Cybersecurity threats in FinTech: A systematic review
•Adopting PRISMA methodology to investigate cybersecurity threats in FinTech.•Identifying the most effective defense strategies to negate the threats by examining 74 published papers.•Comparing the threats and defenses from different perspectives, including their impacts and technical details.•Propo...
Saved in:
Published in | Expert systems with applications Vol. 241; p. 122697 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Elsevier Ltd
01.05.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | •Adopting PRISMA methodology to investigate cybersecurity threats in FinTech.•Identifying the most effective defense strategies to negate the threats by examining 74 published papers.•Comparing the threats and defenses from different perspectives, including their impacts and technical details.•Proposing a novel and refined taxonomy of security threats and defense strategies in FinTech.•Recommending future research directions to address existing security gaps in current FinTech systems.
The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI) advancements have given rise to sophisticated cyber threats that traditional methods cannot counteract. Cyber threats are extremely critical in financial technology (FinTech) as a data-centric sector expected to provide 24/7 services. This paper introduces a novel and refined taxonomy of security threats in FinTech and conducts a comprehensive systematic review of defensive strategies. Through PRISMA methodology applied to 74 selected studies and topic modeling, we identified 11 central cyber threats, with 43 papers detailing them, and pinpointed 9 corresponding defense strategies, as covered in 31 papers. This in-depth analysis offers invaluable insights for stakeholders ranging from banks and enterprises to global governmental bodies, highlighting both the current challenges in FinTech and effective countermeasures, as well as directions for future research. |
---|---|
AbstractList | •Adopting PRISMA methodology to investigate cybersecurity threats in FinTech.•Identifying the most effective defense strategies to negate the threats by examining 74 published papers.•Comparing the threats and defenses from different perspectives, including their impacts and technical details.•Proposing a novel and refined taxonomy of security threats and defense strategies in FinTech.•Recommending future research directions to address existing security gaps in current FinTech systems.
The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI) advancements have given rise to sophisticated cyber threats that traditional methods cannot counteract. Cyber threats are extremely critical in financial technology (FinTech) as a data-centric sector expected to provide 24/7 services. This paper introduces a novel and refined taxonomy of security threats in FinTech and conducts a comprehensive systematic review of defensive strategies. Through PRISMA methodology applied to 74 selected studies and topic modeling, we identified 11 central cyber threats, with 43 papers detailing them, and pinpointed 9 corresponding defense strategies, as covered in 31 papers. This in-depth analysis offers invaluable insights for stakeholders ranging from banks and enterprises to global governmental bodies, highlighting both the current challenges in FinTech and effective countermeasures, as well as directions for future research. |
ArticleNumber | 122697 |
Author | Fahmideh, Mahdi Hur, Junbeom Chizari, Hassan Lalbakhsh, Pooia Javaheri, Danial |
Author_xml | – sequence: 1 givenname: Danial orcidid: 0000-0002-7275-2370 surname: Javaheri fullname: Javaheri, Danial email: javaheri@korea.ac.kr organization: Department of Computer Science and Engineering, Korea University, Seoul 02841, Republic of Korea – sequence: 2 givenname: Mahdi surname: Fahmideh fullname: Fahmideh, Mahdi email: mahdi.fahmideh@usq.edu.au organization: School of Business, University of Southern Queensland, Springfield, QLD 4300, Australia – sequence: 3 givenname: Hassan orcidid: 0000-0002-6253-1822 surname: Chizari fullname: Chizari, Hassan email: hchizari@glos.ac.uk organization: School of Business, Computing and Social Sciences, University of Gloucestershire, The Park Campus, Cheltenham GL50 2RH, Gloucester, UK – sequence: 4 givenname: Pooia orcidid: 0000-0001-9267-2610 surname: Lalbakhsh fullname: Lalbakhsh, Pooia email: pooia.lalbakhsh@monash.edu organization: Department of Data Science and Artificial Intelligence, Faculty of Information Technology, Monash University, Clayton, VIC 3168, Australia – sequence: 5 givenname: Junbeom orcidid: 0000-0002-4823-4194 surname: Hur fullname: Hur, Junbeom email: jbhur@korea.ac.kr organization: Department of Computer Science and Engineering, Korea University, Seoul 02841, Republic of Korea |
BookMark | eNp9z7FOwzAQxnELFYm28AJMeYGEs53kHMSCKgpIlVjKbLn2RXXVJsg2VHl7UpWJodNN_9P3m7FJ13fE2D2HggOvH3YFxaMpBAhZcCHqBq_YlCuUeY2NnLApNBXmJcfyhs1i3AFwBMApqxbDhkIk-x18GrK0DWRSzHyXLX23Jrt9zJ6zOMREB5O8zQL9eDresuvW7CPd_d05-1y-rBdv-erj9X3xvMqtBEg58VIpJGWasnXWWRRt1WAL5aYSxinkqKjmUBvTKLRSQOsclK6UQnLCeiPnTJ3_2tDHGKjV1qdxR9-lYPxec9Anvt7pE1-f-PrMH1PxL_0K_mDCcDl6Okc0okZo0NF66iw5H8gm7Xp_Kf8F8wp1mQ |
CitedBy_id | crossref_primary_10_1109_ACCESS_2024_3439629 crossref_primary_10_55643_fcaptp_1_60_2025_4571 crossref_primary_10_1016_j_heliyon_2024_e37893 crossref_primary_10_4236_jis_2025_161006 crossref_primary_10_55267_rtic_16176 crossref_primary_10_32628_CSEIT25111210 crossref_primary_10_1016_j_digbus_2024_100099 crossref_primary_10_1016_j_cose_2024_104274 crossref_primary_10_1057_s41599_024_03952_z crossref_primary_10_1007_s10115_025_02382_w crossref_primary_10_1051_itmconf_20257602002 crossref_primary_10_24136_oc_3283 crossref_primary_10_1109_ACCESS_2024_3478830 crossref_primary_10_1016_j_iot_2024_101478 |
Cites_doi | 10.1016/j.techfore.2022.121686 10.1016/S1361-3723(16)30011-2 10.1016/j.jcorpfin.2021.101941 10.1080/0960085X.2021.1944823 10.1186/s42162-021-00139-7 10.1109/TDSC.2016.2580509 10.1016/j.future.2021.12.013 10.1016/j.procs.2022.09.352 10.1145/3411496.3421224 10.1109/TSG.2015.2495133 10.1145/3379542 10.1016/j.dss.2021.113650 10.1016/j.jisa.2014.09.005 10.1080/07421222.2018.1440766 10.1016/j.im.2023.103856 10.1016/j.tre.2021.102553 10.1016/j.eswa.2023.119976 10.1109/ACCESS.2021.3077295 10.1016/j.im.2022.103661 10.1145/3338906.3340441 10.1016/j.ipm.2020.102397 10.1016/j.cose.2021.102239 10.1016/j.eswa.2022.118143 10.1016/j.clsr.2016.11.015 10.1016/j.future.2018.06.055 10.1145/3352020.3352026 10.1016/j.rie.2022.07.001 10.1155/2019/6716918 10.1016/j.adhoc.2023.103259 10.1016/j.cosrev.2020.100233 10.1016/j.jnca.2017.10.011 10.1016/j.procs.2016.08.071 10.1016/j.eap.2022.05.019 10.1109/ACCESS.2018.2884964 10.1016/j.future.2016.01.006 10.1016/j.jksuci.2022.08.029 10.1080/23270012.2018.1528900 10.1016/j.cose.2022.102832 10.1057/s41284-019-00198-2 10.1016/j.jfranklin.2021.07.044 10.1016/j.eswa.2023.120756 10.1109/ICEES51510.2021.9383720 10.1016/j.im.2020.103385 10.1145/3425780 10.1145/3319615 10.1145/3483596 10.1136/bmj.b2700 10.1016/j.cose.2020.102019 10.1016/j.cose.2021.102221 10.1016/j.patrec.2021.11.009 10.1016/j.ipm.2023.103273 10.1016/S1353-4858(15)70001-2 10.1145/3178370 10.1109/TNSM.2021.3112056 10.1145/3199674 10.1016/j.future.2019.03.041 10.1080/14697688.2020.1849779 10.1016/j.cose.2021.102258 10.1145/3530813 10.1016/j.ijcip.2019.100312 10.1016/j.jksuci.2021.12.016 10.1016/j.is.2020.101699 10.1016/j.cose.2022.102756 10.1016/j.chb.2015.08.039 10.1016/j.sysarc.2021.102143 10.1016/j.eswa.2020.113843 10.1145/3199673 10.1057/s41265-017-0047-5 10.1108/SCM-03-2018-0148 10.1016/j.jeconc.2023.100012 10.1016/j.eswa.2022.118042 10.1080/07421222.2018.1440768 10.1145/3372823 10.1016/j.jisa.2022.103167 10.1016/j.irfa.2022.102023 10.1109/ACCESS.2020.3019330 10.1016/j.joitmc.2023.100010 10.1016/j.cose.2021.102316 10.1002/jsc.2404 10.1109/TII.2020.3043458 10.1016/j.cose.2017.09.013 10.1109/ACCESS.2020.2970430 10.1109/TIFS.2021.3054968 10.1016/j.jsis.2018.10.002 10.1109/TIFS.2016.2632071 10.1109/TSG.2020.2977088 10.1145/3391195 10.1016/j.compeleceng.2021.107363 10.1145/3368308.3415366 10.1109/GreenTech48523.2021.00101 10.1016/j.eswa.2023.120404 10.1016/j.ins.2023.01.067 10.1016/S0167-9236(99)00069-X 10.1109/TCAD.2021.3099084 10.1016/j.pmcj.2017.04.005 10.1080/23742917.2017.1386483 10.3390/info9050110 10.1080/10919392.2019.1552747 10.1016/j.eswa.2022.118404 10.1016/j.aeue.2017.04.003 10.1016/S1361-3723(16)30091-4 10.1109/ACCESS.2020.2970466 10.1145/3205230.3205234 10.1016/j.sysarc.2020.101861 10.1080/09537287.2019.1631460 10.1016/S1361-3723(21)00089-0 10.1002/j.1538-7305.1948.tb01338.x 10.1016/j.future.2019.02.013 10.1016/j.cose.2021.102536 10.1016/j.cose.2017.08.003 |
