Cybersecurity threats in FinTech: A systematic review

•Adopting PRISMA methodology to investigate cybersecurity threats in FinTech.•Identifying the most effective defense strategies to negate the threats by examining 74 published papers.•Comparing the threats and defenses from different perspectives, including their impacts and technical details.•Propo...

Full description

Saved in:
Bibliographic Details
Published inExpert systems with applications Vol. 241; p. 122697
Main Authors Javaheri, Danial, Fahmideh, Mahdi, Chizari, Hassan, Lalbakhsh, Pooia, Hur, Junbeom
Format Journal Article
LanguageEnglish
Published Elsevier Ltd 01.05.2024
Subjects
Online AccessGet full text

Cover

Loading…
Abstract •Adopting PRISMA methodology to investigate cybersecurity threats in FinTech.•Identifying the most effective defense strategies to negate the threats by examining 74 published papers.•Comparing the threats and defenses from different perspectives, including their impacts and technical details.•Proposing a novel and refined taxonomy of security threats and defense strategies in FinTech.•Recommending future research directions to address existing security gaps in current FinTech systems. The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI) advancements have given rise to sophisticated cyber threats that traditional methods cannot counteract. Cyber threats are extremely critical in financial technology (FinTech) as a data-centric sector expected to provide 24/7 services. This paper introduces a novel and refined taxonomy of security threats in FinTech and conducts a comprehensive systematic review of defensive strategies. Through PRISMA methodology applied to 74 selected studies and topic modeling, we identified 11 central cyber threats, with 43 papers detailing them, and pinpointed 9 corresponding defense strategies, as covered in 31 papers. This in-depth analysis offers invaluable insights for stakeholders ranging from banks and enterprises to global governmental bodies, highlighting both the current challenges in FinTech and effective countermeasures, as well as directions for future research.
AbstractList •Adopting PRISMA methodology to investigate cybersecurity threats in FinTech.•Identifying the most effective defense strategies to negate the threats by examining 74 published papers.•Comparing the threats and defenses from different perspectives, including their impacts and technical details.•Proposing a novel and refined taxonomy of security threats and defense strategies in FinTech.•Recommending future research directions to address existing security gaps in current FinTech systems. The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI) advancements have given rise to sophisticated cyber threats that traditional methods cannot counteract. Cyber threats are extremely critical in financial technology (FinTech) as a data-centric sector expected to provide 24/7 services. This paper introduces a novel and refined taxonomy of security threats in FinTech and conducts a comprehensive systematic review of defensive strategies. Through PRISMA methodology applied to 74 selected studies and topic modeling, we identified 11 central cyber threats, with 43 papers detailing them, and pinpointed 9 corresponding defense strategies, as covered in 31 papers. This in-depth analysis offers invaluable insights for stakeholders ranging from banks and enterprises to global governmental bodies, highlighting both the current challenges in FinTech and effective countermeasures, as well as directions for future research.
ArticleNumber 122697
Author Fahmideh, Mahdi
Hur, Junbeom
Chizari, Hassan
Lalbakhsh, Pooia
Javaheri, Danial
Author_xml – sequence: 1
  givenname: Danial
  orcidid: 0000-0002-7275-2370
  surname: Javaheri
  fullname: Javaheri, Danial
  email: javaheri@korea.ac.kr
  organization: Department of Computer Science and Engineering, Korea University, Seoul 02841, Republic of Korea
– sequence: 2
  givenname: Mahdi
  surname: Fahmideh
  fullname: Fahmideh, Mahdi
  email: mahdi.fahmideh@usq.edu.au
  organization: School of Business, University of Southern Queensland, Springfield, QLD 4300, Australia
– sequence: 3
  givenname: Hassan
  orcidid: 0000-0002-6253-1822
  surname: Chizari
  fullname: Chizari, Hassan
  email: hchizari@glos.ac.uk
  organization: School of Business, Computing and Social Sciences, University of Gloucestershire, The Park Campus, Cheltenham GL50 2RH, Gloucester, UK
– sequence: 4
  givenname: Pooia
  orcidid: 0000-0001-9267-2610
  surname: Lalbakhsh
  fullname: Lalbakhsh, Pooia
  email: pooia.lalbakhsh@monash.edu
  organization: Department of Data Science and Artificial Intelligence, Faculty of Information Technology, Monash University, Clayton, VIC 3168, Australia
– sequence: 5
  givenname: Junbeom
  orcidid: 0000-0002-4823-4194
  surname: Hur
  fullname: Hur, Junbeom
  email: jbhur@korea.ac.kr
  organization: Department of Computer Science and Engineering, Korea University, Seoul 02841, Republic of Korea
BookMark eNp9z7FOwzAQxnELFYm28AJMeYGEs53kHMSCKgpIlVjKbLn2RXXVJsg2VHl7UpWJodNN_9P3m7FJ13fE2D2HggOvH3YFxaMpBAhZcCHqBq_YlCuUeY2NnLApNBXmJcfyhs1i3AFwBMApqxbDhkIk-x18GrK0DWRSzHyXLX23Jrt9zJ6zOMREB5O8zQL9eDresuvW7CPd_d05-1y-rBdv-erj9X3xvMqtBEg58VIpJGWasnXWWRRt1WAL5aYSxinkqKjmUBvTKLRSQOsclK6UQnLCeiPnTJ3_2tDHGKjV1qdxR9-lYPxec9Anvt7pE1-f-PrMH1PxL_0K_mDCcDl6Okc0okZo0NF66iw5H8gm7Xp_Kf8F8wp1mQ
CitedBy_id crossref_primary_10_1109_ACCESS_2024_3439629
crossref_primary_10_55643_fcaptp_1_60_2025_4571
crossref_primary_10_1016_j_heliyon_2024_e37893
crossref_primary_10_4236_jis_2025_161006
crossref_primary_10_55267_rtic_16176
crossref_primary_10_32628_CSEIT25111210
crossref_primary_10_1016_j_digbus_2024_100099
crossref_primary_10_1016_j_cose_2024_104274
crossref_primary_10_1057_s41599_024_03952_z
crossref_primary_10_1007_s10115_025_02382_w
crossref_primary_10_1051_itmconf_20257602002
crossref_primary_10_24136_oc_3283
crossref_primary_10_1109_ACCESS_2024_3478830
crossref_primary_10_1016_j_iot_2024_101478
Cites_doi 10.1016/j.techfore.2022.121686
10.1016/S1361-3723(16)30011-2
10.1016/j.jcorpfin.2021.101941
10.1080/0960085X.2021.1944823
10.1186/s42162-021-00139-7
10.1109/TDSC.2016.2580509
10.1016/j.future.2021.12.013
10.1016/j.procs.2022.09.352
10.1145/3411496.3421224
10.1109/TSG.2015.2495133
10.1145/3379542
10.1016/j.dss.2021.113650
10.1016/j.jisa.2014.09.005
10.1080/07421222.2018.1440766
10.1016/j.im.2023.103856
10.1016/j.tre.2021.102553
10.1016/j.eswa.2023.119976
10.1109/ACCESS.2021.3077295
10.1016/j.im.2022.103661
10.1145/3338906.3340441
10.1016/j.ipm.2020.102397
10.1016/j.cose.2021.102239
10.1016/j.eswa.2022.118143
10.1016/j.clsr.2016.11.015
10.1016/j.future.2018.06.055
10.1145/3352020.3352026
10.1016/j.rie.2022.07.001
10.1155/2019/6716918
10.1016/j.adhoc.2023.103259
10.1016/j.cosrev.2020.100233
10.1016/j.jnca.2017.10.011
10.1016/j.procs.2016.08.071
10.1016/j.eap.2022.05.019
10.1109/ACCESS.2018.2884964
10.1016/j.future.2016.01.006
10.1016/j.jksuci.2022.08.029
10.1080/23270012.2018.1528900
10.1016/j.cose.2022.102832
10.1057/s41284-019-00198-2
10.1016/j.jfranklin.2021.07.044
10.1016/j.eswa.2023.120756
10.1109/ICEES51510.2021.9383720
10.1016/j.im.2020.103385
10.1145/3425780
10.1145/3319615
10.1145/3483596
10.1136/bmj.b2700
10.1016/j.cose.2020.102019
10.1016/j.cose.2021.102221
10.1016/j.patrec.2021.11.009
10.1016/j.ipm.2023.103273
10.1016/S1353-4858(15)70001-2
10.1145/3178370
10.1109/TNSM.2021.3112056
10.1145/3199674
10.1016/j.future.2019.03.041
10.1080/14697688.2020.1849779
10.1016/j.cose.2021.102258
10.1145/3530813
10.1016/j.ijcip.2019.100312
10.1016/j.jksuci.2021.12.016
10.1016/j.is.2020.101699
10.1016/j.cose.2022.102756
10.1016/j.chb.2015.08.039
10.1016/j.sysarc.2021.102143
10.1016/j.eswa.2020.113843
10.1145/3199673
10.1057/s41265-017-0047-5
10.1108/SCM-03-2018-0148
10.1016/j.jeconc.2023.100012
10.1016/j.eswa.2022.118042
10.1080/07421222.2018.1440768
10.1145/3372823
10.1016/j.jisa.2022.103167
10.1016/j.irfa.2022.102023
10.1109/ACCESS.2020.3019330
10.1016/j.joitmc.2023.100010
10.1016/j.cose.2021.102316
10.1002/jsc.2404
10.1109/TII.2020.3043458
10.1016/j.cose.2017.09.013
10.1109/ACCESS.2020.2970430
10.1109/TIFS.2021.3054968
10.1016/j.jsis.2018.10.002
10.1109/TIFS.2016.2632071
10.1109/TSG.2020.2977088
10.1145/3391195
10.1016/j.compeleceng.2021.107363
10.1145/3368308.3415366
10.1109/GreenTech48523.2021.00101
10.1016/j.eswa.2023.120404
10.1016/j.ins.2023.01.067
10.1016/S0167-9236(99)00069-X
10.1109/TCAD.2021.3099084
10.1016/j.pmcj.2017.04.005
10.1080/23742917.2017.1386483
10.3390/info9050110
10.1080/10919392.2019.1552747
10.1016/j.eswa.2022.118404
10.1016/j.aeue.2017.04.003
10.1016/S1361-3723(16)30091-4
10.1109/ACCESS.2020.2970466
10.1145/3205230.3205234
10.1016/j.sysarc.2020.101861
10.1080/09537287.2019.1631460
10.1016/S1361-3723(21)00089-0
10.1002/j.1538-7305.1948.tb01338.x
10.1016/j.future.2019.02.013
10.1016/j.cose.2021.102536
10.1016/j.cose.2017.08.003
ContentType Journal Article
Copyright 2023 Elsevier Ltd
Copyright_xml – notice: 2023 Elsevier Ltd
DBID AAYXX
CITATION
DOI 10.1016/j.eswa.2023.122697
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1873-6793
ExternalDocumentID 10_1016_j_eswa_2023_122697
S0957417423031998
GroupedDBID --K
--M
.DC
.~1
0R~
13V
1B1
1RT
1~.
