Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives

N Sun, M Ding, J Jiang, W Xu, X Mo… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …

Cybersecurity threats in FinTech: A systematic review

D Javaheri, M Fahmideh, H Chizari, P Lalbakhsh… - Expert Systems with …, 2024 - Elsevier
The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI)
advancements have given rise to sophisticated cyber threats that traditional methods cannot …

Internet of things: Evolution, concerns and security challenges

P Malhotra, Y Singh, P Anand, DK Bangotra, PK Singh… - Sensors, 2021 - mdpi.com
The escalated growth of the Internet of Things (IoT) has started to reform and reshape our
lives. The deployment of a large number of objects adhered to the internet has unlocked the …

[HTML][HTML] Analysis of financial technology acceptance of peer to peer lending (P2P lending) using extended technology acceptance model (TAM)

GA Putri, AK Widagdo, D Setiawan - Journal of Open Innovation …, 2023 - Elsevier
This study aimed to find out the effect of data security & privacy and quality of administrative
services on acceptance of peer to peer lending in Central Java using extended Technology …

FinTech and commercial banks' performance in China: A leap forward or survival of the fittest?

X Chen, X You, V Chang - Technological Forecasting and Social Change, 2021 - Elsevier
As the impacts of the COVID-19 pandemic play out globally, the banking industry has been
affected in both positive and negative ways, with the crisis creating both opportunities and …

A tree-based stacking ensemble technique with feature selection for network intrusion detection

M Rashid, J Kamruzzaman, T Imam, S Wibowo… - Applied …, 2022 - Springer
Several studies have used machine learning algorithms to develop intrusion systems (IDS),
which differentiate anomalous behaviours from the normal activities of network systems. Due …

Examining factors that boost intention and loyalty to use Fintech post-COVID-19 lockdown as a new normal behavior

MTH Le - Heliyon, 2021 - cell.com
This study predicts factors affecting the tendency to use financial technology (Fintech)
services post-COVID-19 lockdown as a new normal behavior. Fintech services have …

A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems

M Imran, HUR Siddiqui, A Raza, MA Raza… - Computers & …, 2023 - Elsevier
Cybersecurity incident response is a very crucial part of the cybersecurity management
system. Adversaries emerge and evolve with new cybersecurity tactics, techniques, and …

Financial technology: a review of extant literature

V Sangwan, P Prakash, S Singh - Studies in Economics and Finance, 2020 - emerald.com
Purpose This paper aims to undertake a thematic review of academic papers on financial
technology (FinTech) to identify three broad categories for the purpose of classifying extant …

Assessing mitre att&ck risk using a cyber-security culture framework

A Georgiadou, S Mouzakitis, D Askounis - Sensors, 2021 - mdpi.com
The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge)
Framework provides a rich and actionable repository of adversarial tactics, techniques, and …