{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T03:05:12Z","timestamp":1775012712703,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,5,4]],"date-time":"2023-05-04T00:00:00Z","timestamp":1683158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,4]],"date-time":"2023-05-04T00:00:00Z","timestamp":1683158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-023-00480-3","type":"journal-article","created":{"date-parts":[[2023,5,4]],"date-time":"2023-05-04T17:01:55Z","timestamp":1683219715000},"page":"349-362","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Forecasting of digital financial crimes in Russia based on machine learning methods"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6402-3832","authenticated-orcid":false,"given":"Vera","family":"Ivanyuk","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,4]]},"reference":[{"issue":"5","key":"480_CR1","doi-asserted-by":"publisher","first-page":"682","DOI":"10.1134\/S0001434622110037","volume":"112","author":"T Gataullin","year":"2022","unstructured":"Gataullin, T., Gataullin, S.: Endpoint functions: mathematical apparatus and economic applications. Matematicheskie Zametki 112(5), 682\u2013691 (2022). https:\/\/doi.org\/10.1134\/S0001434622110037","journal-title":"Matematicheskie Zametki"},{"issue":"3","key":"480_CR2","doi-asserted-by":"publisher","first-page":"197","DOI":"10.14254\/1800-5845\/2022.18-3.16","volume":"18","author":"BH Yerznkyan","year":"2022","unstructured":"Yerznkyan, B.H., Gataullin, T.M., Gataullin, S.T.: Mathematical aspects of synergy. Montenegrin J Econom 18(3), 197\u2013207 (2022). https:\/\/doi.org\/10.14254\/1800-5845\/2022.18-3.16","journal-title":"Montenegrin J Econom"},{"issue":"1","key":"480_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/sym14010148","volume":"148","author":"N Andriyanov","year":"2022","unstructured":"Andriyanov, N., Khasanshin, I., Utkin, D., Gataullin, T., Ignar, S., Shumaev, V., Soloviev, V.: Intelligent system for estimation of the spatial position of apples based on YOLOv3 and real sense depth camera D415. Symmetry 148(1), 1\u201314 (2022). https:\/\/doi.org\/10.3390\/sym14010148","journal-title":"Symmetry"},{"issue":"1\u20132","key":"480_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.diin.2010.07.001","volume":"7","author":"G Gogolin","year":"2010","unstructured":"Gogolin, G.: The digital crime tsunami. Dig. Invest. 7(1\u20132), 3\u20138 (2010). https:\/\/doi.org\/10.1016\/j.diin.2010.07.001","journal-title":"Dig. Invest."},{"key":"480_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.exger.2021.111678","volume":"159","author":"A Burton","year":"2022","unstructured":"Burton, A., Cooper, C., Dar, A., Mathews, L., Tripathi, K.: Exploring how, why and in what contexts older adults are at risk of financial cybercrime victimisation: a realist review. Exp. Gerontol. 159, 111678 (2022). https:\/\/doi.org\/10.1016\/j.exger.2021.111678","journal-title":"Exp. Gerontol."},{"key":"480_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102248","volume":"105","author":"HS Lallie","year":"2021","unstructured":"Lallie, H.S., Shepherd, L.A., Nurse, J.R., Erola, A., Epiphaniou, G., Maple, C., Bellekens, X.: Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Security 105, 102248 (2021). https:\/\/doi.org\/10.1016\/j.cose.2021.102248","journal-title":"Comput. Security"},{"issue":"3","key":"480_CR7","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.ijlcj.2010.09.001","volume":"38","author":"P Gottschalk","year":"2010","unstructured":"Gottschalk, P., Dean, G.: Stages of knowledge management systems in policing financial crime. Int. J. Law, Crime and Justice 38(3), 94\u2013108 (2010). https:\/\/doi.org\/10.1016\/j.ijlcj.2010.09.001","journal-title":"Int. J. Law, Crime and Justice"},{"key":"480_CR8","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.cose.2014.05.006","volume":"45","author":"M Lagazio","year":"2014","unstructured":"Lagazio, M., Sherif, N., Cushman, M.: A multi-level approach to understanding the impact of cyber crime on the financial sector. Comput. Security 45, 58\u201374 (2014). https:\/\/doi.org\/10.1016\/j.cose.2014.05.006","journal-title":"Comput. Security"},{"key":"480_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijlcj.2021.100520","volume":"68","author":"Y Timofeyev","year":"2022","unstructured":"Timofeyev, Y., Dremova, O.: Insurers\u2019 responses to cyber crime: evidence from Russia. Crime Justice 68, 100520 (2022). https:\/\/doi.org\/10.1016\/j.ijlcj.2021.100520","journal-title":"Crime Justice"},{"key":"480_CR10","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.ijlcj.2021.100520","volume":"113","author":"L Vomfell","year":"2018","unstructured":"Vomfell, L., H\u00e4rdle, W.K., Lessmann, S.: Improving crime count forecasts using Twitter and taxi data. Decis. Support Syst. 113, 73\u201385 (2018). https:\/\/doi.org\/10.1016\/j.ijlcj.2021.100520","journal-title":"Decis. Support Syst."