ContentType | Journal Article |
Copyright | 2023 Elsevier Ltd |
Copyright_xml | – notice: 2023 Elsevier Ltd |
DBID | AAYXX CITATION |
DOI | 10.1016/j.eswa.2023.122697 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1873-6793 |
ExternalDocumentID | 10_1016_j_eswa_2023_122697 S0957417423031998 |
GroupedDBID | --K --M .DC .~1 0R~ 13V 1B1 1RT 1~. 1~5 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN 9JO AAAKF AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AARIN AAXUO AAYFN ABBOA ABFNM ABMAC ABMVD ABUCO ABYKQ ACDAQ ACGFS ACHRH ACNTT ACRLP ACZNC ADBBV ADEZE ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGJBL AGUBO AGUMN AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJOXV ALEQD ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD APLSM AXJTR BJAXD BKOJK BLXMC BNSAS CS3 DU5 EBS EFJIC EFLBG EO8 EO9 EP2 EP3 F5P FDB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HAMUX IHE J1W JJJVA KOM MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 ROL RPZ SDF SDG SDP SDS SES SEW SPC SPCBC SSB SSD SSL SST SSV SSZ T5K TN5 ~G- 29G AAAKG AAQXK AATTM AAXKI AAYWO AAYXX ABJNI ABKBG ABWVN ABXDB ACNNM ACRPL ACVFH ADCNI ADJOM ADMUD ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP ASPBG AVWKF AZFZN BNPGV CITATION EJD FEDTE FGOYB G-2 HLZ HVGLF HZ~ LG9 LY1 LY7 M41 R2- RIG SBC SET SSH WUQ XPP ZMT |
ID | FETCH-LOGICAL-c300t-e14887e8a94fdcdc72f597f04b52ad87178e6106aa987c320fdd04d43231e76b3 |
IEDL.DBID | .~1 |
ISSN | 0957-4174 |
IngestDate | Tue Jul 01 04:06:18 EDT 2025 Thu Apr 24 23:10:24 EDT 2025 Sat Feb 17 16:07:28 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Financial technology Data privacy Cyber-attacks Banking trojan Business sustainability |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c300t-e14887e8a94fdcdc72f597f04b52ad87178e6106aa987c320fdd04d43231e76b3 |
ORCID | 0000-0001-9267-2610 0000-0002-4823-4194 0000-0002-6253-1822 0000-0002-7275-2370 |
ParticipantIDs | crossref_citationtrail_10_1016_j_eswa_2023_122697 crossref_primary_10_1016_j_eswa_2023_122697 elsevier_sciencedirect_doi_10_1016_j_eswa_2023_122697 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-05-01 2024-05-00 |
PublicationDateYYYYMMDD | 2024-05-01 |
PublicationDate_xml | – month: 05 year: 2024 text: 2024-05-01 day: 01 |
PublicationDecade | 2020 |
PublicationTitle | Expert systems with applications |
PublicationYear | 2024 |
Publisher | Elsevier Ltd |
Publisher_xml | – name: Elsevier Ltd |
References | Lee, de Guzman, Wang, Gupta, Rao (b0450) 2022; 121 Clark, Leblanc, Knight (b0395) 2011; 2011 Millions of records leaked as T-Mobile is breached for the sixth time in four years Lee (b0355) 2015 2021. Hassani, Huang, Silva (b0570) Oct. 2018; 5 Ahmad (b0430) 2021; 54 Javaheri, Hosseinzadeh, Rahmani (b0110) 2018; 6 Chao, Ran, Chen, Li, Qian, Ergu (b0665) 2022; 80 Davies, Macfarlane, Buchanan (b0190) 2020; 33 Sha, Xiao, Huang, Chen, Wang (b0235) Jun. 2019; 18 Bunnell, Osei-Bryson, Yoon (b0640) Mar. 2021; 165 Ashta, Herrmann (b0020) May 2021; 30 Prachi, Sharma (b0475) Nov. 2023; 230 Guo, Zhang, Liu, Wang, Ding (b0545) Dec. 2021; 151 Botacin, De Geus, grégio (b0350) Jul. 2018; 51 Wang, Yang, Zhong (b0145) 2021; 358 Black, Gondal, Layton (b0105) 2018; 77 Sharifian, Barekatain, Quintana, Beheshti, Safi-Esfahani (b0155) Oct. 2023; 228 Airehrour, Vasudevan Nair, Madanian (b0405) 2018; 9 Javaheri, Lalbakhsh, Hosseinzadeh (b0240) 2021; 9 Gan (b0330) Jul. 2019; 53 vol. 2016, no. 2, pp. 1–3, Feb. 2016, 10.1016/S1361-3723(16)30011-2. vol. 16, no. 2, pp. 261–308, [Online]. Available: https://heinonline.org/HOL/P?h=hein.journals/ucdbulj16&i=271. Wang, Ma, Chen (b0415) 2022 Cascavilla, Tamburri, Van Den Heuvel (b0630) 2021; 105 Fahmideh (b0510) Dec. 2022; 55 Yuan, Wu (b0325) 2021; 104 Madan, Sofat, Bansal (b0265) 2022 Singh, Singh (b0455) 2021; 112 Taheri, Shojafar, Alazab, Tafazolli (b0270) 2021; 17 Hernández, Öztürk, Sittón, Rodríguez (b0495) 2019; 1047 Huang, Siegel, Madnick (b0065) Jul. 2018; 51 Sori, Golsorkhtabaramiri, Sori (b0520) 2021; 2021 Du, Pan, Leidner, Ying (b0550) Mar. 2019; 28 Mustafa, Xu, Sadeghi, Schulz (b0160) May 2018; 15 Hadnagy (b0340) 2018 Yang, Xia, Yang (b0290) 2020; 170 Al Hasan (b0685) Jun. 2023; 19 Mehrban (b0070) 2020; 8 Zimba, Wang, Mulenga (b0565) Jan. 2019; 29 Karim, Naz, Naeem, Vigne (b0050) 2022; 75 Hubbard, Seierse (b0645) 2016 Bai, Han, Mezzour, Pierazzi, Subrahmanian (b0675) 2021; 18 Li, Wang, Ni (b0335) 2022; 104 Y. Wang, M. McCoey, and Q. Hu, “Developing an Undergraduate Course Curriculum for Ethical Hacking,” Stellios, Kotzanikolaou, Grigoriadis (b0275) 2021; 107 Gai, Qiu, Sun (b0060) 2018; 103 vol. 21, no. 3, Apr. 2018, 10.1145/3178370. Muthukannan, Tan, Gozman, Johnson (b0005) Dec. 2020; 57 Button, Hock, Shepherd, Gilmour (b0410) Sep. 2023; 1 Ali, Azad, Parreno Centeno, Hao, van Moorsel (b0420) 2019; 100 M. Carminati, M. Polino, A. Continella, A. Lanzi, F. Maggi, and S. Zanero, “Security Evaluation of a Banking Fraud Analysis System,” Han, Park, Lee (b0285) 2019; 26 Y. Hong, H. Kwon, J. Lee, and J. Hur, “A practical de-mixing algorithm for bitcoin mixing services.” in Golait, Hubballi (b0165) Mar. 2017; 12 Wang, Hui, Yiu, Wang, Fang (b0300) Aug. 2017; 39 Sullivan, Burger (b0635) 2017; 33 N. Burow, R. Burrow, R. Khazan, H. Shrobe, and B. C. Ward, “Moving Target Defense Considerations in Real-Time Safety- and Mission-Critical Systems,” in Currie, Gozman, Seddon (b0670) Dec. 2018; 33 Grobys (b0560) Aug. 2021; 21 vol. 35, no. 1, pp. 145–179, Jan. 2018, 10.1080/07421222.2018.1440768. D. Gozman, J. Liebenau, and J. Mangan, “The Innovation Mechanisms of Fintech Start-Ups: Insights from SWIFT’s Innotribe Competition,” Liang, Zhao, Luo, Weller, Dong (b0295) 2017; 8 Berdik, Otoum, Schmidt, Porter, Jararweh (b0540) Jan. 2021; 58 Liberati (b0090) 2009; 339 Naik, Jenkins, Savage, Yang, Boongoen, Iam-On (b0460) 2021; 37 Bajunaied, Hussin, Kamarudin (b0055) Mar. 2023; 9 Syed, Shah, Trujillo-Rasua, Doss (b0600) 2022; 112 Pisoni, Díaz-Rodríguez (b0660) May 2023; 60 Rio (b0380) 2016; 10 S. V. Kumar, G. A. A. Mary, P. Suresh, and R. Uthirasamy, “Investigation On Cyber-Attacks Against In-Vehicle Network,” in Jiang, Lora, Chattopadhyay (b0255) May 2020; 20 Ge, Lalbakhsh, Isai, Lenskiy, Suominen (b0040) Jan. 2022; 55 Hou, Wang (b0210) Nov. 2020; 98 de Leon, Jillepalli, House, Alves-Foss, Sheldon (b0615) Oct. 2018; 34 J. Freund, Jones, Jack,, “Measuring and managing information risk : a FAIR approach.” 2015. [Online]. Available: http://www.books24x7.com/marc.asp?bookid=73433. in MTD’20. New York, NY, USA: Association for Computing Machinery, 2020, pp. 81–89. 10.1145/3411496.3421224. Chen, Pendleton, Njilla, Xu (b0075) Jun. 2020; 53 Sharmeen, Ahmed, Huda, Koçer, Hassan (b0195) 2020; 8 Erola, Agrafiotis, Goldsmith, Creese (b0320) 2022; 67 Alahmari, Renaud, Omoronyia (b0625) 2022; no. 0123456789 Wang, Han, Beynon-Davies (b0580) Mar. 2019; 24 Babun, Aksu, Uluagac (b0470) 2021; 16 Rizvi, Mirkovic, Heidemann, Hardaker, Story (b0180) Dec. 2023; 151 Jing, Wu, Cui (b0465) 2022; 130 pp. 15–20, May 2018, 10.1145/3205230.3205234. vol. 35, no. 1, pp. 220–265, Jan. 2018, 10.1080/07421222.2018.1440766. Bollaert, Lopez-de-Silanes, Schwienbacher (b0080) 2021; 68 Grace, Sughasiny (b0680) Dec. 2022; 210 Malaquias, Hwang (b0490) Jan. 2016; 54 2021, pp. 305–311. 