Cybersecurity threats in FinTech: A systematic review

D Javaheri, M Fahmideh, H Chizari, P Lalbakhsh… - Expert Systems with …, 2024 - Elsevier
The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI)
advancements have given rise to sophisticated cyber threats that traditional methods cannot …

[HTML][HTML] Time series prediction in industry 4.0: a comprehensive review and prospects for future advancements

N Kashpruk, C Piskor-Ignatowicz, J Baranowski - Applied Sciences, 2023 - mdpi.com
Time series prediction stands at the forefront of the fourth industrial revolution (Industry 4.0),
offering a crucial analytical tool for the vast data streams generated by modern industrial …

Group decision on rationalizing disease analysis using novel distance measure on Pythagorean fuzziness

B Baranidharan, J Liu, GS Mahapatra… - Complex & Intelligent …, 2024 - Springer
Despite the fact that several technologies have been developed to assist healthcare workers
in reducing errors and improving accuracy in illness diagnosis, there is still substantial …

Botnets unveiled: A comprehensive survey on evolving threats and defense strategies

M Asadi, MAJ Jamali, A Heidari… - Transactions on …, 2024 - Wiley Online Library
Botnets have emerged as a significant internet security threat, comprising networks of
compromised computers under the control of command and control (C&C) servers. These …

Edge propagation for link prediction in requirement-cyber threat intelligence knowledge graph

Y Zhang, J Chen, Z Cheng, X Shen, J Qin, Y Han… - Information Sciences, 2024 - Elsevier
Critical information infrastructure (CII) is a critical component of national socioeconomic
systems and one of the primary targets of cyberattacks. Unfortunately, CII's security …

DoS/DDoS attacks in Software Defined Networks: Current situation, challenges and future directions

MA Setitra, M Fan, I Benkhaddra… - Computer …, 2024 - Elsevier
Abstract Software-Defined Network (SDN) is a perception of networking that separates the
network into different layers responsible for applications, control, and data, thus providing a …

Enhancing medical image reclamation for chest samples using B-coefficients, DT-CWT and EPS algorithm

BPP Kumar, PKB Rangaiah, R Augustine - IEEE Access, 2023 - ieeexplore.ieee.org
This paper introduces a novel approach for medical image reclamation, specifically focusing
on enhancing chest image resolution. The proposed method introduces the Dual-Tree …

Knowledge-based anomaly detection: Survey, challenges, and future directions

AQ Khan, S El Jaouhari, N Tamani, L Mroueh - Engineering Applications of …, 2024 - Elsevier
Due to the rapidly increasing number of Internet-connected objects, a huge amount of data
is created, stored, and shared. Depending on the use case, this data is visualized, cleaned …

Lifelong continual learning for anomaly detection: New challenges, perspectives, and insights

K Faber, R Corizzo, B Sniezynski, N Japkowicz - IEEE Access, 2024 - ieeexplore.ieee.org
Anomaly detection is of paramount importance in many real-world domains characterized by
evolving behavior, such as monitoring cyber-physical systems, human conditions and …

Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network

K Barik, S Misra, L Fernandez-Sanz - International Journal of Information …, 2024 - Springer
Abstract Artificial Intelligence (AI)-based IDS systems are susceptible to adversarial attacks
and face challenges such as complex evaluation methods, elevated false positive rates …