},{"issue":"7","key":"480_CR11","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1016\/0167-4048(95)00024-0","volume":"14","author":"J Backhouse","year":"1995","unstructured":"Backhouse, J., Dhillon, G.: Managing computer crime: a research outlook. Comput. Security 14(7), 645\u2013651 (1995). https:\/\/doi.org\/10.1016\/0167-4048(95)00024-0","journal-title":"Comput. Security"},{"key":"480_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116429","volume":"193","author":"W Hilal","year":"2022","unstructured":"Hilal, W., Gadsden, S.A., Yawney, J.: Financial fraud: a review of anomaly detection techniques and recent advances. Exp. Syst. Appl. 193, 116429 (2022). https:\/\/doi.org\/10.1016\/j.eswa.2021.116429","journal-title":"Exp. Syst. Appl."},{"issue":"6","key":"480_CR13","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1016\/j.clsr.2009.09.005","volume":"25","author":"P Hunton","year":"2009","unstructured":"Hunton, P.: The growing phenomenon of crime and the internet: a cybercrime execution and analysis model. Comput. Law & Security Rev 25(6), 528\u2013535 (2009). https:\/\/doi.org\/10.1016\/j.clsr.2009.09.005","journal-title":"Comput. Law & Security Rev"},{"key":"480_CR14","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/j.future.2019.09.029","volume":"102","author":"L Yang","year":"2020","unstructured":"Yang, L., Song, J., Hu, Z., Guo, J., Yang, Y.: Deep learning for credit card fraud detection in e-commerce. Futur. Gener. Comput. Syst. 102, 269\u2013282 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"480_CR15","first-page":"104","volume":"96","author":"HPY Ho","year":"2018","unstructured":"Ho, H.P.Y., Liu, B.: Deep learning for financial anomaly detection: A case study. Expert Syst. Appl. 96, 104\u2013115 (2018)","journal-title":"Expert Syst. Appl."},{"key":"480_CR16","volume":"124","author":"Y Zhao","year":"2019","unstructured":"Zhao, Y., Zhang, X., Abbassi, H.A., Yang, Z.: An integrated DNN model for financial fraud detection. Decis. Support Syst. 124, 113142 (2019)","journal-title":"Decis. Support Syst."},{"key":"480_CR17","unstructured":"Tao, S.S., Liu, J.J., Lin, T.C.: Comparative study of machine learning techniques in financial fraud detection. J. Financial Crime 27(2), 392\u2013407 (2020)"},{"issue":"2","key":"480_CR18","first-page":"406","volume":"36","author":"K De","year":"2009","unstructured":"De, K., Chin, K.-S.: Credit card fraud detection using artificial neural network. Expert Syst. Appl. 36(2), 406\u2013411 (2009)","journal-title":"Expert Syst. Appl."},{"key":"480_CR19","unstructured":"Li, L., Huang, P.: A banking fraud detection model with deep neural network. International Conference on Artificial Intelligence and Security, 56\u201365 (2018)"},{"issue":"6","key":"480_CR20","first-page":"566","volume":"38","author":"M Baumann","year":"2019","unstructured":"Baumann, M., Meier, S.M., Rudin, C., Stolpe, M.: Deep neural networks for direct financial forecasting. J. Forecast. 38(6), 566\u2013578 (2019)","journal-title":"J. Forecast."},{"key":"480_CR21","unstructured":"Xiao, L., Yang, K., Qiu, K., Liu, B.: A credit fraud detection model based on fully convolutional neural network. International Conference on Artificial Intelligence and Security, 31\u201345 (2017)"},{"issue":"6","key":"480_CR22","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1175\/1520-0493(1974)102<0409:TSOMCF>2.0.CO;2","volume":"102","author":"CE Leith","year":"1974","unstructured":"Leith, C.E.: Theoretical skill of monte-carlo and conventional ensemble forecasting techniques. Mon. Weather Rev. 102(6), 409\u2013418 (1974)","journal-title":"Mon. Weather Rev."