10.1109/ICEES51510.2021.9383720. Rambow, Andorka, Rambow-Hoeschele (b0370) 2020 Dassouki, Safa, Nassar, Hijazi (b0485) Sep. 2017; 70 vol. 53, no. 1, Feb. 2020, 10.1145/3372823. McDermott, Petrovski, Majdani (b0250) 2018 Noor, Anwar, Amjad, Choo (b0120) 2019; 96 Masoud, Al-Utaibi (b0655) Jun. 2022; 76 Lei, Ngai (b0515) Aug. 2023 HSBC bank and Irish National Lottery among latest DDoS victims Nasir, Jan, Pamucar, Khan (b0045) Aug. 2023; 224 Almakhour, Sliman, Samhat, Mellouk (b0610) 2023; 35 Ambore, Richardson, Dogan, Apeh, Osselton (b0095) Oct. 2017; 1 Qiu, Gai, Thuraisingham, Tao, Zhao (b0500) 2018; 80 He, Almasifar, Mehbodniya, Javaheri, Webber (b0225) 2022; 36 N. Kaloudi and J. Li, “The AI-Based Cyber Threat Landscape: A Survey,” Vijayakumar, Shiny Angel (b0170) Dec. 2021; 152 Härting, Bühler, Winter, Gugel (b0220) 2022; 207 Chen, Chen (b0530) Nov. 2022; 207 Soni, Kumar, Mahto, Mangla, Mittal, Lim (b0230) Jul. 2022; 180 Mirsky, Lee (b0030) Jan. 2021; 54 Lee, Assante, Conway (b0280) 2016 Yemini, Dailianas, Florissi, Huberman (b0505) 2000; 28 Peris-Lopez, Martín (b0130) Jun. 2017; 76 Sadok, Welch, Bednar (b0215) 2020; 33 pp. 330–335, Oct. 2020, 10.1145/3368308.3415366. P. Gomber, R. J. Kauffman, C. Parker, and B. W. Weber, “On the Fintech Revolution: Interpreting the Forces of Innovation, Disruption, and Transformation in Financial Services,” Vignau, Khoury, Hallé, Hamou-Lhadj (b0260) Jun. 2021; 116 Suegami (b0605) 2022 Venkatachary, Alagappan, Andrews (b0305) 2021; 4 Stallings, Brown (b0100) 2018 Raddatz, Coyne, Menard, Crossler (b0525) 2021; 32 T. Jin Sindhwani, Hasteer, Behl, Chatterjee, Hamzi (b0575) Sep. 2023; 2023 Suryawanshi, Dutta (b0595) 2022; 157 Paul, Adhikari, Bose (b0585) Sep. 2022; 59 Shillair, Esteve-González, Dutton, Creese, Nagyfejeo, von Solms (b0620) 2022; 119 Pérez-Díaz, Valdovinos, Choo, Zhu (b0140) 2020; 8 Fosso Wamba, Kala Kamdjoug, Epie Bawack, Keogh (b0590) Feb. 2020; 31 FinExpert: Domain-specific test generation for FinTech systems Doubts remain over whether North Korea was responsible for massive hack of Sony Pictures. Bai, Han, Mezzour, Pierazzi, Subrahmanian (b0480) May 2021; 18 Al-Hamar, Kolivand, Tajdini, Saba, Ramachandran (b0400) 2021; 94 Xia, Wang, Gauthier, Zhang (b0555) Dec. 2022; 208 Javaheri, Gorgin, Lee, Masdari (b0175) 2023; 626 Min, Ko, Walker, Lee, Kim (b0205) 2022; 41 vol. 2021, no. 9, pp. 1–3, 2021, 10.1016/S1361-3723(21)00089-0. Molina, Torabi, Sarieddine, Bou-Harb, Bouguila, Assi (b0200) 2022; 19 Khanna, Zavarsky, Lindskog (b0385) 2016; 94 M. Mocanu, “Management of Cyber-Espionage Intrusions,” in Santini, Gottardi, Baldi, Chiaraluce (b0115) 2019; 2019 Zhang, Upton, Beebe, Choo (b0245) 2020; 32 Xu, Lin, Zhang, Wang (b0310) 2020; 11 Ghafir (b0125) 2018; 89 Keshavarzi, Ghaffary (b0185) 2020; 36 Granger (b0390) 2003 Krombholz, Hobel, Huber, Weippl (b0345) 2015; 22 Varga, Brynielsson, Franke (b0150) 2021; 105 L. J. Trautman, “E-Commerce, Cyber, and Electronic Payment System Risks: Lessons from PayPal,” Eggenschwiler, Agrafiotis, Nurse (b0315) 2016; 2016 Liebrenz, Schleifer, Buadze, Bhugra, Smith (b0035) 2023; 5 pp. 853–862, Aug. 2019, 10.1145/3338906.3340441. vol. 2015, no. 1, pp. 1–2, 2015, 10.1016/S1353-4858(15)70001-2. Shannon (b0440) Jul. 1948; 27 Muthukannan (10.1016/j.eswa.2023.122697_b0005) 2020; 57 10.1016/j.eswa.2023.122697_b0445 Huang (10.1016/j.eswa.2023.122697_b0065) 2018; 51 Sha (10.1016/j.eswa.2023.122697_b0235) 2019; 18 Suegami (10.1016/j.eswa.2023.122697_b0605) 2022 Zhang (10.1016/j.eswa.2023.122697_b0245) 2020; 32 Suryawanshi (10.1016/j.eswa.2023.122697_b0595) 2022; 157 Grace (10.1016/j.eswa.2023.122697_b0680) 2022; 210 Pérez-Díaz (10.1016/j.eswa.2023.122697_b0140) 2020; 8 McDermott (10.1016/j.eswa.2023.122697_b0250) 2018 Pisoni (10.1016/j.eswa.2023.122697_b0660) 2023; 60 Molina (10.1016/j.eswa.2023.122697_b0200) 2022; 19 Davies (10.1016/j.eswa.2023.122697_b0190) 2020; 33 Gan (10.1016/j.eswa.2023.122697_b0330) 2019; 53 10.1016/j.eswa.2023.122697_b0690 Rizvi (10.1016/j.eswa.2023.122697_b0180) 2023; 151 Lei (10.1016/j.eswa.2023.122697_b0515) 2023 Noor (10.1016/j.eswa.2023.122697_b0120) 2019; 96 de Leon (10.1016/j.eswa.2023.122697_b0615) 2018; 34 10.1016/j.eswa.2023.122697_b0435 Malaquias (10.1016/j.eswa.2023.122697_b0490) 2016; 54 Mirsky (10.1016/j.eswa.2023.122697_b0030) 2021; 54 Härting (10.1016/j.eswa.2023.122697_b0220) 2022; 207 Hubbard (10.1016/j.eswa.2023.122697_b0645) 2016 Qiu (10.1016/j.eswa.2023.122697_b0500) 2018; 80 Granger (10.1016/j.eswa.2023.122697_b0390) 2003 Fosso Wamba (10.1016/j.eswa.2023.122697_b0590) 2020; 31 Lee (10.1016/j.eswa.2023.122697_b0450) 2022; 121 Babun (10.1016/j.eswa.2023.122697_b0470) 2021; 16 Hadnagy (10.1016/j.eswa.2023.122697_b0340) 2018 Sharmeen (10.1016/j.eswa.2023.122697_b0195) 2020; 8 Ali (10.1016/j.eswa.2023.122697_b0420) 2019; 100 Singh (10.1016/j.eswa.2023.122697_b0455) 2021; 112 Krombholz (10.1016/j.eswa.2023.122697_b0345) 2015; 22 Karim (10.1016/j.eswa.2023.122697_b0050) 2022; 75 Hassani (10.1016/j.eswa.2023.122697_b0570) 2018; 5 Santini (10.1016/j.eswa.2023.122697_b0115) 2019; 2019 Jiang (10.1016/j.eswa.2023.122697_b0255) 2020; 20 10.1016/j.eswa.2023.122697_b0425 Guo (10.1016/j.eswa.2023.122697_b0545) 2021; 151 Bollaert (10.1016/j.eswa.2023.122697_b0080) 2021; 68 10.1016/j.eswa.2023.122697_b0025 Wang (10.1016/j.eswa.2023.122697_b0145) 2021; 358 Ahmad (10.1016/j.eswa.2023.122697_b0430) 2021; 54 Zimba (10.1016/j.eswa.2023.122697_b0565) 2019; 29 Varga (10.1016/j.eswa.2023.122697_b0150) 2021; 105 Hou (10.1016/j.eswa.2023.122697_b0210) 2020; 98 Clark (10.1016/j.eswa.2023.122697_b0395) 2011; 2011 Al-Hamar (10.1016/j.eswa.2023.122697_b0400) 2021; 94 Sori (10.1016/j.eswa.2023.122697_b0520) 2021; 2021 Sindhwani (10.1016/j.eswa.2023.122697_b0575) 2023; 2023 Javaheri (10.1016/j.eswa.2023.122697_b0175) 2023; 626 Venkatachary (10.1016/j.eswa.2023.122697_b0305) 2021; 4 Lee (10.1016/j.eswa.2023.122697_b0355) 2015 10.1016/j.eswa.2023.122697_b0535 Du (10.1016/j.eswa.2023.122697_b0550) 2019; 28 10.1016/j.eswa.2023.122697_b0015 10.1016/j.eswa.2023.122697_b0135 Vignau (10.1016/j.eswa.2023.122697_b0260) 2021; 116 10.1016/j.eswa.2023.122697_b0375 Button (10.1016/j.eswa.2023.122697_b0410) 2023; 1 10.1016/j.eswa.2023.122697_b0650 Javaheri (10.1016/j.eswa.2023.122697_b0240) 2021; 9 Airehrour (10.1016/j.eswa.2023.122697_b0405) 2018; 9 Botacin (10.1016/j.eswa.2023.122697_b0350) 2018; 51 Liebrenz (10.1016/j.eswa.2023.122697_b0035) 2023; 5 Bunnell (10.1016/j.eswa.2023.122697_b0640) 2021; 165 Wang (10.1016/j.eswa.2023.122697_b0300) 2017; 39 Bai (10.1016/j.eswa.2023.122697_b0480) 2021; 18 Berdik (10.1016/j.eswa.2023.122697_b0540) 2021; 58 Keshavarzi (10.1016/j.eswa.2023.122697_b0185) 2020; 36 Sharifian (10.1016/j.eswa.2023.122697_b0155) 2023; 228 Javaheri (10.1016/j.eswa.2023.122697_b0110) 2018; 6 Min (10.1016/j.eswa.2023.122697_b0205) 2022; 41 Yemini (10.1016/j.eswa.2023.122697_b0505) 2000; 28 Sadok (10.1016/j.eswa.2023.122697_b0215) 2020; 33 Li (10.1016/j.eswa.2023.122697_b0335) 2022; 104 Shannon (10.1016/j.eswa.2023.122697_b0440) 1948; 27 Mehrban (10.1016/j.eswa.2023.122697_b0070) 2020; 8 10.1016/j.eswa.2023.122697_b0365 Al Hasan (10.1016/j.eswa.2023.122697_b0685) 2023; 19 Rambow (10.1016/j.eswa.2023.122697_b0370) 2020 Mustafa (10.1016/j.eswa.2023.122697_b0160) 2018; 15 Almakhour (10.1016/j.eswa.2023.122697_b0610) 2023; 35 Ge (10.1016/j.eswa.2023.122697_b0040) 2022; 55 Black (10.1016/j.eswa.2023.122697_b0105) 2018; 77 Fahmideh (10.1016/j.eswa.2023.122697_b0510) 2022; 55 Paul (10.1016/j.eswa.2023.122697_b0585) 2022; 59 10.1016/j.eswa.2023.122697_b0010 Yuan (10.1016/j.eswa.2023.122697_b0325) 2021; 104 Hernández (10.1016/j.eswa.2023.122697_b0495) 2019; 1047 He (10.1016/j.eswa.2023.122697_b0225) 2022; 36 Syed (10.1016/j.eswa.2023.122697_b0600) 2022; 112 Liang (10.1016/j.eswa.2023.122697_b0295) 2017; 8 Prachi (10.1016/j.eswa.2023.122697_b0475) 2023; 230 Cascavilla (10.1016/j.eswa.2023.122697_b0630) 2021; 105 Shillair (10.1016/j.eswa.2023.122697_b0620) 2022; 119 Dassouki (10.1016/j.eswa.2023.122697_b0485) 2017; 70 Bai (10.1016/j.eswa.2023.122697_b0675) 2021; 18 Madan (10.1016/j.eswa.2023.122697_b0265) 2022 Wang (10.1016/j.eswa.2023.122697_b0415) 2022 Jing (10.1016/j.eswa.2023.122697_b0465) 2022; 130 Alahmari (10.1016/j.eswa.2023.122697_b0625) 2022; no. 0123456789 Khanna (10.1016/j.eswa.2023.122697_b0385) 2016; 94 Golait (10.1016/j.eswa.2023.122697_b0165) 2017; 12 Chen (10.1016/j.eswa.2023.122697_b0075) 2020; 53 Nasir (10.1016/j.eswa.2023.122697_b0045) 2023; 224 10.1016/j.eswa.2023.122697_b0085 10.1016/j.eswa.2023.122697_b0360 Grobys (10.1016/j.eswa.2023.122697_b0560) 2021; 21 Liberati (10.1016/j.eswa.2023.122697_b0090) 2009; 339 Eggenschwiler (10.1016/j.eswa.2023.122697_b0315) 2016; 2016 Raddatz (10.1016/j.eswa.2023.122697_b0525) 2021; 32 Bajunaied (10.1016/j.eswa.2023.122697_b0055) 2023; 9 Chen (10.1016/j.eswa.2023.122697_b0530) 2022; 207 Ambore (10.1016/j.eswa.2023.122697_b0095) 2017; 1 Stallings (10.1016/j.eswa.2023.122697_b0100) 2018 Taheri (10.1016/j.eswa.2023.122697_b0270) 2021; 17 Han (10.1016/j.eswa.2023.122697_b0285) 2019; 26 Ghafir (10.1016/j.eswa.2023.122697_b0125) 2018; 89 Naik (10.1016/j.eswa.2023.122697_b0460) 2021; 37 Sullivan (10.1016/j.eswa.2023.122697_b0635) 2017; 33 Rio (10.1016/j.eswa.2023.122697_b0380) 2016; 10 Xia (10.1016/j.eswa.2023.122697_b0555) 2022; 208 Lee (10.1016/j.eswa.2023.122697_b0280) 2016 Yang (10.1016/j.eswa.2023.122697_b0290) 2020; 170 Chao (10.1016/j.eswa.2023.122697_b0665) 2022; 80 10.1016/j.eswa.2023.122697_b0695 Masoud (10.1016/j.eswa.2023.122697_b0655) 2022; 76 Peris-Lopez (10.1016/j.eswa.2023.122697_b0130) 2017; 76 Ashta (10.1016/j.eswa.2023.122697_b0020) 2021; 30 Gai (10.1016/j.eswa.2023.122697_b0060) 2018; 103 Currie (10.1016/j.eswa.2023.122697_b0670) 2018; 33 Vijayakumar (10.1016/j.eswa.2023.122697_b0170) 2021; 152 Erola (10.1016/j.eswa.2023.122697_b0320) 2022; 67 Soni (10.1016/j.eswa.2023.122697_b0230) 2022; 180 Wang (10.1016/j.eswa.2023.122697_b0580) 2019; 24 Xu (10.1016/j.eswa.2023.122697_b0310) 2020; 11 Stellios (10.1016/j.eswa.2023.122697_b0275) 2021; 107 |
