Persuasive Schemes for Financial Exploitation in Online Romance Scam: An Anatomy on Sha Zhu Pan (杀猪盘) in China

F Wang, X Zhou - Victims & Offenders, 2023 - Taylor & Francis
… a romantic or close relationship to manipulate and/or steal from … reports or posts from social
media platforms or news outlets (eg… , thematic analysis used in this current study is to identify

[HTML][HTML] Are fraud victims nothing more than animals? Critiquing the propagation of “pig butchering”(Sha Zhu Pan, 杀猪盘)

JM Whittaker, S Lazarus, T Corcoran - Journal of Economic Criminology, 2024 - Elsevier
… enables fraudsters in their self-identified role as hunters to justify … The victim is then typically
manipulated into investing a small … on dating apps and social media. These profiles often …

[PDF][PDF] 基于动机分析的区块链数字货币异常交易行为识别方法

沈蒙, 桑安琪, 祝烈煌, 孙润庚, 张璨 - 计算机学报, 2021 - cjc.ict.ac.cn
… behind any Bitcoin abnormal transaction behavior, this article designs a novel method for
identifying Bitcoin's abnormal transaction behavior based on the analysis of transaction …

Shanzhai 山寨nationalism 中国民族主义: Reflexive empires and digital commemoration in China from Ah Q to AI

T Sear - After the Armistice, 2021 - taylorfrancis.com
… of people use online social networking sites. Ninety four per … determinant of social identification
and political action. Election … The ‘time axis manipulation’ of a telegraph message and the …

区块链技术专刊序言(中英文)

冯登国, 欧阳永贵 - Journal of Cryptologic Research, 2018 - search.proquest.com
… The security of Bitcoin has attracted more attention, and many attacks have been proposed.
“… in Bitcoin” by Han Jian et al. elaborates the common attacks on Bitcoin mining, analyzes the …

[PDF][PDF] 区块链数据分析: 现状, 趋势与挑战

陈伟利, 郑子彬 - 计算机研究与发展, 2018 - researchgate.net
… corresponding analysis methods. Then, the current research progress in blockchain data
analysis … , privacy disclosure risk analysis, network portrait, network visualization, market effect …

如何正确和安全地开展后量子密码算法的相关实现(英文)

张帆, 杨博麟 - Journal of Cryptologic Research, 2023 - search.proquest.com
… data leakage, in the situation where the manipulated data is randomly split in several shares
(… manual hooking for the analysis to be exact. In general, we identified some flaws which are …

内部不稳定是越南的安全挑战

NH Tien - 2020 - philpapers.org
… , detecting, tracking and detailing them are a significant challenge and the analysis and …
This can lead to dangerous trade wars and currency manipulation, laying the ground for conflicts …

全球热带和温带森林生态系统对疏伐作业的响应

J Rajeev, KCJ Kumar, DP Prasad, D Utpal - 资源与生态学报, 2023 - jorae.cn
… and analysis. … identification phase. According to the relevancy of the literature, a total of 98
articles remained for the further screening process. Together with the additional 32 identified

[PDF][PDF] 社工概念演化分析

王作广, 朱红松, 孙利民 - 信息安全学报, 2021 - jcs.iie.ac.cn
social engineering. This paper studies the concept evolution of social engineering, and
analyzes … them that the social engineer is someone he is not, or by manipulation. As a result, the …