1~5
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
9JO
AAAKF
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AARIN
AAXUO
AAYFN
ABBOA
ABFNM
ABMAC
ABMVD
ABUCO
ABYKQ
ACDAQ
ACGFS
ACHRH
ACNTT
ACRLP
ACZNC
ADBBV
ADEZE
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGJBL
AGUBO
AGUMN
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJOXV
ALEQD
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
APLSM
AXJTR
BJAXD
BKOJK
BLXMC
BNSAS
CS3
DU5
EBS
EFJIC
EFLBG
EO8
EO9
EP2
EP3
F5P
FDB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HAMUX
IHE
J1W
JJJVA
KOM
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
ROL
RPZ
SDF
SDG
SDP
SDS
SES
SEW
SPC
SPCBC
SSB
SSD
SSL
SST
SSV
SSZ
T5K
TN5
~G-
29G
AAAKG
AAQXK
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ABKBG
ABWVN
ABXDB
ACNNM
ACRPL
ACVFH
ADCNI
ADJOM
ADMUD
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
ASPBG
AVWKF
AZFZN
BNPGV
CITATION
EJD
FEDTE
FGOYB
G-2
HLZ
HVGLF
HZ~
LG9
LY1
LY7
M41
R2-
RIG
SBC
SET
SSH
WUQ
XPP
ZMT
ID FETCH-LOGICAL-c300t-e14887e8a94fdcdc72f597f04b52ad87178e6106aa987c320fdd04d43231e76b3
IEDL.DBID .~1
ISSN 0957-4174
IngestDate Tue Jul 01 04:06:18 EDT 2025
Thu Apr 24 23:10:24 EDT 2025
Sat Feb 17 16:07:28 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Financial technology
Data privacy
Cyber-attacks
Banking trojan
Business sustainability
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c300t-e14887e8a94fdcdc72f597f04b52ad87178e6106aa987c320fdd04d43231e76b3
ORCID 0000-0001-9267-2610
0000-0002-4823-4194
0000-0002-6253-1822
0000-0002-7275-2370
ParticipantIDs crossref_citationtrail_10_1016_j_eswa_2023_122697
crossref_primary_10_1016_j_eswa_2023_122697
elsevier_sciencedirect_doi_10_1016_j_eswa_2023_122697
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-05-01
2024-05-00
PublicationDateYYYYMMDD 2024-05-01
PublicationDate_xml – month: 05
  year: 2024
  text: 2024-05-01
  day: 01
PublicationDecade 2020
PublicationTitle Expert systems with applications
PublicationYear 2024
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Lee, de Guzman, Wang, Gupta, Rao (b0450) 2022; 121
Clark, Leblanc, Knight (b0395) 2011; 2011
Millions of records leaked as T-Mobile is breached for the sixth time in four years
Lee (b0355) 2015
2021.
Hassani, Huang, Silva (b0570) Oct. 2018; 5
Ahmad (b0430) 2021; 54
Javaheri, Hosseinzadeh, Rahmani (b0110) 2018; 6
Chao, Ran, Chen, Li, Qian, Ergu (b0665) 2022; 80
Davies, Macfarlane, Buchanan (b0190) 2020; 33
Sha, Xiao, Huang, Chen, Wang (b0235) Jun. 2019; 18
Bunnell, Osei-Bryson, Yoon (b0640) Mar. 2021; 165
Ashta, Herrmann (b0020) May 2021; 30
Prachi, Sharma (b0475) Nov. 2023; 230
Guo, Zhang, Liu, Wang, Ding (b0545) Dec. 2021; 151
Botacin, De Geus, grégio (b0350) Jul. 2018; 51
Wang, Yang, Zhong (b0145) 2021; 358
Black, Gondal, Layton (b0105) 2018; 77
Sharifian, Barekatain, Quintana, Beheshti, Safi-Esfahani (b0155) Oct. 2023; 228
Airehrour, Vasudevan Nair, Madanian (b0405) 2018; 9
Javaheri, Lalbakhsh, Hosseinzadeh (b0240) 2021; 9
Gan (b0330) Jul. 2019; 53
vol. 2016, no. 2, pp. 1–3, Feb. 2016, 10.1016/S1361-3723(16)30011-2.
vol. 16, no. 2, pp. 261–308, [Online]. Available: https://heinonline.org/HOL/P?h=hein.journals/ucdbulj16&i=271.
Wang, Ma, Chen (b0415) 2022
Cascavilla, Tamburri, Van Den Heuvel (b0630) 2021; 105
Fahmideh (b0510) Dec. 2022; 55
Yuan, Wu (b0325) 2021; 104
Madan, Sofat, Bansal (b0265) 2022
Singh, Singh (b0455) 2021; 112
Taheri, Shojafar, Alazab, Tafazolli (b0270) 2021; 17
Hernández, Öztürk, Sittón, Rodríguez (b0495) 2019; 1047
Huang, Siegel, Madnick (b0065) Jul. 2018; 51
Sori, Golsorkhtabaramiri, Sori (b0520) 2021; 2021
Du, Pan, Leidner, Ying (b0550) Mar. 2019; 28
Mustafa, Xu, Sadeghi, Schulz (b0160) May 2018; 15
Hadnagy (b0340) 2018
Yang, Xia, Yang (b0290) 2020; 170
Al Hasan (b0685) Jun. 2023; 19
Mehrban (b0070) 2020; 8
Zimba, Wang, Mulenga (b0565) Jan. 2019; 29
Karim, Naz, Naeem, Vigne (b0050) 2022; 75
Hubbard, Seierse (b0645) 2016
Bai, Han, Mezzour, Pierazzi, Subrahmanian (b0675) 2021; 18
Li, Wang, Ni (b0335) 2022; 104
Y. Wang, M. McCoey, and Q. Hu, “Developing an Undergraduate Course Curriculum for Ethical Hacking,”
Stellios, Kotzanikolaou, Grigoriadis (b0275) 2021; 107
Gai, Qiu, Sun (b0060) 2018; 103
vol. 21, no. 3, Apr. 2018, 10.1145/3178370.
Muthukannan, Tan, Gozman, Johnson (b0005) Dec. 2020; 57
Button, Hock, Shepherd, Gilmour (b0410) Sep. 2023; 1
Ali, Azad, Parreno Centeno, Hao, van Moorsel (b0420) 2019; 100
M. Carminati, M. Polino, A. Continella, A. Lanzi, F. Maggi, and S. Zanero, “Security Evaluation of a Banking Fraud Analysis System,”
Han, Park, Lee (b0285) 2019; 26
Y. Hong, H. Kwon, J. Lee, and J. Hur, “A practical de-mixing algorithm for bitcoin mixing services.” in
Golait, Hubballi (b0165) Mar. 2017; 12
Wang, Hui, Yiu, Wang, Fang (b0300) Aug. 2017; 39
Sullivan, Burger (b0635) 2017; 33
N. Burow, R. Burrow, R. Khazan, H. Shrobe, and B. C. Ward, “Moving Target Defense Considerations in Real-Time Safety- and Mission-Critical Systems,” in
Currie, Gozman, Seddon (b0670) Dec. 2018; 33
Grobys (b0560) Aug. 2021; 21
vol. 35, no. 1, pp. 145–179, Jan. 2018, 10.1080/07421222.2018.1440768.
D. Gozman, J. Liebenau, and J. Mangan, “The Innovation Mechanisms of Fintech Start-Ups: Insights from SWIFT’s Innotribe Competition,”
Liang, Zhao, Luo, Weller, Dong (b0295) 2017; 8
Berdik, Otoum, Schmidt, Porter, Jararweh (b0540) Jan. 2021; 58
Liberati (b0090) 2009; 339
Naik, Jenkins, Savage, Yang, Boongoen, Iam-On (b0460) 2021; 37
Bajunaied, Hussin, Kamarudin (b0055) Mar. 2023; 9
Syed, Shah, Trujillo-Rasua, Doss (b0600) 2022; 112
Pisoni, Díaz-Rodríguez (b0660) May 2023; 60
Rio (b0380) 2016; 10
S. V. Kumar, G. A. A. Mary, P. Suresh, and R. Uthirasamy, “Investigation On Cyber-Attacks Against In-Vehicle Network,” in
Jiang, Lora, Chattopadhyay (b0255) May 2020; 20
Ge, Lalbakhsh, Isai, Lenskiy, Suominen (b0040) Jan. 2022; 55
Hou, Wang (b0210) Nov. 2020; 98
de Leon, Jillepalli, House, Alves-Foss, Sheldon (b0615) Oct. 2018; 34
J. Freund, Jones, Jack,, “Measuring and managing information risk : a FAIR approach.” 2015. [Online]. Available: http://www.books24x7.com/marc.asp?bookid=73433.
in MTD’20. New York, NY, USA: Association for Computing Machinery, 2020, pp. 81–89. 10.1145/3411496.3421224.
Chen, Pendleton, Njilla, Xu (b0075) Jun. 2020; 53
Sharmeen, Ahmed, Huda, Koçer, Hassan (b0195) 2020; 8
Erola, Agrafiotis, Goldsmith, Creese (b0320) 2022; 67
Alahmari, Renaud, Omoronyia (b0625) 2022; no. 0123456789
Wang, Han, Beynon-Davies (b0580) Mar. 2019; 24
Babun, Aksu, Uluagac (b0470) 2021; 16
Rizvi, Mirkovic, Heidemann, Hardaker, Story (b0180) Dec. 2023; 151
Jing, Wu, Cui (b0465) 2022; 130
pp. 15–20, May 2018, 10.1145/3205230.3205234.
vol. 35, no. 1, pp. 220–265, Jan. 2018, 10.1080/07421222.2018.1440766.
Bollaert, Lopez-de-Silanes, Schwienbacher (b0080) 2021; 68
Grace, Sughasiny (b0680) Dec. 2022; 210
Malaquias, Hwang (b0490) Jan. 2016; 54
2021, pp. 305–311. 10.1109/ICEES51510.2021.9383720.
Rambow, Andorka, Rambow-Hoeschele (b0370) 2020
Dassouki, Safa, Nassar, Hijazi (b0485) Sep. 2017; 70
vol. 53, no. 1, Feb. 2020, 10.1145/3372823.
McDermott, Petrovski, Majdani (b0250) 2018
Noor, Anwar, Amjad, Choo (b0120) 2019; 96
Masoud, Al-Utaibi (b0655) Jun. 2022; 76
Lei, Ngai (b0515) Aug. 2023
HSBC bank and Irish National Lottery among latest DDoS victims
Nasir, Jan, Pamucar, Khan (b0045) Aug. 2023; 224
Almakhour, Sliman, Samhat, Mellouk (b0610) 2023; 35
Ambore, Richardson, Dogan, Apeh, Osselton (b0095) Oct. 2017; 1
Qiu, Gai, Thuraisingham, Tao, Zhao (b0500) 2018; 80
He, Almasifar, Mehbodniya, Javaheri, Webber (b0225) 2022; 36
N. Kaloudi and J. Li, “The AI-Based Cyber Threat Landscape: A Survey,”
Vijayakumar, Shiny Angel (b0170) Dec. 2021; 152
Härting, Bühler, Winter, Gugel (b0220) 2022; 207
Chen, Chen (b0530) Nov. 2022; 207
Soni, Kumar, Mahto, Mangla, Mittal, Lim (b0230) Jul. 2022; 180
Mirsky, Lee (b0030) Jan. 2021; 54
Lee, Assante, Conway (b0280) 2016
Yemini, Dailianas, Florissi, Huberman (b0505) 2000; 28
Peris-Lopez, Martín (b0130) Jun. 2017; 76
Sadok, Welch, Bednar (b0215) 2020; 33
pp. 330–335, Oct. 2020, 10.1145/3368308.3415366.
P. Gomber, R. J. Kauffman, C. Parker, and B. W. Weber, “On the Fintech Revolution: Interpreting the Forces of Innovation, Disruption, and Transformation in Financial Services,”
Vignau, Khoury, Hallé, Hamou-Lhadj (b0260) Jun. 2021; 116
Suegami (b0605) 2022
Venkatachary, Alagappan, Andrews (b0305) 2021; 4
Stallings, Brown (b0100) 2018
Raddatz, Coyne, Menard, Crossler (b0525) 2021; 32
T. Jin
Sindhwani, Hasteer, Behl, Chatterjee, Hamzi (b0575) Sep. 2023; 2023
Suryawanshi, Dutta (b0595) 2022; 157
Paul, Adhikari, Bose (b0585) Sep. 2022; 59
Shillair, Esteve-González, Dutton, Creese, Nagyfejeo, von Solms (b0620) 2022; 119
Pérez-Díaz, Valdovinos, Choo, Zhu (b0140) 2020; 8
Fosso Wamba, Kala Kamdjoug, Epie Bawack, Keogh (b0590) Feb. 2020; 31
FinExpert: Domain-specific test generation for FinTech systems
Doubts remain over whether North Korea was responsible for massive hack of Sony Pictures.
Bai, Han, Mezzour, Pierazzi, Subrahmanian (b0480) May 2021; 18
Al-Hamar, Kolivand, Tajdini, Saba, Ramachandran (b0400) 2021; 94
Xia, Wang, Gauthier, Zhang (b0555) Dec. 2022; 208
Javaheri, Gorgin, Lee, Masdari (b0175) 2023; 626
Min, Ko, Walker, Lee, Kim (b0205) 2022; 41
vol. 2021, no. 9, pp. 1–3, 2021, 10.1016/S1361-3723(21)00089-0.
