Cybersecurity threats in FinTech: A systematic review

D Javaheri, M Fahmideh, H Chizari, P Lalbakhsh… - Expert Systems with …, 2024 - Elsevier
The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI)
advancements have given rise to sophisticated cyber threats that traditional methods cannot …

Research trends, challenges, and emerging topics in digital forensics: A review of reviews

F Casino, TK Dasaklis, GP Spathoulas… - IEEE …, 2022 - ieeexplore.ieee.org
Due to its critical role in cybersecurity, digital forensics has received significant attention from
researchers and practitioners alike. The ever increasing sophistication of modern …

[HTML][HTML] APTMalInsight: Identify and cognize APT malware based on system call information and ontology knowledge framework

W Han, J Xue, Y Wang, F Zhang, X Gao - Information Sciences, 2021 - Elsevier
APT attacks have posed serious threats to the security of cyberspace nowadays which are
usually tailored for specific targets. Identification and understanding of APT attacks remains …

HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection

M Botacin, MZ Alves, D Oliveira, A Grégio - Expert Systems with …, 2022 - Elsevier
Antiviruses (AVs) are computing-intensive applications that rely on constant monitoring of
OS events and on applying pattern matching procedures on binaries to detect malware. In …

Challenges and pitfalls in malware research

M Botacin, F Ceschin, R Sun, D Oliveira, A Grégio - Computers & Security, 2021 - Elsevier
As the malware research field became more established over the last two decades, new
research questions arose, such as how to make malware research reproducible, how to …

Antiviruses under the microscope: A hands-on perspective

M Botacin, FD Domingues, F Ceschin, R Machnicki… - Computers & …, 2022 - Elsevier
AntiViruses (AVs) are the main defense line against attacks for most users and much
research has been done about them, especially proposing new detection procedures that …

Detection and classification of advanced persistent threats and attacks using the support vector machine

WL Chu, CJ Lin, KN Chang - Applied Sciences, 2019 - mdpi.com
Traditional network attack and hacking models are constantly evolving to keep pace with the
rapid development of network technology. Advanced persistent threat (APT), usually …

CMD: co-analyzed iot malware detection and forensics via network and hardware domains

Z Zhao, Z Li, J Yu, F Zhang, X **e… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the widespread use of Internet of Things (IoT) devices, malware detection has become
a hot spot for both academic and industrial communities. Existing approaches can be …

Terminator: A Secure Coprocessor to Accelerate Real-Time AntiViruses Using Inspection Breakpoints

M Botacin, FB Moreira, POA Navaux, A Grégio… - ACM Transactions on …, 2022 - dl.acm.org
AntiViruses (AVs) are essential to face the myriad of malware threatening Internet users. AVs
operate in two modes: on-demand checks and real-time verification. Software-based real …

Review of human decision-making during computer security incident analysis

JM Spring, P Illari - Digital Threats: Research and Practice, 2021 - dl.acm.org
We review practical advice on decision-making during computer security incident response.
Scope includes standards from the IETF, ISO, FIRST, and the US intelligence community. To …