected 38 papers. Different data are extracted from these articles and recorded in an excel sheet for further analysis. Most of the paper discussed about the use of Machine Learning and Deep Learning analysis approach to analyse cryptocurrency fraud. We also identified research gaps that are further needed to be explored by the research community. | en_US |
dc.language.iso | en | en_US |
dc.publisher | 4th International Engineering Conference (IEC 2022) | en_US |
dc.subject | Cryptocurrency | en_US |
dc.subject | Fraud | en_US |
dc.subject | Detection | en_US |
dc.subject | Machine Learning | en_US |
dc.subject | Deep learning | en_US |
dc.title | Cryptocurrency Fraud Detection: A systematic Literature review | en_US |
dc.type | Article | en_US |
Appears in Collections: | Cyber Security Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
IEC2022paper.pdf | 4 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.