Molina, Torabi, Sarieddine, Bou-Harb, Bouguila, Assi (b0200) 2022; 19
Khanna, Zavarsky, Lindskog (b0385) 2016; 94
M. Mocanu, “Management of Cyber-Espionage Intrusions,” in
Santini, Gottardi, Baldi, Chiaraluce (b0115) 2019; 2019
Zhang, Upton, Beebe, Choo (b0245) 2020; 32
Xu, Lin, Zhang, Wang (b0310) 2020; 11
Ghafir (b0125) 2018; 89
Keshavarzi, Ghaffary (b0185) 2020; 36
Granger (b0390) 2003
Krombholz, Hobel, Huber, Weippl (b0345) 2015; 22
Varga, Brynielsson, Franke (b0150) 2021; 105
L. J. Trautman, “E-Commerce, Cyber, and Electronic Payment System Risks: Lessons from PayPal,”
Eggenschwiler, Agrafiotis, Nurse (b0315) 2016; 2016
Liebrenz, Schleifer, Buadze, Bhugra, Smith (b0035) 2023; 5
pp. 853–862, Aug. 2019, 10.1145/3338906.3340441.
vol. 2015, no. 1, pp. 1–2, 2015, 10.1016/S1353-4858(15)70001-2.
Shannon (b0440) Jul. 1948; 27
Muthukannan (10.1016/j.eswa.2023.122697_b0005) 2020; 57
10.1016/j.eswa.2023.122697_b0445
Huang (10.1016/j.eswa.2023.122697_b0065) 2018; 51
Sha (10.1016/j.eswa.2023.122697_b0235) 2019; 18
Suegami (10.1016/j.eswa.2023.122697_b0605) 2022
Zhang (10.1016/j.eswa.2023.122697_b0245) 2020; 32
Suryawanshi (10.1016/j.eswa.2023.122697_b0595) 2022; 157
Grace (10.1016/j.eswa.2023.122697_b0680) 2022; 210
Pérez-Díaz (10.1016/j.eswa.2023.122697_b0140) 2020; 8
McDermott (10.1016/j.eswa.2023.122697_b0250) 2018
Pisoni (10.1016/j.eswa.2023.122697_b0660) 2023; 60
Molina (10.1016/j.eswa.2023.122697_b0200) 2022; 19
Davies (10.1016/j.eswa.2023.122697_b0190) 2020; 33
Gan (10.1016/j.eswa.2023.122697_b0330) 2019; 53
10.1016/j.eswa.2023.122697_b0690
Rizvi (10.1016/j.eswa.2023.122697_b0180) 2023; 151
Lei (10.1016/j.eswa.2023.122697_b0515) 2023
Noor (10.1016/j.eswa.2023.122697_b0120) 2019; 96
de Leon (10.1016/j.eswa.2023.122697_b0615) 2018; 34
10.1016/j.eswa.2023.122697_b0435
Malaquias (10.1016/j.eswa.2023.122697_b0490) 2016; 54
Mirsky (10.1016/j.eswa.2023.122697_b0030) 2021; 54
Härting (10.1016/j.eswa.2023.122697_b0220) 2022; 207
Hubbard (10.1016/j.eswa.2023.122697_b0645) 2016
Qiu (10.1016/j.eswa.2023.122697_b0500) 2018; 80
Granger (10.1016/j.eswa.2023.122697_b0390) 2003
Fosso Wamba (10.1016/j.eswa.2023.122697_b0590) 2020; 31
Lee (10.1016/j.eswa.2023.122697_b0450) 2022; 121
Babun (10.1016/j.eswa.2023.122697_b0470) 2021; 16
Hadnagy (10.1016/j.eswa.2023.122697_b0340) 2018
Sharmeen (10.1016/j.eswa.2023.122697_b0195) 2020; 8
Ali (10.1016/j.eswa.2023.122697_b0420) 2019; 100
Singh (10.1016/j.eswa.2023.122697_b0455) 2021; 112
Krombholz (10.1016/j.eswa.2023.122697_b0345) 2015; 22
Karim (10.1016/j.eswa.2023.122697_b0050) 2022; 75
Hassani (10.1016/j.eswa.2023.122697_b0570) 2018; 5
Santini (10.1016/j.eswa.2023.122697_b0115) 2019; 2019
Jiang (10.1016/j.eswa.2023.122697_b0255) 2020; 20
10.1016/j.eswa.2023.122697_b0425
Guo (10.1016/j.eswa.2023.122697_b0545) 2021; 151
Bollaert (10.1016/j.eswa.2023.122697_b0080) 2021; 68
10.1016/j.eswa.2023.122697_b0025
Wang (10.1016/j.eswa.2023.122697_b0145) 2021; 358
Ahmad (10.1016/j.eswa.2023.122697_b0430) 2021; 54
Zimba (10.1016/j.eswa.2023.122697_b0565) 2019; 29
Varga (10.1016/j.eswa.2023.122697_b0150) 2021; 105
Hou (10.1016/j.eswa.2023.122697_b0210) 2020; 98
Clark (10.1016/j.eswa.2023.122697_b0395) 2011; 2011
Al-Hamar (10.1016/j.eswa.2023.122697_b0400) 2021; 94
Sori (10.1016/j.eswa.2023.122697_b0520) 2021; 2021
Sindhwani (10.1016/j.eswa.2023.122697_b0575) 2023; 2023
Javaheri (10.1016/j.eswa.2023.122697_b0175) 2023; 626
Venkatachary (10.1016/j.eswa.2023.122697_b0305) 2021; 4
Lee (10.1016/j.eswa.2023.122697_b0355) 2015
10.1016/j.eswa.2023.122697_b0535
Du (10.1016/j.eswa.2023.122697_b0550) 2019; 28
10.1016/j.eswa.2023.122697_b0015
10.1016/j.eswa.2023.122697_b0135
Vignau (10.1016/j.eswa.2023.122697_b0260) 2021; 116
10.1016/j.eswa.2023.122697_b0375
Button (10.1016/j.eswa.2023.122697_b0410) 2023; 1
10.1016/j.eswa.2023.122697_b0650
Javaheri (10.1016/j.eswa.2023.122697_b0240) 2021; 9
Airehrour (10.1016/j.eswa.2023.122697_b0405) 2018; 9
Botacin (10.1016/j.eswa.2023.122697_b0350) 2018; 51
Liebrenz (10.1016/j.eswa.2023.122697_b0035) 2023; 5
Bunnell (10.1016/j.eswa.2023.122697_b0640) 2021; 165
Wang (10.1016/j.eswa.2023.122697_b0300) 2017; 39
Bai (10.1016/j.eswa.2023.122697_b0480) 2021; 18
Berdik (10.1016/j.eswa.2023.122697_b0540) 2021; 58
Keshavarzi (10.1016/j.eswa.2023.122697_b0185) 2020; 36
Sharifian (10.1016/j.eswa.2023.122697_b0155) 2023; 228
Javaheri (10.1016/j.eswa.2023.122697_b0110) 2018; 6
Min (10.1016/j.eswa.2023.122697_b0205) 2022; 41
Yemini (10.1016/j.eswa.2023.122697_b0505) 2000; 28
Sadok (10.1016/j.eswa.2023.122697_b0215) 2020; 33
Li (10.1016/j.eswa.2023.122697_b0335) 2022; 104
Shannon (10.1016/j.eswa.2023.122697_b0440) 1948; 27
Mehrban (10.1016/j.eswa.2023.122697_b0070) 2020; 8
10.1016/j.eswa.2023.122697_b0365
Al Hasan (10.1016/j.eswa.2023.122697_b0685) 2023; 19
Rambow (10.1016/j.eswa.2023.122697_b0370) 2020
Mustafa (10.1016/j.eswa.2023.122697_b0160) 2018; 15
Almakhour (10.1016/j.eswa.2023.122697_b0610) 2023; 35
Ge (10.1016/j.eswa.2023.122697_b0040) 2022; 55
Black (10.1016/j.eswa.2023.122697_b0105) 2018; 77
Fahmideh (10.1016/j.eswa.2023.122697_b0510) 2022; 55
Paul (10.1016/j.eswa.2023.122697_b0585) 2022; 59
10.1016/j.eswa.2023.122697_b0010
Yuan (10.1016/j.eswa.2023.122697_b0325) 2021; 104
Hernández (10.1016/j.eswa.2023.122697_b0495) 2019; 1047
He (10.1016/j.eswa.2023.122697_b0225) 2022; 36
Syed (10.1016/j.eswa.2023.122697_b0600) 2022; 112
Liang (10.1016/j.eswa.2023.122697_b0295) 2017; 8
Prachi (10.1016/j.eswa.2023.122697_b0475) 2023; 230
Cascavilla (10.1016/j.eswa.2023.122697_b0630) 2021; 105
Shillair (10.1016/j.eswa.2023.122697_b0620) 2022; 119
Dassouki (10.1016/j.eswa.2023.122697_b0485) 2017; 70
Bai (10.1016/j.eswa.2023.122697_b0675) 2021; 18
Madan (10.1016/j.eswa.2023.122697_b0265) 2022
Wang (10.1016/j.eswa.2023.122697_b0415) 2022
Jing (10.1016/j.eswa.2023.122697_b0465) 2022; 130
Alahmari (10.1016/j.eswa.2023.122697_b0625) 2022; no. 0123456789
Khanna (10.1016/j.eswa.2023.122697_b0385) 2016; 94
Golait (10.1016/j.eswa.2023.122697_b0165) 2017; 12
Chen (10.1016/j.eswa.2023.122697_b0075) 2020; 53
Nasir (10.1016/j.eswa.2023.122697_b0045) 2023; 224
10.1016/j.eswa.2023.122697_b0085
10.1016/j.eswa.2023.122697_b0360
Grobys (10.1016/j.eswa.2023.122697_b0560) 2021; 21
Liberati (10.1016/j.eswa.2023.122697_b0090) 2009; 339
Eggenschwiler (10.1016/j.eswa.2023.122697_b0315) 2016; 2016
Raddatz (10.1016/j.eswa.2023.122697_b0525) 2021; 32
Bajunaied (10.1016/j.eswa.2023.122697_b0055) 2023; 9
Chen (10.1016/j.eswa.2023.122697_b0530) 2022; 207
Ambore (10.1016/j.eswa.2023.122697_b0095) 2017; 1
Stallings (10.1016/j.eswa.2023.122697_b0100) 2018
Taheri (10.1016/j.eswa.2023.122697_b0270) 2021; 17
Han (10.1016/j.eswa.2023.122697_b0285) 2019; 26
Ghafir (10.1016/j.eswa.2023.122697_b0125) 2018; 89
Naik (10.1016/j.eswa.2023.122697_b0460) 2021; 37
Sullivan (10.1016/j.eswa.2023.122697_b0635) 2017; 33
Rio (10.1016/j.eswa.2023.122697_b0380) 2016; 10
Xia (10.1016/j.eswa.2023.122697_b0555) 2022; 208
Lee (10.1016/j.eswa.2023.122697_b0280) 2016
Yang (10.1016/j.eswa.2023.122697_b0290) 2020; 170
Chao (10.1016/j.eswa.2023.122697_b0665) 2022; 80
10.1016/j.eswa.2023.122697_b0695
Masoud (10.1016/j.eswa.2023.122697_b0655) 2022; 76
Peris-Lopez (10.1016/j.eswa.2023.122697_b0130) 2017; 76
Ashta (10.1016/j.eswa.2023.122697_b0020) 2021; 30
Gai (10.1016/j.eswa.2023.122697_b0060) 2018; 103
Currie (10.1016/j.eswa.2023.122697_b0670) 2018; 33
Vijayakumar (10.1016/j.eswa.2023.122697_b0170) 2021; 152
Erola (10.1016/j.eswa.2023.122697_b0320) 2022; 67
Soni (10.1016/j.eswa.2023.122697_b0230) 2022; 180
Wang (10.1016/j.eswa.2023.122697_b0580) 2019; 24
Xu (10.1016/j.eswa.2023.122697_b0310) 2020; 11
Stellios (10.1016/j.eswa.2023.122697_b0275) 2021; 107
References_xml – volume: 32
  year: 2020
  ident: b0245
  article-title: IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers
  publication-title: Forensic Science International: Digital Investigation
– volume: 37
  year: 2021
  ident: b0460
  article-title: Fuzzy-import hashing: A static analysis technique for malware detection
  publication-title: Forensic Science International: Digital Investigation
– volume: 112
  year: 2021
  ident: b0455
  article-title: A survey on machine learning-based malware detection in executable files
  publication-title: Journal of Systems Architecture
– reference: , vol. 53, no. 1, Feb. 2020, 10.1145/3372823.