References_xml | – volume: 32 year: 2020 ident: b0245 article-title: IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers publication-title: Forensic Science International: Digital Investigation – volume: 37 year: 2021 ident: b0460 article-title: Fuzzy-import hashing: A static analysis technique for malware detection publication-title: Forensic Science International: Digital Investigation – volume: 112 year: 2021 ident: b0455 article-title: A survey on machine learning-based malware detection in executable files publication-title: Journal of Systems Architecture – reference: , vol. 53, no. 1, Feb. 2020, 10.1145/3372823. – volume: 39 start-page: 52 year: Aug. 2017 end-page: 64 ident: b0300 article-title: A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities publication-title: Pervasive and Mobile Computing – reference: , pp. 15–20, May 2018, 10.1145/3205230.3205234. – year: 2022 ident: b0265 article-title: Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review publication-title: Journal of King Saud University - Computer and Information Sciences – reference: Y. Hong, H. Kwon, J. Lee, and J. Hur, “A practical de-mixing algorithm for bitcoin mixing services.” in – volume: 21 start-page: 1267 year: Aug. 2021 end-page: 1279 ident: b0560 article-title: When the blockchain does not block: On hackings and uncertainty in the cryptocurrency market publication-title: Quant Finance – reference: , vol. 2015, no. 1, pp. 1–2, 2015, 10.1016/S1353-4858(15)70001-2. – reference: , vol. 35, no. 1, pp. 145–179, Jan. 2018, 10.1080/07421222.2018.1440768. – volume: 76 start-page: 146 year: Jun. 2017 end-page: 151 ident: b0130 article-title: Hardware Trojans against virtual keyboards on e-banking platforms – A proof of concept publication-title: AEU - International Journal of Electronics and Communications – volume: 55 year: Dec. 2022 ident: b0510 article-title: Engineering Blockchain-Based Software Systems: Foundations, Survey, and Future Directions publication-title: ACM Computing Surveys – volume: 53 start-page: 34 year: Jul. 2019 end-page: 39 ident: b0330 article-title: Leveraging Deep Learning to Improve Performance Predictability in Cloud Microservices with Seer publication-title: SIGOPS Oper. Syst. Rev. – volume: 77 start-page: 756 year: 2018 end-page: 772 ident: b0105 article-title: A survey of similarities in banking malware behaviours publication-title: Computers & Security – reference: N. Kaloudi and J. Li, “The AI-Based Cyber Threat Landscape: A Survey,” – volume: 121 year: 2022 ident: b0450 article-title: Investigating perceptions about risk of data breaches in financial institutions: A routine activity-approach publication-title: Computers & Security – volume: 94 year: 2021 ident: b0400 article-title: Enterprise Credential Spear-phishing attack detection publication-title: Computers & Electrical Engineering – volume: 230 year: Nov. 2023 ident: b0475 article-title: MalAnalyser: An effective and efficient Windows malware detection method based on API call sequences publication-title: Expert Systems with Applications – volume: 59 year: Sep. 2022 ident: b0585 article-title: White knight in dark days? Supply chain finance firms, blockchain, and the COVID-19 pandemic publication-title: Information & Management – volume: 17 start-page: 8442 year: 2021 end-page: 8452 ident: b0270 article-title: Fed-IIoT: A Robust Federated Malware Detection Architecture in Industrial IoT publication-title: IEEE Trans Industr Inform – volume: 58 year: Jan. 2021 ident: b0540 article-title: A Survey on Blockchain for Information Systems Management and Security publication-title: Information Processing and Management – volume: 9 year: 2018 ident: b0405 article-title: Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model publication-title: Information – volume: 96 start-page: 227 year: 2019 end-page: 242 ident: b0120 article-title: A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise publication-title: Future Generation Computer Systems – volume: 5 start-page: pp year: 2023 ident: b0035 article-title: Generating scholarly content with ChatGPT: Ethical challenges for medical publishing publication-title: Lancet Digit Health – volume: 54 start-page: 70 year: 2021 end-page: 74 ident: b0430 article-title: Do data almost always eventually leak? publication-title: Computer (Long Beach Calif) – volume: 33 start-page: 304 year: Dec. 2018 end-page: 325 ident: b0670 article-title: Dialectic tensions in the financial markets: A longitudinal study of pre- and post-crisis regulatory technology publication-title: Journal of Information Technology – volume: 2019 start-page: 6716918 year: 2019 ident: b0115 article-title: A Data-Driven Approach to Cyber Risk Assessment publication-title: Security and Communication Networks – volume: 12 start-page: 730 year: Mar. 2017 end-page: 745 ident: b0165 article-title: Detecting Anomalous Behavior in VoIP Systems: A Discrete Event System Modeling publication-title: IEEE Transactions on Information Forensics and Security – volume: 6 year: 2018 ident: b0110 article-title: Detection and elimination of spyware and ransomware by intercepting kernel-level system routines publication-title: IEEE Access – volume: 4 start-page: 5 year: 2021 ident: b0305 article-title: Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security? publication-title: Energy Informatics – volume: 151 year: Dec. 2021 ident: b0545 article-title: Bitcoin price forecasting: A perspective of underlying blockchain transactions publication-title: Decision Support Systems – year: 2016 ident: b0645 article-title: How to Measure Anything in Cybersecurity Risk – volume: 35 start-page: 70 year: 2023 end-page: 86 ident: b0610 article-title: A formal verification approach for composite smart contracts security using FSM publication-title: Journal of King Saud University - Computer and Information Sciences – reference: N. Burow, R. Burrow, R. Khazan, H. Shrobe, and B. C. Ward, “Moving Target Defense Considerations in Real-Time Safety- and Mission-Critical Systems,” in – volume: 165 year: Mar. 2021 ident: b0640 article-title: Development of a consumer financial goals ontology for use with FinTech applications for improving financial capability publication-title: Expert Systems with Applications – volume: 358 start-page: 7237 year: 2021 end-page: 7253 ident: b0145 article-title: Improved results on consensus of nonlinear MASs with nonhomogeneous Markov switching topologies and DoS cyber attacks publication-title: Journal of the Franklin Institute – volume: 70 start-page: 618 year: Sep. 2017 end-page: 633 ident: b0485 article-title: Protecting from Cloud-based SIP flooding attacks by leveraging temporal and structural fingerprints publication-title: Computers & Security – volume: 151 year: Dec. 2023 ident: b0180 article-title: Defending Root DNS Servers against DDoS Using Layered Defenses (Extended) publication-title: Ad Hoc Networks – volume: 68 year: 2021 ident: b0080 article-title: Fintech and access to finance publication-title: Journal of Corporate Finance – reference: , vol. 16, no. 2, pp. 261–308, [Online]. Available: https://heinonline.org/HOL/P?h=hein.journals/ucdbulj16&i=271. – volume: 210 year: Dec. 2022 ident: b0680 article-title: Behaviour analysis of inter-app communication using a lightweight monitoring app for malware detection publication-title: Expert Systems with Applications – reference: J. Freund, Jones, Jack,, “Measuring and managing information risk : a FAIR approach.” 