Automated Secure Computing for Fraud Detection in Financial Transactions

  • Kuldeep Singh
  • , Prasanna Kolar
  • , Rebecca Abraham
  • , Vedantam Seetharam
  • , Sireesha Nanduri
  • , Divyesh Kumar

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

In today’s society, financial fraud is a severe and ongoing issue. Automatic fraud detection devices have been developed to assist in addressing this problem; but, in order to secure against cyber attacks by malicious players, these systems must be designed with security in mind. An automated secure computing system for fraud detection in financial transactions is suggested in this research. The technology is intended to process and analyze transaction data securely, find abnormalities, and send out notifications for possibly fraudulent activities. In order to safeguard against cyber attacks, the study suggests that the system should include a number of security mechanisms, such as encryption, data obfuscation, and access limits. The suggested approach is based on prior observations in research studies related to fraudulent transactions while maintaining a high standard of security. This study illustrates the viability and efficiency of automated secure computing for financial transaction fraud detection.
Original languageEnglish
Title of host publicationAutomated Secure Computing for Next-Generation Systems
EditorsAmit Kumar Tyagi
PublisherWiley - Blackwell
Chapter9
Pages177-189
Number of pages13
ISBN (Electronic)9781394213948
ISBN (Print)9781394213597
StatePublished - Jan 1 2024
Externally publishedYes

Publication series

NameAutomated Secure Computing for Next-Generation Systems

Bibliographical note

Publisher Copyright:
© 2024 Scrivener Publishing LLC.

ASJC Scopus Subject Areas

  • General Computer Science

Keywords

  • Automated secure computing
  • Financial transaction
  • Fraud detection

Disciplines

  • Business

Fingerprint

Dive into the research topics of 'Automated Secure Computing for Fraud Detection in Financial Transactions'. Together they form a unique fingerprint.

Cite this