– volume: 39
  start-page: 52
  year: Aug. 2017
  end-page: 64
  ident: b0300
  article-title: A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities
  publication-title: Pervasive and Mobile Computing
– reference: , pp. 15–20, May 2018, 10.1145/3205230.3205234.
– year: 2022
  ident: b0265
  article-title: Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review
  publication-title: Journal of King Saud University - Computer and Information Sciences
– reference: Y. Hong, H. Kwon, J. Lee, and J. Hur, “A practical de-mixing algorithm for bitcoin mixing services.” in
– volume: 21
  start-page: 1267
  year: Aug. 2021
  end-page: 1279
  ident: b0560
  article-title: When the blockchain does not block: On hackings and uncertainty in the cryptocurrency market
  publication-title: Quant Finance
– reference: , vol. 2015, no. 1, pp. 1–2, 2015, 10.1016/S1353-4858(15)70001-2.
– reference: , vol. 35, no. 1, pp. 145–179, Jan. 2018, 10.1080/07421222.2018.1440768.
– volume: 76
  start-page: 146
  year: Jun. 2017
  end-page: 151
  ident: b0130
  article-title: Hardware Trojans against virtual keyboards on e-banking platforms – A proof of concept
  publication-title: AEU - International Journal of Electronics and Communications
– volume: 55
  year: Dec. 2022
  ident: b0510
  article-title: Engineering Blockchain-Based Software Systems: Foundations, Survey, and Future Directions
  publication-title: ACM Computing Surveys
– volume: 53
  start-page: 34
  year: Jul. 2019
  end-page: 39
  ident: b0330
  article-title: Leveraging Deep Learning to Improve Performance Predictability in Cloud Microservices with Seer
  publication-title: SIGOPS Oper. Syst. Rev.
– volume: 77
  start-page: 756
  year: 2018
  end-page: 772
  ident: b0105
  article-title: A survey of similarities in banking malware behaviours
  publication-title: Computers & Security
– reference: N. Kaloudi and J. Li, “The AI-Based Cyber Threat Landscape: A Survey,”
– volume: 121
  year: 2022
  ident: b0450
  article-title: Investigating perceptions about risk of data breaches in financial institutions: A routine activity-approach
  publication-title: Computers & Security
– volume: 94
  year: 2021
  ident: b0400
  article-title: Enterprise Credential Spear-phishing attack detection
  publication-title: Computers & Electrical Engineering
– volume: 230
  year: Nov. 2023
  ident: b0475
  article-title: MalAnalyser: An effective and efficient Windows malware detection method based on API call sequences
  publication-title: Expert Systems with Applications
– volume: 59
  year: Sep. 2022
  ident: b0585
  article-title: White knight in dark days? Supply chain finance firms, blockchain, and the COVID-19 pandemic
  publication-title: Information & Management
– volume: 17
  start-page: 8442
  year: 2021
  end-page: 8452
  ident: b0270
  article-title: Fed-IIoT: A Robust Federated Malware Detection Architecture in Industrial IoT
  publication-title: IEEE Trans Industr Inform
– volume: 58
  year: Jan. 2021
  ident: b0540
  article-title: A Survey on Blockchain for Information Systems Management and Security
  publication-title: Information Processing and Management
– volume: 9
  year: 2018
  ident: b0405
  article-title: Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model
  publication-title: Information
– volume: 96
  start-page: 227
  year: 2019
  end-page: 242
  ident: b0120
  article-title: A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise
  publication-title: Future Generation Computer Systems
– volume: 5
  start-page: pp
  year: 2023
  ident: b0035
  article-title: Generating scholarly content with ChatGPT: Ethical challenges for medical publishing
  publication-title: Lancet Digit Health
– volume: 54
  start-page: 70
  year: 2021
  end-page: 74
  ident: b0430
  article-title: Do data almost always eventually leak?
  publication-title: Computer (Long Beach Calif)
– volume: 33
  start-page: 304
  year: Dec. 2018
  end-page: 325
  ident: b0670
  article-title: Dialectic tensions in the financial markets: A longitudinal study of pre- and post-crisis regulatory technology
  publication-title: Journal of Information Technology
– volume: 2019
  start-page: 6716918
  year: 2019
  ident: b0115
  article-title: A Data-Driven Approach to Cyber Risk Assessment
  publication-title: Security and Communication Networks
– volume: 12
  start-page: 730
  year: Mar. 2017
  end-page: 745
  ident: b0165
  article-title: Detecting Anomalous Behavior in VoIP Systems: A Discrete Event System Modeling
  publication-title: IEEE Transactions on Information Forensics and Security
– volume: 6
  year: 2018
  ident: b0110
  article-title: Detection and elimination of spyware and ransomware by intercepting kernel-level system routines
  publication-title: IEEE Access
– volume: 4
  start-page: 5
  year: 2021
  ident: b0305
  article-title: Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?
  publication-title: Energy Informatics
– volume: 151
  year: Dec. 2021
  ident: b0545
  article-title: Bitcoin price forecasting: A perspective of underlying blockchain transactions
  publication-title: Decision Support Systems
– year: 2016
  ident: b0645
  article-title: How to Measure Anything in Cybersecurity Risk
– volume: 35
  start-page: 70
  year: 2023
  end-page: 86
  ident: b0610
  article-title: A formal verification approach for composite smart contracts security using FSM
  publication-title: Journal of King Saud University - Computer and Information Sciences
– reference: N. Burow, R. Burrow, R. Khazan, H. Shrobe, and B. C. Ward, “Moving Target Defense Considerations in Real-Time Safety- and Mission-Critical Systems,” in
– volume: 165
  year: Mar. 2021
  ident: b0640
  article-title: Development of a consumer financial goals ontology for use with FinTech applications for improving financial capability
  publication-title: Expert Systems with Applications
– volume: 358
  start-page: 7237
  year: 2021
  end-page: 7253
  ident: b0145
  article-title: Improved results on consensus of nonlinear MASs with nonhomogeneous Markov switching topologies and DoS cyber attacks
  publication-title: Journal of the Franklin Institute
– volume: 70
  start-page: 618
  year: Sep. 2017
  end-page: 633
  ident: b0485
  article-title: Protecting from Cloud-based SIP flooding attacks by leveraging temporal and structural fingerprints
  publication-title: Computers & Security
– volume: 151
  year: Dec. 2023
  ident: b0180
  article-title: Defending Root DNS Servers against DDoS Using Layered Defenses (Extended)
  publication-title: Ad Hoc Networks
– volume: 68
  year: 2021
  ident: b0080
  article-title: Fintech and access to finance
  publication-title: Journal of Corporate Finance
– reference: , vol. 16, no. 2, pp. 261–308, [Online]. Available: https://heinonline.org/HOL/P?h=hein.journals/ucdbulj16&i=271.
– volume: 210
  year: Dec. 2022
  ident: b0680
  article-title: Behaviour analysis of inter-app communication using a lightweight monitoring app for malware detection
  publication-title: Expert Systems with Applications
– reference: J. Freund, Jones, Jack,, “Measuring and managing information risk : a FAIR approach.” 2015. [Online]. Available: http://www.books24x7.com/marc.asp?bookid=73433.
– volume: 57
  year: Dec. 2020
  ident: b0005
  article-title: The emergence of a Fintech Ecosystem: A case study of the Vizag Fintech Valley in India
  publication-title: Information & Management
– volume: 228
  year: Oct. 2023
  ident: b0155
  article-title: Sin-Cos-bIAVOA: A new feature selection method based on improved African vulture optimization algorithm and a novel transfer function to DDoS attack detection
  publication-title: Expert Systems with Applications
– volume: 18
  year: Jun. 2019
  ident: b0235
  article-title: Catching Escapers: A Detection Method for Advanced Persistent Escapers in Industry Internet of Things Based on Identity-Based Broadcast Encryption (IBBE)
  publication-title: ACM Transactions on Embedded Computing Systems
– volume: 31
  start-page: 115
  year: Feb. 2020
  end-page: 142
  ident: b0590
  article-title: Bitcoin, Blockchain and Fintech: A systematic review and case studies in the supply chain
  publication-title: Production Planning & Control
– volume: 112
  year: 2022
  ident: b0600
  article-title: Traceability in supply chains: A Cyber security analysis
  publication-title: Computers & Security
– reference: , pp. 853–862, Aug. 2019, 10.1145/3338906.3340441.
– volume: 152
  start-page: 428
  year: Dec. 2021
  end-page: 435
  ident: b0170
  article-title: Performing Attack Halting Process with Digital Pattern and Proactive Model Resolving the Security Issues in IoT Based Models
  publication-title: Pattern Recognition Letters
– year: 2022
  ident: b0415
  article-title: Attentive statement fraud detection: Distinguishing multimodal financial data with fine-grained attention
  publication-title: Decision Support Systems
– volume: 20
  year: May 2020
  ident: b0255
  article-title: An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices
  publication-title: ACM Transactions on Internet Technology
– reference: , vol. 21, no. 3, Apr. 2018, 10.1145/3178370.
– volume: 9
  year: Mar. 2023
  ident: b0055
  article-title: Behavioral intention to adopt FinTech services: An extension of unified theory of acceptance and use of technology
  publication-title: Journal of Open Innovation: Technology, Market, and Complexity
– volume: 36
  year: 2022
  ident: b0225
  article-title: Towards green smart cities using Internet of Things and optimization algorithms: A systematic and bibliometric review
  publication-title: Sustainable Computing: Informatics and Systems
– year: 2018
  ident: b0250
  publication-title: Towards Situational Awareness of Botnet Activity in the Internet of Things
– volume: 19
  start-page: 19
  year: 2022
  end-page: 36
  ident: b0200
  article-title: On Ransomware Family Attribution Using Pre-Attack Paranoia Activities
  publication-title: IEEE Transactions on Network and Service Management
– volume: 22
  start-page: 113
  year: 2015
  end-page: 122
  ident: b0345
  article-title: Advanced social engineering attacks
  publication-title: Journal of Information Security and Applications
– volume: 94
  start-page: 459
  year: 2016
  end-page: 464
  ident: b0385
  article-title: Experimental Analysis of Tools Used for Doxing and Proposed New Transforms to Help Organizations Protect against Doxing Attacks
  publication-title: Procedia Computer Science
– reference: , vol. 2021, no. 9, pp. 1–3, 2021, 10.1016/S1361-3723(21)00089-0.
– volume: 11
  start-page: 3438
  year: 2020
  end-page: 3446
  ident: b0310
  article-title: Power System Parameter Attack for Financial Profits in Electricity Markets
  publication-title: IEEE Transactions on Smart Grid
– volume: 34
  start-page: 242
  year: Oct. 2018
  end-page: 254
  ident: b0615
  article-title: Tutorials and Laboratory for Hands-on OS Cybersecurity Instruction
  publication-title: Journal of Computing Sciences in Colleges
– volume: 33
  start-page: 14
  year: 2017
  end-page: 29
  ident: b0635
  article-title: ‘In the public interest’: The privacy implications of international business-to-business sharing of cyber-threat intelligence
  publication-title: Computer Law & Security Review
– reference: , vol. 2016, no. 2, pp. 1–3, Feb. 2016, 10.1016/S1361-3723(16)30011-2.