2015. [Online]. Available: http://www.books24x7.com/marc.asp?bookid=73433. – volume: 57 year: Dec. 2020 ident: b0005 article-title: The emergence of a Fintech Ecosystem: A case study of the Vizag Fintech Valley in India publication-title: Information & Management – volume: 228 year: Oct. 2023 ident: b0155 article-title: Sin-Cos-bIAVOA: A new feature selection method based on improved African vulture optimization algorithm and a novel transfer function to DDoS attack detection publication-title: Expert Systems with Applications – volume: 18 year: Jun. 2019 ident: b0235 article-title: Catching Escapers: A Detection Method for Advanced Persistent Escapers in Industry Internet of Things Based on Identity-Based Broadcast Encryption (IBBE) publication-title: ACM Transactions on Embedded Computing Systems – volume: 31 start-page: 115 year: Feb. 2020 end-page: 142 ident: b0590 article-title: Bitcoin, Blockchain and Fintech: A systematic review and case studies in the supply chain publication-title: Production Planning & Control – volume: 112 year: 2022 ident: b0600 article-title: Traceability in supply chains: A Cyber security analysis publication-title: Computers & Security – reference: , pp. 853–862, Aug. 2019, 10.1145/3338906.3340441. – volume: 152 start-page: 428 year: Dec. 2021 end-page: 435 ident: b0170 article-title: Performing Attack Halting Process with Digital Pattern and Proactive Model Resolving the Security Issues in IoT Based Models publication-title: Pattern Recognition Letters – year: 2022 ident: b0415 article-title: Attentive statement fraud detection: Distinguishing multimodal financial data with fine-grained attention publication-title: Decision Support Systems – volume: 20 year: May 2020 ident: b0255 article-title: An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices publication-title: ACM Transactions on Internet Technology – reference: , vol. 21, no. 3, Apr. 2018, 10.1145/3178370. – volume: 9 year: Mar. 2023 ident: b0055 article-title: Behavioral intention to adopt FinTech services: An extension of unified theory of acceptance and use of technology publication-title: Journal of Open Innovation: Technology, Market, and Complexity – volume: 36 year: 2022 ident: b0225 article-title: Towards green smart cities using Internet of Things and optimization algorithms: A systematic and bibliometric review publication-title: Sustainable Computing: Informatics and Systems – year: 2018 ident: b0250 publication-title: Towards Situational Awareness of Botnet Activity in the Internet of Things – volume: 19 start-page: 19 year: 2022 end-page: 36 ident: b0200 article-title: On Ransomware Family Attribution Using Pre-Attack Paranoia Activities publication-title: IEEE Transactions on Network and Service Management – volume: 22 start-page: 113 year: 2015 end-page: 122 ident: b0345 article-title: Advanced social engineering attacks publication-title: Journal of Information Security and Applications – volume: 94 start-page: 459 year: 2016 end-page: 464 ident: b0385 article-title: Experimental Analysis of Tools Used for Doxing and Proposed New Transforms to Help Organizations Protect against Doxing Attacks publication-title: Procedia Computer Science – reference: , vol. 2021, no. 9, pp. 1–3, 2021, 10.1016/S1361-3723(21)00089-0. – volume: 11 start-page: 3438 year: 2020 end-page: 3446 ident: b0310 article-title: Power System Parameter Attack for Financial Profits in Electricity Markets publication-title: IEEE Transactions on Smart Grid – volume: 34 start-page: 242 year: Oct. 2018 end-page: 254 ident: b0615 article-title: Tutorials and Laboratory for Hands-on OS Cybersecurity Instruction publication-title: Journal of Computing Sciences in Colleges – volume: 33 start-page: 14 year: 2017 end-page: 29 ident: b0635 article-title: ‘In the public interest’: The privacy implications of international business-to-business sharing of cyber-threat intelligence publication-title: Computer Law & Security Review – reference: , vol. 2016, no. 2, pp. 1–3, Feb. 2016, 10.1016/S1361-3723(16)30011-2. – volume: 5 start-page: 256 year: Oct. 2018 end-page: 275 ident: b0570 article-title: Banking with blockchain-ed big data publication-title: Journal of Management Analytics – volume: 67 year: 2022 ident: b0320 article-title: Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations publication-title: Journal of Information Security and Applications – volume: 104 year: 2022 ident: b0335 article-title: Aligning social concerns with information system security: A fundamental ontology for social engineering publication-title: Information Systems – volume: 100 start-page: 408 year: 2019 end-page: 427 ident: b0420 article-title: Consumer-facing technology fraud: Economics, attack methods and potential solutions publication-title: Future Generation Computer Systems – year: 2003 ident: b0390 article-title: “Social Engineering Fundamentals – volume: 27 start-page: 379 year: Jul. 1948 end-page: 423 ident: b0440 article-title: A mathematical theory of communication publication-title: Bell System Technical Journal – volume: 53 year: Jun. 2020 ident: b0075 article-title: A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses publication-title: ACM Computing Surveys – volume: 1 start-page: 202 year: Oct. 2017 end-page: 224 ident: b0095 article-title: A resilient cybersecurity framework for Mobile Financial Services (MFS) publication-title: Journal of Cyber Security Technology – volume: 116 year: Jun. 2021 ident: b0260 article-title: The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives publication-title: Journal of Systems Architecture – volume: 1 year: Sep. 2023 ident: b0410 article-title: Understanding the rise of fraud in England and Wales through field theory: Blip or flip? publication-title: Journal of Economic Criminology – reference: , 2021, pp. 305–311. 10.1109/ICEES51510.2021.9383720. – volume: 626 start-page: 315 year: 2023 end-page: 338 ident: b0175 article-title: Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives publication-title: Inf Sci (N Y) – volume: no. 0123456789 year: 2022 ident: b0625 publication-title: Moving beyond cyber security awareness and training to engendering security knowledge sharing – volume: 1047 start-page: 223 year: 2019 end-page: 233 ident: b0495 article-title: “Data protection on fintech platforms”, Communications in Computer and Information publication-title: Science – year: 2018 ident: b0340 article-title: Social Engineering: The Science of Human Hacking – reference: , 2021. – volume: 8 start-page: 1630 year: 2017 end-page: 1638 ident: b0295 article-title: A Review of False Data Injection Attacks Against Modern Power Systems publication-title: IEEE Transactions on Smart Grid – volume: 9 year: 2021 ident: b0240 article-title: A Novel Method for Detecting Future Generations of Targeted and Metamorphic Malware Based on Genetic Algorithm publication-title: IEEE Access – reference: “Doubts remain over whether North Korea was responsible for massive hack of Sony Pictures.” – reference: D. Gozman, J. Liebenau, and J. Mangan, “The Innovation Mechanisms of Fintech Start-Ups: Insights from SWIFT’s Innotribe Competition,” – volume: 8 start-page: 24522 year: 2020 end-page: 24534 ident: b0195 article-title: Avoiding Future Digital Extortion Through Robust Protection Against Ransomware Threats Using Deep Learning Based Adaptive Approaches publication-title: IEEE Access – volume: 30 start-page: 211 year: May 2021 end-page: 222 ident: b0020 article-title: Artificial intelligence and fintech: An overview of opportunities and risks for banking, investments, and microfinance publication-title: Strategic Change – volume: 339 year: 2009 ident: b0090 article-title: The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate healthcare interventions: Explanation and elaboration publication-title: BMJ – volume: 33 start-page: 27 year: 2020 end-page: 42 