Cybersecurity threats in FinTech: A systematic review

D Javaheri, M Fahmideh, H Chizari, P Lalbakhsh… - Expert Systems with …, 2024 - Elsevier
The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI)
advancements have given rise to sophisticated cyber threats that traditional methods cannot …

Research trends, challenges, and emerging topics in digital forensics: A review of reviews

F Casino, TK Dasaklis, GP Spathoulas… - Ieee …, 2022 - ieeexplore.ieee.org
Due to its critical role in cybersecurity, digital forensics has received significant attention from
researchers and practitioners alike. The ever increasing sophistication of modern …

Challenges and pitfalls in malware research

M Botacin, F Ceschin, R Sun, D Oliveira, A Grégio - Computers & Security, 2021 - Elsevier
As the malware research field became more established over the last two decades, new
research questions arose, such as how to make malware research reproducible, how to …

[HTML][HTML] APTMalInsight: Identify and cognize APT malware based on system call information and ontology knowledge framework

W Han, J Xue, Y Wang, F Zhang, X Gao - Information Sciences, 2021 - Elsevier
APT attacks have posed serious threats to the security of cyberspace nowadays which are
usually tailored for specific targets. Identification and understanding of APT attacks remains …

HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection

M Botacin, MZ Alves, D Oliveira, A Grégio - Expert Systems with …, 2022 - Elsevier
Antiviruses (AVs) are computing-intensive applications that rely on constant monitoring of
OS events and on applying pattern matching procedures on binaries to detect malware. In …

CMD: Co-analyzed IoT malware detection and forensics via network and hardware domains

Z Zhao, Z Li, J Yu, F Zhang, X **e… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the widespread use of Internet of Things (IoT) devices, malware detection has become
a hot spot for both academic and industrial communities. Existing approaches can be …

Detection and classification of advanced persistent threats and attacks using the support vector machine

WL Chu, CJ Lin, KN Chang - Applied Sciences, 2019 - mdpi.com
Traditional network attack and hacking models are constantly evolving to keep pace with the
rapid development of network technology. Advanced persistent threat (APT), usually …

Antiviruses under the microscope: A hands-on perspective

M Botacin, FD Domingues, F Ceschin, R Machnicki… - Computers & …, 2022 - Elsevier
AntiViruses (AVs) are the main defense line against attacks for most users and much
research has been done about them, especially proposing new detection procedures that …

Machine learning (in) security: A stream of problems

F Ceschin, M Botacin, A Bifet, B Pfahringer… - … Threats: Research and …, 2024 - dl.acm.org
Machine Learning (ML) has been widely applied to cybersecurity and is considered state-of-
the-art for solving many of the open issues in that field. However, it is very difficult to evaluate …

Review of human decision-making during computer security incident analysis

JM Spring, P Illari - Digital Threats: Research and Practice, 2021 - dl.acm.org
We review practical advice on decision-making during computer security incident response.
Scope includes standards from the IETF, ISO, FIRST, and the US intelligence community. To …