– volume: 5
  start-page: 256
  year: Oct. 2018
  end-page: 275
  ident: b0570
  article-title: Banking with blockchain-ed big data
  publication-title: Journal of Management Analytics
– volume: 67
  year: 2022
  ident: b0320
  article-title: Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations
  publication-title: Journal of Information Security and Applications
– volume: 104
  year: 2022
  ident: b0335
  article-title: Aligning social concerns with information system security: A fundamental ontology for social engineering
  publication-title: Information Systems
– volume: 100
  start-page: 408
  year: 2019
  end-page: 427
  ident: b0420
  article-title: Consumer-facing technology fraud: Economics, attack methods and potential solutions
  publication-title: Future Generation Computer Systems
– year: 2003
  ident: b0390
  article-title: “Social Engineering Fundamentals
– volume: 27
  start-page: 379
  year: Jul. 1948
  end-page: 423
  ident: b0440
  article-title: A mathematical theory of communication
  publication-title: Bell System Technical Journal
– volume: 53
  year: Jun. 2020
  ident: b0075
  article-title: A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses
  publication-title: ACM Computing Surveys
– volume: 1
  start-page: 202
  year: Oct. 2017
  end-page: 224
  ident: b0095
  article-title: A resilient cybersecurity framework for Mobile Financial Services (MFS)
  publication-title: Journal of Cyber Security Technology
– volume: 116
  year: Jun. 2021
  ident: b0260
  article-title: The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives
  publication-title: Journal of Systems Architecture
– volume: 1
  year: Sep. 2023
  ident: b0410
  article-title: Understanding the rise of fraud in England and Wales through field theory: Blip or flip?
  publication-title: Journal of Economic Criminology
– reference: , 2021, pp. 305–311. 10.1109/ICEES51510.2021.9383720.
– volume: 626
  start-page: 315
  year: 2023
  end-page: 338
  ident: b0175
  article-title: Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives
  publication-title: Inf Sci (N Y)
– volume: no. 0123456789
  year: 2022
  ident: b0625
  publication-title: Moving beyond cyber security awareness and training to engendering security knowledge sharing
– volume: 1047
  start-page: 223
  year: 2019
  end-page: 233
  ident: b0495
  article-title: “Data protection on fintech platforms”, Communications in Computer and Information
  publication-title: Science
– year: 2018
  ident: b0340
  article-title: Social Engineering: The Science of Human Hacking
– reference: , 2021.
– volume: 8
  start-page: 1630
  year: 2017
  end-page: 1638
  ident: b0295
  article-title: A Review of False Data Injection Attacks Against Modern Power Systems
  publication-title: IEEE Transactions on Smart Grid
– volume: 9
  year: 2021
  ident: b0240
  article-title: A Novel Method for Detecting Future Generations of Targeted and Metamorphic Malware Based on Genetic Algorithm
  publication-title: IEEE Access
– reference: “Doubts remain over whether North Korea was responsible for massive hack of Sony Pictures.”
– reference: D. Gozman, J. Liebenau, and J. Mangan, “The Innovation Mechanisms of Fintech Start-Ups: Insights from SWIFT’s Innotribe Competition,”
– volume: 8
  start-page: 24522
  year: 2020
  end-page: 24534
  ident: b0195
  article-title: Avoiding Future Digital Extortion Through Robust Protection Against Ransomware Threats Using Deep Learning Based Adaptive Approaches
  publication-title: IEEE Access
– volume: 30
  start-page: 211
  year: May 2021
  end-page: 222
  ident: b0020
  article-title: Artificial intelligence and fintech: An overview of opportunities and risks for banking, investments, and microfinance
  publication-title: Strategic Change
– volume: 339
  year: 2009
  ident: b0090
  article-title: The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate healthcare interventions: Explanation and elaboration
  publication-title: BMJ
– volume: 33
  start-page: 27
  year: 2020
  end-page: 42
  ident: b0215
  article-title: A socio-technical perspective to counter cyber-enabled industrial espionage
  publication-title: Security Journal
– volume: 208
  year: Dec. 2022
  ident: b0555
  article-title: Knowledge graph of mobile payment platforms based on deep learning: Risk analysis and policy implications
  publication-title: Expert Systems with Applications
– volume: 26
  year: 2019
  ident: b0285
  article-title: The enhanced security control model for critical infrastructures with the blocking prioritization process to cyber threats in power system
  publication-title: International Journal of Critical Infrastructure Protection
– volume: 55
  year: Jan. 2022
  ident: b0040
  article-title: Neural Network-Based Financial Volatility Forecasting: A Systematic Review
  publication-title: ACM Computing Surveys
– volume: 41
  start-page: 2038
  year: 2022
  end-page: 2051
  ident: b0205
  article-title: A Content-Based Ransomware Detection and Backup Solid-State Drive for Ransomware Defense
  publication-title: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
– volume: 105
  year: 2021
  ident: b0150
  article-title: Cyber-threat perception and risk management in the Swedish financial sector
  publication-title: Computers & Security
– volume: 2021
  start-page: 357
  year: 2021
  end-page: 363
  ident: b0520
  article-title: Green Efficiency for Quality Models in the Field of Cryptocurrency; IOTA Green Efficiency
  publication-title: IEEE Green Technologies Conference (GreenTech)
– volume: 89
  start-page: 349
  year: 2018
  end-page: 359
  ident: b0125
  article-title: Detection of advanced persistent threat using machine-learning correlation analysis
  publication-title: Future Generation Computer Systems
– volume: 8
  start-page: 155859
  year: 2020
  end-page: 155872
  ident: b0140
  article-title: A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine Learning
  publication-title: IEEE Access
– volume: 36
  year: 2020
  ident: b0185
  article-title: I2CE3: A dedicated and separated attack chain for ransomware offenses as the most infamous cyber extortion
  publication-title: Comput Sci Rev
– volume: 18
  start-page: 1378
  year: May 2021
  end-page: 1393
  ident: b0480
  article-title: DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans
  publication-title: IEEE Transactions on Dependable and Secure Computing
– volume: 104
  year: 2021
  ident: b0325
  article-title: Deep learning for insider threat detection: Review, challenges and opportunities
  publication-title: Computers & Security
– volume: 2011
  start-page: 201
  year: 2011
  end-page: 208
  ident: b0395
  article-title: Risks associated with USB Hardware Trojan devices used by insiders
  publication-title: IEEE International Systems Conference
– reference: T. Jin
– volume: 51
  year: Jul. 2018
  ident: b0065
  article-title: Systematically Understanding the Cyber Attack Business: A Survey
  publication-title: ACM Computing Surveys
– reference: , “FinExpert: Domain-specific test generation for FinTech systems,”
– volume: 224
  year: Aug. 2023
  ident: b0045
  article-title: Analysis of cybercrimes and security in FinTech industries using the novel concepts of interval-valued complex q-rung orthopair fuzzy relations
  publication-title: Expert Systems with Applications
– volume: 33
  year: 2020
  ident: b0190
  article-title: Evaluation of live forensic techniques in ransomware attack mitigation
  publication-title: Forensic Science International: Digital Investigation
– year: Aug. 2023
  ident: b0515
  article-title: Blockchain from the Information Systems Perspective: Literature Review, Synthesis, and Directions for Future Research
  publication-title: Information & Management
– reference: , pp. 330–335, Oct. 2020, 10.1145/3368308.3415366.
– reference: , vol. 35, no. 1, pp. 220–265, Jan. 2018, 10.1080/07421222.2018.1440766.
– volume: 207
  year: Nov. 2022
  ident: b0530
  article-title: Forecasting corporate credit ratings using big data from social media
  publication-title: Expert Systems with Applications
– volume: 10
  start-page: 1
  year: 2016
  end-page: 27
  ident: b0380
  article-title: Black mobility matters: An exploratory study of Uber, hacking, and the commons in Baltimore
  publication-title: Architecture_MPS
– reference: P. Gomber, R. J. Kauffman, C. Parker, and B. W. Weber, “On the Fintech Revolution: Interpreting the Forces of Innovation, Disruption, and Transformation in Financial Services,”
– volume: 54
  year: Jan. 2021
  ident: b0030
  article-title: The Creation and Detection of Deepfakes: A Survey
  publication-title: ACM Computing Surveys
– volume: 170
  year: 2020
  ident: b0290
  article-title: Event-based distributed state estimation for linear systems under unknown input and false data injection attack
  publication-title: Signal Processing
– volume: 76
  start-page: 131
  year: Jun. 2022
  end-page: 140
  ident: b0655
  article-title: The determinants of cybersecurity risk disclosure in firms’ financial reporting: Empirical evidence
  publication-title: Research in Economics
– volume: 107
  year: 2021
  ident: b0275
  article-title: Assessing IoT enabled cyber-physical attack paths against critical systems
  publication-title: Computers & Security
– volume: 75
  start-page: 335
  year: 2022
  end-page: 344
  ident: b0050
  article-title: Is FinTech providing effective solutions to Small and Medium Enterprises (SMEs) in ASEAN countries?
  publication-title: Econ Anal Policy
– volume: 19
  year: Jun. 2023
  ident: b0685
  article-title: EVHA: Explainable Vision System for Hardware Testing and Assurance—An Overview
  publication-title: J. Emerg. Technol Computing Systems
– volume: 207
  start-page: 2940
  year: 2022
  end-page: 2949
  ident: b0220
  article-title: The threat of industrial espionage for SME in the age of digitalization
  publication-title: Procedia Computer Science
– year: 2018
  ident: b0100
  article-title: Computer Security: Principles and Practice
– volume: 2023
  start-page: 1
  year: Sep. 2023
  end-page: 39
  ident: b0575
  article-title: Analysis of sustainable supply chain and industry 4.0 enablers: A step towards decarbonization of supply chains
  publication-title: Ann. Oper. Res.
– volume: 29
  start-page: 40
  year: Jan. 2019
  end-page: 59
  ident: b0565
  article-title: Cryptojacking injection: A paradigm shift to cryptocurrency-based web-centric internet attacks
  publication-title: Journal of Organizational Computing and Electronic Commerce
– volume: 80
  start-page: 421
  year: 2018
  end-page: 429
  ident: b0500
  article-title: Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry
  publication-title: Future Generation Computer Systems
– start-page: 71
  year: 2020
  end-page: 78
  ident: b0370
  article-title: “Connected Vehicles in the Shark Tank: Rethinking the Challenge for Cybersecurity to Keep Pace with Digital Innovation BT -
  publication-title: 3rd EAI International Conference on IoT in Urban Space”
– reference: L. J. Trautman, “E-Commerce, Cyber, and Electronic Payment System Risks: Lessons from PayPal,”
– volume: 98
  year: Nov. 2020
  ident: b0210
  article-title: Industrial espionage – A systematic literature review (SLR)
  publication-title: Computers & Security
– reference: M. Mocanu, “Management of Cyber-Espionage Intrusions,” in
– reference: S. V. Kumar, G. A. A. Mary, P. Suresh, and R. Uthirasamy, “Investigation On Cyber-Attacks Against In-Vehicle Network,” in
– volume: 80
  year: 2022
  ident: b0665
  article-title: Regulatory technology (Reg-Tech) in financial stability supervision: Taxonomy, key methods, applications and future directions
  publication-title: International Review of Financial Analysis
– volume: 54
  start-page: 453
  year: Jan. 2016
  end-page: 461
  ident: b0490
  article-title: An empirical study on trust in mobile banking: A developing country perspective
  publication-title: Comput Human Behav
– volume: 60
  year: May 2023
  ident: b0660
  article-title: Responsible and human centric AI-based insurance advisors
  publication-title: Information Processing and Management
– reference: Y. Wang, M. McCoey, and Q. Hu, “Developing an Undergraduate Course Curriculum for Ethical Hacking,”
– volume: 8
  start-page: 23391
  year: 2020
  end-page: 23406
  ident: b0070
  article-title: Towards Secure FinTech: A Survey, Taxonomy, and Open Research Challenges
  publication-title: IEEE Access
– reference: “Millions of records leaked as T-Mobile is breached for the sixth time in four years,”
– reference: “HSBC bank and Irish National Lottery among latest DDoS victims,”
– volume: 16
  start-page: 2413
  year: 2021
  end-page: 2428
  ident: b0470
  article-title: CPS Device-Class Identification via Behavioral Fingerprinting: From Theory to Practice
  publication-title: IEEE Transactions on Information Forensics and Security
– volume: 32
  start-page: 287
  year: 2021
  end-page: 314
  ident: b0525
  article-title: Becoming a blockchain user: Understanding consumers’ benefits realisation to use blockchain-based applications
  publication-title: European Journal of Information Systems
– year: 2016
  ident: b0280
  article-title: Analysis of the Cyber Attack on the Ukrainian Power Grid
– year: 2022
  ident: b0605
  article-title: Cryptographic obfuscation for smart contracts: Trustless bitcoin bridge and more
  publication-title: Blockchain: Research and Applications
– volume: 51
  year: Jul. 2018
  ident: b0350
  article-title: Who Watches the Watchmen: A Security-Focused Review on Current State-of-the-Art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms
  publication-title: ACM Computing Surveys
– volume: 28
  start-page: 50
  year: Mar. 2019
  end-page: 65
  ident: b0550
  article-title: Affordances, experimentation and actualization of FinTech: A blockchain implementation study
  publication-title: The Journal of Strategic Information Systems
– volume: 157
  year: 2022
  ident: b0595
  article-title: Optimization models for supply chains under risk, uncertainty, and resilience: A state-of-the-art review and future research directions
  publication-title: Transp Res E Logist Transp Rev
– volume: 103
  start-page: 262
  year: 2018
  end-page: 273
  ident: b0060
  article-title: A survey on FinTech
  publication-title: Journal of Network and Computer Applications
– volume: 105
  year: 2021
  ident: b0630
  article-title: Cybercrime threat intelligence: A systematic multi-vocal literature review
  publication-title: Computers & Security
– volume: 15
  start-page: 423
  year: May 2018
  end-page: 435
  ident: b0160
  article-title: End-to-end detection of caller ID spoofing attacks
  publication-title: IEEE Transactions on Dependable and Secure Computing
– start-page: 249
  year: 2015
  end-page: 286
  ident: b0355
  publication-title: Cyber Attacks, Prevention, and Countermeasures BT - Counterterrorism and Cybersecurity: Total Information Awareness
– volume: 2016
  start-page: 12
  year: 2016
  end-page: 19
  ident: b0315
  article-title: Insider threat response and recovery strategies in financial services firms
  publication-title: Computer Fraud & Security
– reference: , in MTD’20. New York, NY, USA: Association for Computing Machinery, 2020, pp. 81–89. 10.1145/3411496.3421224.