ident: b0215 article-title: A socio-technical perspective to counter cyber-enabled industrial espionage publication-title: Security Journal – volume: 208 year: Dec. 2022 ident: b0555 article-title: Knowledge graph of mobile payment platforms based on deep learning: Risk analysis and policy implications publication-title: Expert Systems with Applications – volume: 26 year: 2019 ident: b0285 article-title: The enhanced security control model for critical infrastructures with the blocking prioritization process to cyber threats in power system publication-title: International Journal of Critical Infrastructure Protection – volume: 55 year: Jan. 2022 ident: b0040 article-title: Neural Network-Based Financial Volatility Forecasting: A Systematic Review publication-title: ACM Computing Surveys – volume: 41 start-page: 2038 year: 2022 end-page: 2051 ident: b0205 article-title: A Content-Based Ransomware Detection and Backup Solid-State Drive for Ransomware Defense publication-title: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems – volume: 105 year: 2021 ident: b0150 article-title: Cyber-threat perception and risk management in the Swedish financial sector publication-title: Computers & Security – volume: 2021 start-page: 357 year: 2021 end-page: 363 ident: b0520 article-title: Green Efficiency for Quality Models in the Field of Cryptocurrency; IOTA Green Efficiency publication-title: IEEE Green Technologies Conference (GreenTech) – volume: 89 start-page: 349 year: 2018 end-page: 359 ident: b0125 article-title: Detection of advanced persistent threat using machine-learning correlation analysis publication-title: Future Generation Computer Systems – volume: 8 start-page: 155859 year: 2020 end-page: 155872 ident: b0140 article-title: A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine Learning publication-title: IEEE Access – volume: 36 year: 2020 ident: b0185 article-title: I2CE3: A dedicated and separated attack chain for ransomware offenses as the most infamous cyber extortion publication-title: Comput Sci Rev – volume: 18 start-page: 1378 year: May 2021 end-page: 1393 ident: b0480 article-title: DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans publication-title: IEEE Transactions on Dependable and Secure Computing – volume: 104 year: 2021 ident: b0325 article-title: Deep learning for insider threat detection: Review, challenges and opportunities publication-title: Computers & Security – volume: 2011 start-page: 201 year: 2011 end-page: 208 ident: b0395 article-title: Risks associated with USB Hardware Trojan devices used by insiders publication-title: IEEE International Systems Conference – reference: T. Jin – volume: 51 year: Jul. 2018 ident: b0065 article-title: Systematically Understanding the Cyber Attack Business: A Survey publication-title: ACM Computing Surveys – reference: , “FinExpert: Domain-specific test generation for FinTech systems,” – volume: 224 year: Aug. 2023 ident: b0045 article-title: Analysis of cybercrimes and security in FinTech industries using the novel concepts of interval-valued complex q-rung orthopair fuzzy relations publication-title: Expert Systems with Applications – volume: 33 year: 2020 ident: b0190 article-title: Evaluation of live forensic techniques in ransomware attack mitigation publication-title: Forensic Science International: Digital Investigation – year: Aug. 2023 ident: b0515 article-title: Blockchain from the Information Systems Perspective: Literature Review, Synthesis, and Directions for Future Research publication-title: Information & Management – reference: , pp. 330–335, Oct. 2020, 10.1145/3368308.3415366. – reference: , vol. 35, no. 1, pp. 220–265, Jan. 2018, 10.1080/07421222.2018.1440766. – volume: 207 year: Nov. 2022 ident: b0530 article-title: Forecasting corporate credit ratings using big data from social media publication-title: Expert Systems with Applications – volume: 10 start-page: 1 year: 2016 end-page: 27 ident: b0380 article-title: Black mobility matters: An exploratory study of Uber, hacking, and the commons in Baltimore publication-title: Architecture_MPS – reference: P. Gomber, R. J. Kauffman, C. Parker, and B. W. Weber, “On the Fintech Revolution: Interpreting the Forces of Innovation, Disruption, and Transformation in Financial Services,” – volume: 54 year: Jan. 2021 ident: b0030 article-title: The Creation and Detection of Deepfakes: A Survey publication-title: ACM Computing Surveys – volume: 170 year: 2020 ident: b0290 article-title: Event-based distributed state estimation for linear systems under unknown input and false data injection attack publication-title: Signal Processing – volume: 76 start-page: 131 year: Jun. 2022 end-page: 140 ident: b0655 article-title: The determinants of cybersecurity risk disclosure in firms’ financial reporting: Empirical evidence publication-title: Research in Economics – volume: 107 year: 2021 ident: b0275 article-title: Assessing IoT enabled cyber-physical attack paths against critical systems publication-title: Computers & Security – volume: 75 start-page: 335 year: 2022 end-page: 344 ident: b0050 article-title: Is FinTech providing effective solutions to Small and Medium Enterprises (SMEs) in ASEAN countries? publication-title: Econ Anal Policy – volume: 19 year: Jun. 2023 ident: b0685 article-title: EVHA: Explainable Vision System for Hardware Testing and Assurance—An Overview publication-title: J. Emerg. Technol Computing Systems – volume: 207 start-page: 2940 year: 2022 end-page: 2949 ident: b0220 article-title: The threat of industrial espionage for SME in the age of digitalization publication-title: Procedia Computer Science – year: 2018 ident: b0100 article-title: Computer Security: Principles and Practice – volume: 2023 start-page: 1 year: Sep. 2023 end-page: 39 ident: b0575 article-title: Analysis of sustainable supply chain and industry 4.0 enablers: A step towards decarbonization of supply chains publication-title: Ann. Oper. Res. – volume: 29 start-page: 40 year: Jan. 2019 end-page: 59 ident: b0565 article-title: Cryptojacking injection: A paradigm shift to cryptocurrency-based web-centric internet attacks publication-title: Journal of Organizational Computing and Electronic Commerce – volume: 80 start-page: 421 year: 2018 end-page: 429 ident: b0500 article-title: Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry publication-title: Future Generation Computer Systems – start-page: 71 year: 2020 end-page: 78 ident: b0370 article-title: “Connected Vehicles in the Shark Tank: Rethinking the Challenge for Cybersecurity to Keep Pace with Digital Innovation BT - publication-title: 3rd EAI International Conference on IoT in Urban Space” – reference: L. J. Trautman, “E-Commerce, Cyber, and Electronic Payment System Risks: Lessons from PayPal,” – volume: 98 year: Nov. 2020 ident: b0210 article-title: Industrial espionage – A systematic literature review (SLR) publication-title: Computers & Security – reference: M. Mocanu, “Management of Cyber-Espionage Intrusions,” in – reference: S. V. Kumar, G. A. A. Mary, P. Suresh, and R. Uthirasamy, “Investigation On Cyber-Attacks Against In-Vehicle Network,” in – volume: 80 year: 2022 ident: b0665 article-title: Regulatory technology (Reg-Tech) in financial stability supervision: Taxonomy, key methods, applications and future directions publication-title: International Review of Financial Analysis – volume: 54 start-page: 453 year: Jan. 2016 end-page: 461 ident: b0490 article-title: An empirical study on trust in mobile banking: A developing country perspective publication-title: Comput Human Behav – volume: 60 year: May 2023 ident: b0660 article-title: Responsible and human centric AI-based insurance advisors publication-title: Information Processing and Management – reference: Y. Wang, M. McCoey, and Q. Hu, “Developing an Undergraduate Course Curriculum for Ethical Hacking,” – volume: 8 start-page: 23391 year: 2020 end-page: 23406 ident: b0070 article-title: Towards Secure FinTech: A Survey, Taxonomy, and Open Research Challenges publication-title: IEEE Access – reference: “Millions of records leaked as T-Mobile is breached for the sixth time in four years,” – reference: “HSBC bank and Irish National Lottery among latest DDoS victims,” – volume: 16 start-page: 2413 year: 