Further reading
The following bullets provide you with some additional reading that you may find useful in understanding the materials in this chapter:
- Discover how deep learning is already being used to extract information from ID cards: ID Card Digitization and Information Extraction using Deep Learning – A Review: https://nanonets.com/blog/id-card-digitization-deep-learning/
- Understand how organizations suffer phishing attacks: How to Prevent Phishing on an Organizational Level: https://www.tsp.me/blog/cyber-security/how-to-prevent-phishing-on-an-organizational-level/
- Uncover Ponzi schemes using ML techniques: Data-driven Smart Ponzi Scheme Detection at https://arxiv.org/pdf/2108.09305.pdf and Evaluating Machine-Learning Techniques for Detecting Smart Ponzi Schemes at https://ieeexplore.ieee.org/document/9474794
- Read about the man who did sell the Brooklyn Bridge and other monuments: Meet the Conman Who Sold the Brooklyn Bridge — Many Times Over...