– volume: 28
  start-page: 205
  year: 2000
  end-page: 216
  ident: b0505
  article-title: MarketNet: Protecting access to information systems through financial market controls
  publication-title: Decision Support Systems
– volume: 180
  year: Jul. 2022
  ident: b0230
  article-title: A decision-making framework for Industry 4.0 technology implementation: The case of FinTech and sustainable supply chain finance for SMEs
  publication-title: Technol Forecast Soc Change
– volume: 119
  year: 2022
  ident: b0620
  article-title: Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise
  publication-title: Computers & Security
– volume: 18
  start-page: 1378
  year: 2021
  end-page: 1393
  ident: b0675
  article-title: DBank DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans
  publication-title: IEEE Transactions on Dependable and Secure Computing
– reference: M. Carminati, M. Polino, A. Continella, A. Lanzi, F. Maggi, and S. Zanero, “Security Evaluation of a Banking Fraud Analysis System,”
– volume: 24
  start-page: 62
  year: Mar. 2019
  end-page: 84
  ident: b0580
  article-title: Understanding blockchain technology for future supply chains: A systematic literature review and research agenda
  publication-title: Supply Chain Management
– volume: 130
  start-page: 193
  year: 2022
  end-page: 206
  ident: b0465
  article-title: Ensemble dynamic behavior detection method for adversarial malware
  publication-title: Future Generation Computer Systems
– volume: 180
  year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0230
  article-title: A decision-making framework for Industry 4.0 technology implementation: The case of FinTech and sustainable supply chain finance for SMEs
  publication-title: Technol Forecast Soc Change
  doi: 10.1016/j.techfore.2022.121686
– ident: 10.1016/j.eswa.2023.122697_b0135
  doi: 10.1016/S1361-3723(16)30011-2
– volume: 68
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0080
  article-title: Fintech and access to finance
  publication-title: Journal of Corporate Finance
  doi: 10.1016/j.jcorpfin.2021.101941
– volume: 32
  start-page: 287
  issue: 2
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0525
  article-title: Becoming a blockchain user: Understanding consumers’ benefits realisation to use blockchain-based applications
  publication-title: European Journal of Information Systems
  doi: 10.1080/0960085X.2021.1944823
– volume: 4
  start-page: 5
  issue: 1
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0305
  article-title: Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?
  publication-title: Energy Informatics
  doi: 10.1186/s42162-021-00139-7
– volume: 15
  start-page: 423
  issue: 3
  year: 2018
  ident: 10.1016/j.eswa.2023.122697_b0160
  article-title: End-to-end detection of caller ID spoofing attacks
  publication-title: IEEE Transactions on Dependable and Secure Computing
  doi: 10.1109/TDSC.2016.2580509
– volume: 130
  start-page: 193
  year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0465
  article-title: Ensemble dynamic behavior detection method for adversarial malware
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2021.12.013
– volume: 19
  issue: 3
  year: 2023
  ident: 10.1016/j.eswa.2023.122697_b0685
  article-title: EVHA: Explainable Vision System for Hardware Testing and Assurance—An Overview
  publication-title: J. Emerg. Technol Computing Systems
– volume: 207
  start-page: 2940
  year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0220
  article-title: The threat of industrial espionage for SME in the age of digitalization
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2022.09.352
– ident: 10.1016/j.eswa.2023.122697_b0435
  doi: 10.1145/3411496.3421224
– volume: 8
  start-page: 1630
  issue: 4
  year: 2017
  ident: 10.1016/j.eswa.2023.122697_b0295
  article-title: A Review of False Data Injection Attacks Against Modern Power Systems
  publication-title: IEEE Transactions on Smart Grid
  doi: 10.1109/TSG.2015.2495133
– year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0415
  article-title: Attentive statement fraud detection: Distinguishing multimodal financial data with fine-grained attention
  publication-title: Decision Support Systems
– volume: 20
  issue: 2
  year: 2020
  ident: 10.1016/j.eswa.2023.122697_b0255
  article-title: An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices
  publication-title: ACM Transactions on Internet Technology
  doi: 10.1145/3379542
– volume: 151
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0545
  article-title: Bitcoin price forecasting: A perspective of underlying blockchain transactions
  publication-title: Decision Support Systems
  doi: 10.1016/j.dss.2021.113650
– volume: 22
  start-page: 113
  year: 2015
  ident: 10.1016/j.eswa.2023.122697_b0345
  article-title: Advanced social engineering attacks
  publication-title: Journal of Information Security and Applications
  doi: 10.1016/j.jisa.2014.09.005
– ident: 10.1016/j.eswa.2023.122697_b0010
  doi: 10.1080/07421222.2018.1440766
– year: 2023
  ident: 10.1016/j.eswa.2023.122697_b0515
  article-title: Blockchain from the Information Systems Perspective: Literature Review, Synthesis, and Directions for Future Research
  publication-title: Information & Management
  doi: 10.1016/j.im.2023.103856
– volume: 157
  year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0595
  article-title: Optimization models for supply chains under risk, uncertainty, and resilience: A state-of-the-art review and future research directions
  publication-title: Transp Res E Logist Transp Rev
  doi: 10.1016/j.tre.2021.102553
– volume: 224
  year: 2023
  ident: 10.1016/j.eswa.2023.122697_b0045
  article-title: Analysis of cybercrimes and security in FinTech industries using the novel concepts of interval-valued complex q-rung orthopair fuzzy relations
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2023.119976
– volume: 9
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0240
  article-title: A Novel Method for Detecting Future Generations of Targeted and Metamorphic Malware Based on Genetic Algorithm
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3077295
– volume: 59
  issue: 6
  year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0585
  article-title: White knight in dark days? Supply chain finance firms, blockchain, and the COVID-19 pandemic
  publication-title: Information & Management
  doi: 10.1016/j.im.2022.103661
– ident: 10.1016/j.eswa.2023.122697_b0690
  doi: 10.1145/3338906.3340441
– volume: 58
  issue: 1
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0540
  article-title: A Survey on Blockchain for Information Systems Management and Security
  publication-title: Information Processing and Management
  doi: 10.1016/j.ipm.2020.102397
– volume: 105
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0150
  article-title: Cyber-threat perception and risk management in the Swedish financial sector
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2021.102239
– volume: 208
  year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0555
  article-title: Knowledge graph of mobile payment platforms based on deep learning: Risk analysis and policy implications
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2022.118143
– volume: 33
  start-page: 14
  issue: 1
  year: 2017
  ident: 10.1016/j.eswa.2023.122697_b0635
  article-title: ‘In the public interest’: The privacy implications of international business-to-business sharing of cyber-threat intelligence
  publication-title: Computer Law & Security Review
  doi: 10.1016/j.clsr.2016.11.015
– volume: 89
  start-page: 349
  year: 2018
  ident: 10.1016/j.eswa.2023.122697_b0125
  article-title: Detection of advanced persistent threat using machine-learning correlation analysis
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2018.06.055
– volume: 53
  start-page: 34
  issue: 1
  year: 2019
  ident: 10.1016/j.eswa.2023.122697_b0330
  article-title: Leveraging Deep Learning to Improve Performance Predictability in Cloud Microservices with Seer
  publication-title: SIGOPS Oper. Syst. Rev.
  doi: 10.1145/3352020.3352026
– volume: 76
  start-page: 131
  issue: 2
  year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0655
  article-title: The determinants of cybersecurity risk disclosure in firms’ financial reporting: Empirical evidence
  publication-title: Research in Economics
  doi: 10.1016/j.rie.2022.07.001
– volume: 2019
  start-page: 6716918
  year: 2019
  ident: 10.1016/j.eswa.2023.122697_b0115
  article-title: A Data-Driven Approach to Cyber Risk Assessment
  publication-title: Security and Communication Networks
  doi: 10.1155/2019/6716918
– volume: 170
  year: 2020
  ident: 10.1016/j.eswa.2023.122697_b0290
  article-title: Event-based distributed state estimation for linear systems under unknown input and false data injection attack
  publication-title: Signal Processing
– volume: 151
  year: 2023
  ident: 10.1016/j.eswa.2023.122697_b0180
  article-title: Defending Root DNS Servers against DDoS Using Layered Defenses (Extended)
  publication-title: Ad Hoc Networks
  doi: 10.1016/j.adhoc.2023.103259
– volume: 36
  year: 2020
  ident: 10.1016/j.eswa.2023.122697_b0185
  article-title: I2CE3: A dedicated and separated attack chain for ransomware offenses as the most infamous cyber extortion
  publication-title: Comput Sci Rev
  doi: 10.1016/j.cosrev.2020.100233
– ident: 10.1016/j.eswa.2023.122697_b0360
– year: 2018
  ident: 10.1016/j.eswa.2023.122697_b0100
– volume: 103
  start-page: 262
  year: 2018
  ident: 10.1016/j.eswa.2023.122697_b0060
  article-title: A survey on FinTech
  publication-title: Journal of Network and Computer Applications
  doi: 10.1016/j.jnca.2017.10.011
– volume: 94
  start-page: 459
  year: 2016
  ident: 10.1016/j.eswa.2023.122697_b0385
  article-title: Experimental Analysis of Tools Used for Doxing and Proposed New Transforms to Help Organizations Protect against Doxing Attacks
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2016.08.071
– volume: 2011
  start-page: 201
  year: 2011
  ident: 10.1016/j.eswa.2023.122697_b0395
  article-title: Risks associated with USB Hardware Trojan devices used by insiders
  publication-title: IEEE International Systems Conference
– volume: 75
  start-page: 335
  year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0050
  article-title: Is FinTech providing effective solutions to Small and Medium Enterprises (SMEs) in ASEAN countries?