},{"issue":"5","key":"480_CR23","doi-asserted-by":"publisher","first-page":"1155","DOI":"10.1175\/MWR2906.1","volume":"133","author":"AE Raftery","year":"2005","unstructured":"Raftery, A.E., Gneiting, T., Balabdaoui, F., Polakowski, M.: Using bayesian model averaging to calibrate forecast ensembles. Mon. Weather Rev. 133(5), 1155\u20131174 (2005)","journal-title":"Mon. Weather Rev."},{"issue":"12","key":"480_CR24","doi-asserted-by":"publisher","first-page":"3297","DOI":"10.1175\/1520-0493(1997)125<3297:EFANAT>2.0.CO;2","volume":"125","author":"Z Toth","year":"1997","unstructured":"Toth, Z., Kalnay, E.: Ensemble forecasting at ncep and the breeding method. Mon. Weather Rev. 125(12), 3297\u20133319 (1997)","journal-title":"Mon. Weather Rev."},{"issue":"2","key":"480_CR25","first-page":"863","volume":"24","author":"H Zhang","year":"2020","unstructured":"Zhang, H., Tarbell, M.A., Michalak, A.M., Zhang, Y., Collier, N.T.: Ensemble forecasting in hydrology: review, challenges, and future directions. Hydrol. Earth Syst. Sci. 24(2), 863\u2013889 (2020)","journal-title":"Hydrol. Earth Syst. Sci."},{"issue":"7","key":"480_CR26","first-page":"2363","volume":"15","author":"KJ Beven","year":"2011","unstructured":"Beven, K.J., Smith, P.J.: Conceptual and practical aspects of uncertainty estimation using a rainfall-runoff model and ensemble kalman filter. Hydrol. Earth Syst. Sci. 15(7), 2363\u20132378 (2011)","journal-title":"Hydrol. Earth Syst. Sci."},{"issue":"6","key":"480_CR27","doi-asserted-by":"publisher","first-page":"1312","DOI":"10.1175\/1520-0493(1997)125<1312:VOERSR>2.0.CO;2","volume":"125","author":"TM Hamill","year":"1997","unstructured":"Hamill, T.M., Colucci, S.J.: Verification of Eta-RSM short-range ensemble forecasts. Mon. Weather Rev. 125(6), 1312\u20131327 (1997). https:\/\/doi.org\/10.1175\/1520-0493(1997)125<1312:VOERSR>2.0.CO;2","journal-title":"Mon. Weather Rev."},{"issue":"625","key":"480_CR28","first-page":"219","volume":"133","author":"R Buizza","year":"2007","unstructured":"Buizza, R., Leutbecher, M., Grell, G., Palmer, T.N.: Potential use of an ensemble of analyses in the ECMWF ensemble prediction system. Q. J. R. Meteorol. Soc. 133(625), 219\u2013237 (2007)","journal-title":"Q. J. R. Meteorol. Soc."},{"key":"480_CR29","first-page":"193","volume":"1","author":"P Courtier","year":"1994","unstructured":"Courtier, P., Freydier, C., Geleyn, J.-F., Rabier, F., Rochas, M.: The ARPEGE project at METEO-france. ECMWF Seminar Proceed. 1, 193\u2013231 (1994)","journal-title":"ECMWF Seminar Proceed."},{"issue":"1","key":"480_CR30","first-page":"3","volume":"26","author":"HW Wang","year":"2017","unstructured":"Wang, H.W., Li, P., Deng, Y.F., Zhao, C.: Ensemble learning: a review. J. Intell. Syst. 26(1), 3\u201323 (2017)","journal-title":"J. Intell. Syst."},{"issue":"3","key":"480_CR31","first-page":"813","volume":"32","author":"G Sermpinis","year":"2016","unstructured":"Sermpinis, G., Gregoriou, A.: Forecasting high-frequency financial time series: a review of empirical and quantitative modelling techniques under microstructural noise. Int. J. Forecast. 32(3), 813\u2013831 (2016)","journal-title":"Int. J. Forecast."},{"key":"480_CR32","first-page":"111","volume":"107","author":"JH Yoo","year":"2018","unstructured":"Yoo, J.H., Lee, J.C.: Forecasting daily stock prices using LSTM recurrent neural networks. Expert Syst. Appl. 107, 111\u2013122 (2018)","journal-title":"Expert Syst. Appl."},{"key":"480_CR33","volume":"214","author":"B Liu","year":"2021","unstructured":"Liu, B., Yang, Y.: Ensemble of deep neural networks for financial time series forecasting: an empirical study. Knowl.-Based Syst. 214, 106697 (2021)","journal-title":"Knowl.-Based Syst."}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00480-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-023-00480-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00480-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T04:08:13Z","timestamp":1744171693000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-023-00480-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,4]]},"references-count":33,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["480"],"URL":"https:\/\/doi.org\/10.1007\/s11416-023-00480-3","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,4]]},"assertion":[{"value":"30 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 May 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"No code availability.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}