Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …
security defenses to protect against them. The dynamic nature of new-generation threats …
Cybersecurity threats in FinTech: A systematic review
The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI)
advancements have given rise to sophisticated cyber threats that traditional methods cannot …
advancements have given rise to sophisticated cyber threats that traditional methods cannot …
Internet of things: Evolution, concerns and security challenges
The escalated growth of the Internet of Things (IoT) has started to reform and reshape our
lives. The deployment of a large number of objects adhered to the internet has unlocked the …
lives. The deployment of a large number of objects adhered to the internet has unlocked the …
[HTML][HTML] Analysis of financial technology acceptance of peer to peer lending (P2P lending) using extended technology acceptance model (TAM)
This study aimed to find out the effect of data security & privacy and quality of administrative
services on acceptance of peer to peer lending in Central Java using extended Technology …
services on acceptance of peer to peer lending in Central Java using extended Technology …
FinTech and commercial banks' performance in China: A leap forward or survival of the fittest?
As the impacts of the COVID-19 pandemic play out globally, the banking industry has been
affected in both positive and negative ways, with the crisis creating both opportunities and …
affected in both positive and negative ways, with the crisis creating both opportunities and …
A tree-based stacking ensemble technique with feature selection for network intrusion detection
Several studies have used machine learning algorithms to develop intrusion systems (IDS),
which differentiate anomalous behaviours from the normal activities of network systems. Due …
which differentiate anomalous behaviours from the normal activities of network systems. Due …
Examining factors that boost intention and loyalty to use Fintech post-COVID-19 lockdown as a new normal behavior
MTH Le - Heliyon, 2021 - cell.com
This study predicts factors affecting the tendency to use financial technology (Fintech)
services post-COVID-19 lockdown as a new normal behavior. Fintech services have …
services post-COVID-19 lockdown as a new normal behavior. Fintech services have …
A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems
Cybersecurity incident response is a very crucial part of the cybersecurity management
system. Adversaries emerge and evolve with new cybersecurity tactics, techniques, and …
system. Adversaries emerge and evolve with new cybersecurity tactics, techniques, and …
Financial technology: a review of extant literature
Purpose This paper aims to undertake a thematic review of academic papers on financial
technology (FinTech) to identify three broad categories for the purpose of classifying extant …
technology (FinTech) to identify three broad categories for the purpose of classifying extant …
Assessing mitre att&ck risk using a cyber-security culture framework
A Georgiadou, S Mouzakitis, D Askounis - Sensors, 2021 - mdpi.com
The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge)
Framework provides a rich and actionable repository of adversarial tactics, techniques, and …
Framework provides a rich and actionable repository of adversarial tactics, techniques, and …