  publication-title: Econ Anal Policy
  doi: 10.1016/j.eap.2022.05.019
– volume: 6
  year: 2018
  ident: 10.1016/j.eswa.2023.122697_b0110
  article-title: Detection and elimination of spyware and ransomware by intercepting kernel-level system routines
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2884964
– volume: 80
  start-page: 421
  year: 2018
  ident: 10.1016/j.eswa.2023.122697_b0500
  article-title: Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2016.01.006
– volume: 35
  start-page: 70
  issue: 1
  year: 2023
  ident: 10.1016/j.eswa.2023.122697_b0610
  article-title: A formal verification approach for composite smart contracts security using FSM
  publication-title: Journal of King Saud University - Computer and Information Sciences
  doi: 10.1016/j.jksuci.2022.08.029
– volume: 5
  start-page: 256
  issue: 4
  year: 2018
  ident: 10.1016/j.eswa.2023.122697_b0570
  article-title: Banking with blockchain-ed big data
  publication-title: Journal of Management Analytics
  doi: 10.1080/23270012.2018.1528900
– volume: 121
  year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0450
  article-title: Investigating perceptions about risk of data breaches in financial institutions: A routine activity-approach
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2022.102832
– volume: 33
  start-page: 27
  issue: 1
  year: 2020
  ident: 10.1016/j.eswa.2023.122697_b0215
  article-title: A socio-technical perspective to counter cyber-enabled industrial espionage
  publication-title: Security Journal
  doi: 10.1057/s41284-019-00198-2
– volume: 358
  start-page: 7237
  issue: 14
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0145
  article-title: Improved results on consensus of nonlinear MASs with nonhomogeneous Markov switching topologies and DoS cyber attacks
  publication-title: Journal of the Franklin Institute
  doi: 10.1016/j.jfranklin.2021.07.044
– volume: 230
  year: 2023
  ident: 10.1016/j.eswa.2023.122697_b0475
  article-title: MalAnalyser: An effective and efficient Windows malware detection method based on API call sequences
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2023.120756
– ident: 10.1016/j.eswa.2023.122697_b0365
  doi: 10.1109/ICEES51510.2021.9383720
– volume: 57
  issue: 8
  year: 2020
  ident: 10.1016/j.eswa.2023.122697_b0005
  article-title: The emergence of a Fintech Ecosystem: A case study of the Vizag Fintech Valley in India
  publication-title: Information & Management
  doi: 10.1016/j.im.2020.103385
– volume: 54
  issue: 1
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0030
  article-title: The Creation and Detection of Deepfakes: A Survey
  publication-title: ACM Computing Surveys
  doi: 10.1145/3425780
– volume: 18
  issue: 3
  year: 2019
  ident: 10.1016/j.eswa.2023.122697_b0235
  article-title: Catching Escapers: A Detection Method for Advanced Persistent Escapers in Industry Internet of Things Based on Identity-Based Broadcast Encryption (IBBE)
  publication-title: ACM Transactions on Embedded Computing Systems
  doi: 10.1145/3319615
– volume: 36
  year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0225
  article-title: Towards green smart cities using Internet of Things and optimization algorithms: A systematic and bibliometric review
  publication-title: Sustainable Computing: Informatics and Systems
– volume: 55
  issue: 1
  year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0040
  article-title: Neural Network-Based Financial Volatility Forecasting: A Systematic Review
  publication-title: ACM Computing Surveys
  doi: 10.1145/3483596
– volume: no. 0123456789
  year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0625
  publication-title: Moving beyond cyber security awareness and training to engendering security knowledge sharing
– volume: 339
  year: 2009
  ident: 10.1016/j.eswa.2023.122697_b0090
  article-title: The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate healthcare interventions: Explanation and elaboration
  publication-title: BMJ
  doi: 10.1136/bmj.b2700
– volume: 98
  year: 2020
  ident: 10.1016/j.eswa.2023.122697_b0210
  article-title: Industrial espionage – A systematic literature review (SLR)
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2020.102019
– volume: 104
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0325
  article-title: Deep learning for insider threat detection: Review, challenges and opportunities
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2021.102221
– volume: 152
  start-page: 428
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0170
  article-title: Performing Attack Halting Process with Digital Pattern and Proactive Model Resolving the Security Issues in IoT Based Models
  publication-title: Pattern Recognition Letters
  doi: 10.1016/j.patrec.2021.11.009
– volume: 60
  issue: 3
  year: 2023
  ident: 10.1016/j.eswa.2023.122697_b0660
  article-title: Responsible and human centric AI-based insurance advisors
  publication-title: Information Processing and Management
  doi: 10.1016/j.ipm.2023.103273
– ident: 10.1016/j.eswa.2023.122697_b0375
  doi: 10.1016/S1353-4858(15)70001-2
– ident: 10.1016/j.eswa.2023.122697_b0425
  doi: 10.1145/3178370
– volume: 19
  start-page: 19
  issue: 1
  year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0200
  article-title: On Ransomware Family Attribution Using Pre-Attack Paranoia Activities
  publication-title: IEEE Transactions on Network and Service Management
  doi: 10.1109/TNSM.2021.3112056
– volume: 51
  issue: 4
  year: 2018
  ident: 10.1016/j.eswa.2023.122697_b0065
  article-title: Systematically Understanding the Cyber Attack Business: A Survey
  publication-title: ACM Computing Surveys
  doi: 10.1145/3199674
– year: 2018
  ident: 10.1016/j.eswa.2023.122697_b0340
– volume: 100
  start-page: 408
  year: 2019
  ident: 10.1016/j.eswa.2023.122697_b0420
  article-title: Consumer-facing technology fraud: Economics, attack methods and potential solutions
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2019.03.041
– volume: 21
  start-page: 1267
  issue: 8
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0560
  article-title: When the blockchain does not block: On hackings and uncertainty in the cryptocurrency market
  publication-title: Quant Finance
  doi: 10.1080/14697688.2020.1849779
– volume: 105
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0630
  article-title: Cybercrime threat intelligence: A systematic multi-vocal literature review
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2021.102258
– volume: 55
  issue: 6
  year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0510
  article-title: Engineering Blockchain-Based Software Systems: Foundations, Survey, and Future Directions
  publication-title: ACM Computing Surveys
  doi: 10.1145/3530813
– volume: 26
  year: 2019
  ident: 10.1016/j.eswa.2023.122697_b0285
  article-title: The enhanced security control model for critical infrastructures with the blocking prioritization process to cyber threats in power system
  publication-title: International Journal of Critical Infrastructure Protection
  doi: 10.1016/j.ijcip.2019.100312
– year: 2016
  ident: 10.1016/j.eswa.2023.122697_b0645
– year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0265
  article-title: Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review
  publication-title: Journal of King Saud University - Computer and Information Sciences
  doi: 10.1016/j.jksuci.2021.12.016
– volume: 104
  year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0335
  article-title: Aligning social concerns with information system security: A fundamental ontology for social engineering
  publication-title: Information Systems
  doi: 10.1016/j.is.2020.101699
– volume: 119
  year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0620
  article-title: Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2022.102756
– year: 2016
  ident: 10.1016/j.eswa.2023.122697_b0280
– volume: 54
  start-page: 453
  year: 2016
  ident: 10.1016/j.eswa.2023.122697_b0490
  article-title: An empirical study on trust in mobile banking: A developing country perspective
  publication-title: Comput Human Behav
  doi: 10.1016/j.chb.2015.08.039
– volume: 116
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0260
  article-title: The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives
  publication-title: Journal of Systems Architecture
  doi: 10.1016/j.sysarc.2021.102143
– volume: 165
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0640
  article-title: Development of a consumer financial goals ontology for use with FinTech applications for improving financial capability
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2020.113843
– start-page: 249
  year: 2015
  ident: 10.1016/j.eswa.2023.122697_b0355
– volume: 51
  issue: 4
  year: 2018
  ident: 10.1016/j.eswa.2023.122697_b0350
  article-title: Who Watches the Watchmen: A Security-Focused Review on Current State-of-the-Art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms
  publication-title: ACM Computing Surveys
  doi: 10.1145/3199673
– volume: 33
  start-page: 304
  issue: 4
  year: 2018
  ident: 10.1016/j.eswa.2023.122697_b0670
  article-title: Dialectic tensions in the financial markets: A longitudinal study of pre- and post-crisis regulatory technology
  publication-title: Journal of Information Technology
  doi: 10.1057/s41265-017-0047-5
– volume: 24
  start-page: 62
  issue: 1
  year: 2019
  ident: 10.1016/j.eswa.2023.122697_b0580
  article-title: Understanding blockchain technology for future supply chains: A systematic literature review and research agenda
  publication-title: Supply Chain Management
  doi: 10.1108/SCM-03-2018-0148
– volume: 33
  year: 2020
  ident: 10.1016/j.eswa.2023.122697_b0190
  article-title: Evaluation of live forensic techniques in ransomware attack mitigation
  publication-title: Forensic Science International: Digital Investigation
– volume: 1
  year: 2023
  ident: 10.1016/j.eswa.2023.122697_b0410
  article-title: Understanding the rise of fraud in England and Wales through field theory: Blip or flip?
  publication-title: Journal of Economic Criminology
  doi: 10.1016/j.jeconc.2023.100012
– volume: 207
  year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0530
  article-title: Forecasting corporate credit ratings using big data from social media
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2022.118042
– ident: 10.1016/j.eswa.2023.122697_b0015
  doi: 10.1080/07421222.2018.1440768
– volume: 5
  start-page: pp
  issue: 3
  year: 2023
  ident: 10.1016/j.eswa.2023.122697_b0035
  article-title: Generating scholarly content with ChatGPT: Ethical challenges for medical publishing
  publication-title: Lancet Digit Health
– ident: 10.1016/j.eswa.2023.122697_b0085
  doi: 10.1145/3372823
– volume: 67
  year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0320
  article-title: Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations
  publication-title: Journal of Information Security and Applications
  doi: 10.1016/j.jisa.2022.103167
– volume: 10
  start-page: 1
  issue: 4
  year: 2016
  ident: 10.1016/j.eswa.2023.122697_b0380
  article-title: Black mobility matters: An exploratory study of Uber, hacking, and the commons in Baltimore
  publication-title: Architecture_MPS
– volume: 2023
  start-page: 1
  year: 2023
  ident: 10.1016/j.eswa.2023.122697_b0575
  article-title: Analysis of sustainable supply chain and industry 4.0 enablers: A step towards decarbonization of supply chains
  publication-title: Ann. Oper. Res.
– volume: 32
  year: 2020
  ident: 10.1016/j.eswa.2023.122697_b0245
  article-title: IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers
  publication-title: Forensic Science International: Digital Investigation
– volume: 18
  start-page: 1378
  issue: 3
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0675
  article-title: DBank DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans
  publication-title: IEEE Transactions on Dependable and Secure Computing
– volume: 80
  year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0665
  article-title: Regulatory technology (Reg-Tech) in financial stability supervision: Taxonomy, key methods, applications and future directions
  publication-title: International Review of Financial Analysis
  doi: 10.1016/j.irfa.2022.102023
– volume: 8
  start-page: 155859
  year: 2020
  ident: 10.1016/j.eswa.2023.122697_b0140
  article-title: A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine Learning
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3019330
– volume: 9
  issue: 1
  year: 2023
  ident: 10.1016/j.eswa.2023.122697_b0055
  article-title: Behavioral intention to adopt FinTech services: An extension of unified theory of acceptance and use of technology
  publication-title: Journal of Open Innovation: Technology, Market, and Complexity
  doi: 10.1016/j.joitmc.2023.100010
– volume: 107
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0275
  article-title: Assessing IoT enabled cyber-physical attack paths against critical systems
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2021.102316
– volume: 54
  start-page: 70
  issue: 2
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0430
  article-title: Do data almost always eventually leak?