2021 end-page: 2428 ident: b0470 article-title: CPS Device-Class Identification via Behavioral Fingerprinting: From Theory to Practice publication-title: IEEE Transactions on Information Forensics and Security – volume: 32 start-page: 287 year: 2021 end-page: 314 ident: b0525 article-title: Becoming a blockchain user: Understanding consumers’ benefits realisation to use blockchain-based applications publication-title: European Journal of Information Systems – year: 2016 ident: b0280 article-title: Analysis of the Cyber Attack on the Ukrainian Power Grid – year: 2022 ident: b0605 article-title: Cryptographic obfuscation for smart contracts: Trustless bitcoin bridge and more publication-title: Blockchain: Research and Applications – volume: 51 year: Jul. 2018 ident: b0350 article-title: Who Watches the Watchmen: A Security-Focused Review on Current State-of-the-Art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms publication-title: ACM Computing Surveys – volume: 28 start-page: 50 year: Mar. 2019 end-page: 65 ident: b0550 article-title: Affordances, experimentation and actualization of FinTech: A blockchain implementation study publication-title: The Journal of Strategic Information Systems – volume: 157 year: 2022 ident: b0595 article-title: Optimization models for supply chains under risk, uncertainty, and resilience: A state-of-the-art review and future research directions publication-title: Transp Res E Logist Transp Rev – volume: 103 start-page: 262 year: 2018 end-page: 273 ident: b0060 article-title: A survey on FinTech publication-title: Journal of Network and Computer Applications – volume: 105 year: 2021 ident: b0630 article-title: Cybercrime threat intelligence: A systematic multi-vocal literature review publication-title: Computers & Security – volume: 15 start-page: 423 year: May 2018 end-page: 435 ident: b0160 article-title: End-to-end detection of caller ID spoofing attacks publication-title: IEEE Transactions on Dependable and Secure Computing – start-page: 249 year: 2015 end-page: 286 ident: b0355 publication-title: Cyber Attacks, Prevention, and Countermeasures BT - Counterterrorism and Cybersecurity: Total Information Awareness – volume: 2016 start-page: 12 year: 2016 end-page: 19 ident: b0315 article-title: Insider threat response and recovery strategies in financial services firms publication-title: Computer Fraud & Security – reference: , in MTD’20. New York, NY, USA: Association for Computing Machinery, 2020, pp. 81–89. 10.1145/3411496.3421224. – volume: 28 start-page: 205 year: 2000 end-page: 216 ident: b0505 article-title: MarketNet: Protecting access to information systems through financial market controls publication-title: Decision Support Systems – volume: 180 year: Jul. 2022 ident: b0230 article-title: A decision-making framework for Industry 4.0 technology implementation: The case of FinTech and sustainable supply chain finance for SMEs publication-title: Technol Forecast Soc Change – volume: 119 year: 2022 ident: b0620 article-title: Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise publication-title: Computers & Security – volume: 18 start-page: 1378 year: 2021 end-page: 1393 ident: b0675 article-title: DBank DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans publication-title: IEEE Transactions on Dependable and Secure Computing – reference: M. Carminati, M. Polino, A. Continella, A. Lanzi, F. Maggi, and S. Zanero, “Security Evaluation of a Banking Fraud Analysis System,” – volume: 24 start-page: 62 year: Mar. 2019 end-page: 84 ident: b0580 article-title: Understanding blockchain technology for future supply chains: A systematic literature review and research agenda publication-title: Supply Chain Management – volume: 130 start-page: 193 year: 2022 end-page: 206 ident: b0465 article-title: Ensemble dynamic behavior detection method for adversarial malware publication-title: Future Generation Computer Systems – volume: 180 year: 2022 ident: 10.1016/j.eswa.2023.122697_b0230 article-title: A decision-making framework for Industry 4.0 technology implementation: The case of FinTech and sustainable supply chain finance for SMEs publication-title: Technol Forecast Soc Change doi: 10.1016/j.techfore.2022.121686 – ident: 10.1016/j.eswa.2023.122697_b0135 doi: 10.1016/S1361-3723(16)30011-2 – volume: 68 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0080 article-title: Fintech and access to finance publication-title: Journal of Corporate Finance doi: 10.1016/j.jcorpfin.2021.101941 – volume: 32 start-page: 287 issue: 2 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0525 article-title: Becoming a blockchain user: Understanding consumers’ benefits realisation to use blockchain-based applications publication-title: European Journal of Information Systems doi: 10.1080/0960085X.2021.1944823 – volume: 4 start-page: 5 issue: 1 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0305 article-title: Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security? publication-title: Energy Informatics doi: 10.1186/s42162-021-00139-7 – volume: 15 start-page: 423 issue: 3 year: 2018 ident: 10.1016/j.eswa.2023.122697_b0160 article-title: End-to-end detection of caller ID spoofing attacks publication-title: IEEE Transactions on Dependable and Secure Computing doi: 10.1109/TDSC.2016.2580509 – volume: 130 start-page: 193 year: 2022 ident: 10.1016/j.eswa.2023.122697_b0465 article-title: Ensemble dynamic behavior detection method for adversarial malware publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2021.12.013 – volume: 19 issue: 3 year: 2023 ident: 10.1016/j.eswa.2023.122697_b0685 article-title: EVHA: Explainable Vision System for Hardware Testing and Assurance—An Overview publication-title: J. Emerg. Technol Computing Systems – volume: 207 start-page: 2940 year: 2022 ident: 10.1016/j.eswa.2023.122697_b0220 article-title: The threat of industrial espionage for SME in the age of digitalization publication-title: Procedia Computer Science doi: 10.1016/j.procs.2022.09.352 – ident: 10.1016/j.eswa.2023.122697_b0435 doi: 10.1145/3411496.3421224 – volume: 8 start-page: 1630 issue: 4 year: 2017 ident: 10.1016/j.eswa.2023.122697_b0295 article-title: A Review of False Data Injection Attacks Against Modern Power Systems publication-title: IEEE Transactions on Smart Grid doi: 10.1109/TSG.2015.2495133 – year: 2022 ident: 10.1016/j.eswa.2023.122697_b0415 article-title: Attentive statement fraud detection: Distinguishing multimodal financial data with fine-grained attention publication-title: Decision Support Systems – volume: 20 issue: 2 year: 2020 ident: 10.1016/j.eswa.2023.122697_b0255 article-title: An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices publication-title: ACM Transactions on Internet Technology doi: 10.1145/3379542 – volume: 151 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0545 article-title: Bitcoin price forecasting: A perspective of underlying blockchain transactions publication-title: Decision Support Systems doi: 10.1016/j.dss.2021.113650 – volume: 22 start-page: 113 year: 2015 ident: 10.1016/j.eswa.2023.122697_b0345 article-title: Advanced social engineering attacks publication-title: Journal of Information Security and Applications doi: 10.1016/j.jisa.2014.09.005 – ident: 10.1016/j.eswa.2023.122697_b0010 doi: 10.1080/07421222.2018.1440766 – year: 2023 ident: 10.1016/j.eswa.2023.122697_b0515 article-title: Blockchain from the Information Systems Perspective: Literature Review, Synthesis, and Directions for Future Research publication-title: Information & Management doi: 10.1016/j.im.2023.103856 – volume: 157 year: 2022 ident: 10.1016/j.eswa.2023.122697_b0595 article-title: Optimization models for supply chains under risk, uncertainty, and resilience: A state-of-the-art review and future research directions publication-title: Transp Res E Logist Transp Rev doi: 10.1016/j.tre.2021.102553 – volume: 224 year: 2023 ident: 10.1016/j.eswa.2023.122697_b0045 article-title: Analysis of cybercrimes and security in FinTech industries using the novel concepts of interval-valued complex q-rung orthopair fuzzy relations publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2023.119976 – volume: 9 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0240 article-title: A Novel Method