  publication-title: Computer (Long Beach Calif)
– volume: 30
  start-page: 211
  issue: 3
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0020
  article-title: Artificial intelligence and fintech: An overview of opportunities and risks for banking, investments, and microfinance
  publication-title: Strategic Change
  doi: 10.1002/jsc.2404
– volume: 17
  start-page: 8442
  issue: 12
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0270
  article-title: Fed-IIoT: A Robust Federated Malware Detection Architecture in Industrial IoT
  publication-title: IEEE Trans Industr Inform
  doi: 10.1109/TII.2020.3043458
– volume: 77
  start-page: 756
  year: 2018
  ident: 10.1016/j.eswa.2023.122697_b0105
  article-title: A survey of similarities in banking malware behaviours
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2017.09.013
– volume: 8
  start-page: 23391
  year: 2020
  ident: 10.1016/j.eswa.2023.122697_b0070
  article-title: Towards Secure FinTech: A Survey, Taxonomy, and Open Research Challenges
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2970430
– year: 2003
  ident: 10.1016/j.eswa.2023.122697_b0390
– volume: 16
  start-page: 2413
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0470
  article-title: CPS Device-Class Identification via Behavioral Fingerprinting: From Theory to Practice
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2021.3054968
– year: 2018
  ident: 10.1016/j.eswa.2023.122697_b0250
  publication-title: Towards Situational Awareness of Botnet Activity in the Internet of Things
– volume: 28
  start-page: 50
  issue: 1
  year: 2019
  ident: 10.1016/j.eswa.2023.122697_b0550
  article-title: Affordances, experimentation and actualization of FinTech: A blockchain implementation study
  publication-title: The Journal of Strategic Information Systems
  doi: 10.1016/j.jsis.2018.10.002
– volume: 12
  start-page: 730
  issue: 3
  year: 2017
  ident: 10.1016/j.eswa.2023.122697_b0165
  article-title: Detecting Anomalous Behavior in VoIP Systems: A Discrete Event System Modeling
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2016.2632071
– volume: 37
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0460
  article-title: Fuzzy-import hashing: A static analysis technique for malware detection
  publication-title: Forensic Science International: Digital Investigation
– ident: 10.1016/j.eswa.2023.122697_b0650
– volume: 11
  start-page: 3438
  issue: 4
  year: 2020
  ident: 10.1016/j.eswa.2023.122697_b0310
  article-title: Power System Parameter Attack for Financial Profits in Electricity Markets
  publication-title: IEEE Transactions on Smart Grid
  doi: 10.1109/TSG.2020.2977088
– volume: 34
  start-page: 242
  issue: 1
  year: 2018
  ident: 10.1016/j.eswa.2023.122697_b0615
  article-title: Tutorials and Laboratory for Hands-on OS Cybersecurity Instruction
  publication-title: Journal of Computing Sciences in Colleges
– volume: 53
  issue: 3
  year: 2020
  ident: 10.1016/j.eswa.2023.122697_b0075
  article-title: A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses
  publication-title: ACM Computing Surveys
  doi: 10.1145/3391195
– volume: 94
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0400
  article-title: Enterprise Credential Spear-phishing attack detection
  publication-title: Computers & Electrical Engineering
  doi: 10.1016/j.compeleceng.2021.107363
– ident: 10.1016/j.eswa.2023.122697_b0695
  doi: 10.1145/3368308.3415366
– volume: 2021
  start-page: 357
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0520
  article-title: Green Efficiency for Quality Models in the Field of Cryptocurrency; IOTA Green Efficiency
  publication-title: IEEE Green Technologies Conference (GreenTech)
  doi: 10.1109/GreenTech48523.2021.00101
– volume: 228
  year: 2023
  ident: 10.1016/j.eswa.2023.122697_b0155
  article-title: Sin-Cos-bIAVOA: A new feature selection method based on improved African vulture optimization algorithm and a novel transfer function to DDoS attack detection
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2023.120404
– volume: 626
  start-page: 315
  year: 2023
  ident: 10.1016/j.eswa.2023.122697_b0175
  article-title: Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives
  publication-title: Inf Sci (N Y)
  doi: 10.1016/j.ins.2023.01.067
– volume: 28
  start-page: 205
  issue: 1
  year: 2000
  ident: 10.1016/j.eswa.2023.122697_b0505
  article-title: MarketNet: Protecting access to information systems through financial market controls
  publication-title: Decision Support Systems
  doi: 10.1016/S0167-9236(99)00069-X
– volume: 41
  start-page: 2038
  issue: 7
  year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0205
  article-title: A Content-Based Ransomware Detection and Backup Solid-State Drive for Ransomware Defense
  publication-title: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
  doi: 10.1109/TCAD.2021.3099084
– volume: 1047
  start-page: 223
  year: 2019
  ident: 10.1016/j.eswa.2023.122697_b0495
  article-title: “Data protection on fintech platforms”, Communications in Computer and Information
  publication-title: Science
– volume: 39
  start-page: 52
  year: 2017
  ident: 10.1016/j.eswa.2023.122697_b0300
  article-title: A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities
  publication-title: Pervasive and Mobile Computing
  doi: 10.1016/j.pmcj.2017.04.005
– volume: 1
  start-page: 202
  issue: 3–4
  year: 2017
  ident: 10.1016/j.eswa.2023.122697_b0095
  article-title: A resilient cybersecurity framework for Mobile Financial Services (MFS)
  publication-title: Journal of Cyber Security Technology
  doi: 10.1080/23742917.2017.1386483
– volume: 9
  issue: 5
  year: 2018
  ident: 10.1016/j.eswa.2023.122697_b0405
  article-title: Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model
  publication-title: Information
  doi: 10.3390/info9050110
– volume: 29
  start-page: 40
  issue: 1
  year: 2019
  ident: 10.1016/j.eswa.2023.122697_b0565
  article-title: Cryptojacking injection: A paradigm shift to cryptocurrency-based web-centric internet attacks
  publication-title: Journal of Organizational Computing and Electronic Commerce
  doi: 10.1080/10919392.2019.1552747
– ident: 10.1016/j.eswa.2023.122697_b0025
– start-page: 71
  year: 2020
  ident: 10.1016/j.eswa.2023.122697_b0370
  article-title: “Connected Vehicles in the Shark Tank: Rethinking the Challenge for Cybersecurity to Keep Pace with Digital Innovation BT -
– volume: 210
  year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0680
  article-title: Behaviour analysis of inter-app communication using a lightweight monitoring app for malware detection
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2022.118404
– volume: 76
  start-page: 146
  year: 2017
  ident: 10.1016/j.eswa.2023.122697_b0130
  article-title: Hardware Trojans against virtual keyboards on e-banking platforms – A proof of concept
  publication-title: AEU - International Journal of Electronics and Communications
  doi: 10.1016/j.aeue.2017.04.003
– volume: 2016
  start-page: 12
  issue: 11
  year: 2016
  ident: 10.1016/j.eswa.2023.122697_b0315
  article-title: Insider threat response and recovery strategies in financial services firms
  publication-title: Computer Fraud & Security
  doi: 10.1016/S1361-3723(16)30091-4
– volume: 8
  start-page: 24522
  year: 2020
  ident: 10.1016/j.eswa.2023.122697_b0195
  article-title: Avoiding Future Digital Extortion Through Robust Protection Against Ransomware Threats Using Deep Learning Based Adaptive Approaches
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2970466
– ident: 10.1016/j.eswa.2023.122697_b0535
  doi: 10.1145/3205230.3205234
– volume: 112
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0455
  article-title: A survey on machine learning-based malware detection in executable files
  publication-title: Journal of Systems Architecture
  doi: 10.1016/j.sysarc.2020.101861
– volume: 31
  start-page: 115
  issue: 2–3
  year: 2020
  ident: 10.1016/j.eswa.2023.122697_b0590
  article-title: Bitcoin, Blockchain and Fintech: A systematic review and case studies in the supply chain
  publication-title: Production Planning & Control
  doi: 10.1080/09537287.2019.1631460
– ident: 10.1016/j.eswa.2023.122697_b0445
  doi: 10.1016/S1361-3723(21)00089-0
– year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0605
  article-title: Cryptographic obfuscation for smart contracts: Trustless bitcoin bridge and more
  publication-title: Blockchain: Research and Applications
– volume: 18
  start-page: 1378
  issue: 3
  year: 2021
  ident: 10.1016/j.eswa.2023.122697_b0480
  article-title: DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans
  publication-title: IEEE Transactions on Dependable and Secure Computing
– volume: 27
  start-page: 379
  issue: 3
  year: 1948
  ident: 10.1016/j.eswa.2023.122697_b0440
  article-title: A mathematical theory of communication
  publication-title: Bell System Technical Journal
  doi: 10.1002/j.1538-7305.1948.tb01338.x
– volume: 96
  start-page: 227
  year: 2019
  ident: 10.1016/j.eswa.2023.122697_b0120
  article-title: A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2019.02.013
– volume: 112
  year: 2022
  ident: 10.1016/j.eswa.2023.122697_b0600
  article-title: Traceability in supply chains: A Cyber security analysis
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2021.102536
– volume: 70
  start-page: 618
  year: 2017
  ident: 10.1016/j.eswa.2023.122697_b0485
  article-title: Protecting from Cloud-based SIP flooding attacks by leveraging temporal and structural fingerprints
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2017.08.003
SSID ssj0017007
Score 2.5622654
SecondaryResourceType review_article
Snippet •Adopting PRISMA methodology to investigate cybersecurity threats in FinTech.•Identifying the most effective defense strategies to negate the threats by...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 122697
SubjectTerms Banking trojan
Business sustainability
Cyber-attacks
Data privacy
Financial technology
Title Cybersecurity threats in FinTech: A systematic review
URI https://dx.doi.org/10.1016/j.eswa.2023.122697
Volume 241
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELaqsrDwRpRH5YENpXUSO07YqoqqgOgClbpFjh-iCIWKBiEWfjvn2CkgoQ6Miewo-uzcfRfffYfQeci4ULTQQSjqkpxQBwV48kAmKfhPnpmkzs25myTjKb2ZsVkLDZtaGJtW6W2_s-m1tfZ3-h7N_mI-79_DI8Ed2pNGW4mT2YJfSrnd5b3PVZqHlZ_jTm-PB3a0L5xxOV56-W61h6K4FwINscJPfzmnHw5ntIO2PFPEA_cyu6ilyz203XRhwP6j3Eds-FEAh_N96HD1aGngEs9LPJqX9s_5JR7gb8Fm7IpVDtB0dPUwHAe-GUIgY0KqQEPcknKdiowaJZXkkYFYwBBasEgoCHt4qoEKJUJkKZdxRIxShCoaA4HTPCniQ9QuX0p9hLBhjCsSQ2woCIVFLJgUKTOZJDo0TKQdFDYo5NIrhduGFc95kxL2lFvkcotc7pDroIvVnIXTyVg7mjXg5r9WOwdDvmbe8T_nnaBNuKIuUfEUtavXN30GZKIquvVu6aKNwfXtePIFCLrHUw
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT4NAEJ7U9qAX38b63IM3g10eyy7emsaG2sfFNumNLLBEjMHGYoz_3tmyVE2MB6_AEPItzHzDznwDcGUzLlMvVpYtVy05trJijORW4guMnzzI_FVtznjihzPvfs7mDejVvTC6rNL4_sqnr7y1OdIxaHYWed55wFtiONQ7jboTJxAb0NLqVKwJre5gGE7WmwmcVl3TeL2lDUzvTFXmpZbvWn7IcW9sZCJa--m3-PQt5vR3YduQRdKtnmcPGqrYh516EAMx3-UBsN5HjDTOjKIj5aNmgkuSF6SfF_rn-S3pki_NZlL1qxzCrH837YWWmYdgJS6lpaUwdRFcCRl4WZqkCXcyTAcy6sXMkSlmPlwoZEO-lIHgievQLE2pl3oucjjF_dg9gmbxUqhjIBljPKUupoeSeriOMUukYFmQUGVnTIo22DUKUWLEwvXMiueorgp7ijRykUYuqpBrw_XaZlFJZfx5NavBjX4seIS-_A-7k3_aXcJmOB2PotFgMjyFLTzjVXWLZ9AsX9_UOXKLMr4w784n9SbKBA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cybersecurity+threats+in+FinTech%3A+A+systematic+review&rft.jtitle=Expert+systems+with+applications&rft.au=Javaheri%2C+Danial&rft.au=Fahmideh%2C+Mahdi&rft.au=Chizari%2C+Hassan&rft.au=Lalbakhsh%2C+Pooia&rft.date=2024-05-01&rft.pub=Elsevier+Ltd&rft.issn=0957-4174&rft.eissn=1873-6793&rft.volume=241&rft_id=info:doi/10.1016%2Fj.eswa.2023.122697&rft.externalDocID=S0957417423031998
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0957-4174&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0957-4174&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0957-4174&client=summon