for Detecting Future Generations of Targeted and Metamorphic Malware Based on Genetic Algorithm publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3077295 – volume: 59 issue: 6 year: 2022 ident: 10.1016/j.eswa.2023.122697_b0585 article-title: White knight in dark days? Supply chain finance firms, blockchain, and the COVID-19 pandemic publication-title: Information & Management doi: 10.1016/j.im.2022.103661 – ident: 10.1016/j.eswa.2023.122697_b0690 doi: 10.1145/3338906.3340441 – volume: 58 issue: 1 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0540 article-title: A Survey on Blockchain for Information Systems Management and Security publication-title: Information Processing and Management doi: 10.1016/j.ipm.2020.102397 – volume: 105 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0150 article-title: Cyber-threat perception and risk management in the Swedish financial sector publication-title: Computers & Security doi: 10.1016/j.cose.2021.102239 – volume: 208 year: 2022 ident: 10.1016/j.eswa.2023.122697_b0555 article-title: Knowledge graph of mobile payment platforms based on deep learning: Risk analysis and policy implications publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2022.118143 – volume: 33 start-page: 14 issue: 1 year: 2017 ident: 10.1016/j.eswa.2023.122697_b0635 article-title: ‘In the public interest’: The privacy implications of international business-to-business sharing of cyber-threat intelligence publication-title: Computer Law & Security Review doi: 10.1016/j.clsr.2016.11.015 – volume: 89 start-page: 349 year: 2018 ident: 10.1016/j.eswa.2023.122697_b0125 article-title: Detection of advanced persistent threat using machine-learning correlation analysis publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2018.06.055 – volume: 53 start-page: 34 issue: 1 year: 2019 ident: 10.1016/j.eswa.2023.122697_b0330 article-title: Leveraging Deep Learning to Improve Performance Predictability in Cloud Microservices with Seer publication-title: SIGOPS Oper. Syst. Rev. doi: 10.1145/3352020.3352026 – volume: 76 start-page: 131 issue: 2 year: 2022 ident: 10.1016/j.eswa.2023.122697_b0655 article-title: The determinants of cybersecurity risk disclosure in firms’ financial reporting: Empirical evidence publication-title: Research in Economics doi: 10.1016/j.rie.2022.07.001 – volume: 2019 start-page: 6716918 year: 2019 ident: 10.1016/j.eswa.2023.122697_b0115 article-title: A Data-Driven Approach to Cyber Risk Assessment publication-title: Security and Communication Networks doi: 10.1155/2019/6716918 – volume: 170 year: 2020 ident: 10.1016/j.eswa.2023.122697_b0290 article-title: Event-based distributed state estimation for linear systems under unknown input and false data injection attack publication-title: Signal Processing – volume: 151 year: 2023 ident: 10.1016/j.eswa.2023.122697_b0180 article-title: Defending Root DNS Servers against DDoS Using Layered Defenses (Extended) publication-title: Ad Hoc Networks doi: 10.1016/j.adhoc.2023.103259 – volume: 36 year: 2020 ident: 10.1016/j.eswa.2023.122697_b0185 article-title: I2CE3: A dedicated and separated attack chain for ransomware offenses as the most infamous cyber extortion publication-title: Comput Sci Rev doi: 10.1016/j.cosrev.2020.100233 – ident: 10.1016/j.eswa.2023.122697_b0360 – year: 2018 ident: 10.1016/j.eswa.2023.122697_b0100 – volume: 103 start-page: 262 year: 2018 ident: 10.1016/j.eswa.2023.122697_b0060 article-title: A survey on FinTech publication-title: Journal of Network and Computer Applications doi: 10.1016/j.jnca.2017.10.011 – volume: 94 start-page: 459 year: 2016 ident: 10.1016/j.eswa.2023.122697_b0385 article-title: Experimental Analysis of Tools Used for Doxing and Proposed New Transforms to Help Organizations Protect against Doxing Attacks publication-title: Procedia Computer Science doi: 10.1016/j.procs.2016.08.071 – volume: 2011 start-page: 201 year: 2011 ident: 10.1016/j.eswa.2023.122697_b0395 article-title: Risks associated with USB Hardware Trojan devices used by insiders publication-title: IEEE International Systems Conference – volume: 75 start-page: 335 year: 2022 ident: 10.1016/j.eswa.2023.122697_b0050 article-title: Is FinTech providing effective solutions to Small and Medium Enterprises (SMEs) in ASEAN countries? publication-title: Econ Anal Policy doi: 10.1016/j.eap.2022.05.019 – volume: 6 year: 2018 ident: 10.1016/j.eswa.2023.122697_b0110 article-title: Detection and elimination of spyware and ransomware by intercepting kernel-level system routines publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2884964 – volume: 80 start-page: 421 year: 2018 ident: 10.1016/j.eswa.2023.122697_b0500 article-title: Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2016.01.006 – volume: 35 start-page: 70 issue: 1 year: 2023 ident: 10.1016/j.eswa.2023.122697_b0610 article-title: A formal verification approach for composite smart contracts security using FSM publication-title: Journal of King Saud University - Computer and Information Sciences doi: 10.1016/j.jksuci.2022.08.029 – volume: 5 start-page: 256 issue: 4 year: 2018 ident: 10.1016/j.eswa.2023.122697_b0570 article-title: Banking with blockchain-ed big data publication-title: Journal of Management Analytics doi: 10.1080/23270012.2018.1528900 – volume: 121 year: 2022 ident: 10.1016/j.eswa.2023.122697_b0450 article-title: Investigating perceptions about risk of data breaches in financial institutions: A routine activity-approach publication-title: Computers & Security doi: 10.1016/j.cose.2022.102832 – volume: 33 start-page: 27 issue: 1 year: 2020 ident: 10.1016/j.eswa.2023.122697_b0215 article-title: A socio-technical perspective to counter cyber-enabled industrial espionage publication-title: Security Journal doi: 10.1057/s41284-019-00198-2 – volume: 358 start-page: 7237 issue: 14 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0145 article-title: Improved results on consensus of nonlinear MASs with nonhomogeneous Markov switching topologies and DoS cyber attacks publication-title: Journal of the Franklin Institute doi: 10.1016/j.jfranklin.2021.07.044 – volume: 230 year: 2023 ident: 10.1016/j.eswa.2023.122697_b0475 article-title: MalAnalyser: An effective and efficient Windows malware detection method based on API call sequences publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2023.120756 – ident: 10.1016/j.eswa.2023.122697_b0365 doi: 10.1109/ICEES51510.2021.9383720 – volume: 57 issue: 8 year: 2020 ident: 10.1016/j.eswa.2023.122697_b0005 article-title: The emergence of a Fintech Ecosystem: A case study of the Vizag Fintech Valley in India publication-title: Information & Management doi: 10.1016/j.im.2020.103385 – volume: 54 issue: 1 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0030 article-title: The Creation and Detection of Deepfakes: A Survey publication-title: ACM Computing Surveys doi: 10.1145/3425780 – volume: 18 issue: 3 year: 2019 ident: 10.1016/j.eswa.2023.122697_b0235 article-title: Catching Escapers: A Detection Method for Advanced Persistent Escapers in Industry Internet of Things Based on Identity-Based Broadcast Encryption (IBBE) publication-title: ACM Transactions on Embedded Computing Systems doi: 10.1145/3319615 – volume: 36 year: 2022 ident: 10.1016/j.eswa.2023.122697_b0225 article-title: Towards green smart cities using Internet of Things and optimization algorithms: A systematic and bibliometric review publication-title: Sustainable Computing: Informatics and Systems – volume: 55 issue: 1 year: 2022 ident: 10.1016/j.eswa.2023.122697_b0040 article-title: Neural Network-Based Financial Volatility Forecasting: A Systematic Review publication-title: ACM Computing Surveys doi: 10.1145/3483596 – volume: no. 0123456789 year: 2022 ident: 10.1016/j.eswa.2023.122697_b0625 publication-title: Moving beyond cyber security awareness and training to engendering security knowledge sharing – volume: 339 year: 2009 ident: 10.1016/j.eswa.2023.122697_b0090 article-title: The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate healthcare interventions: Explanation and elaboration publication-title: BMJ doi: 10.1136/bmj.b2700 – volume: 98 year: 2020 ident: 10.1016/j.eswa.2023.122697_b0210 article-title: Industrial espionage – A systematic literature review (SLR) publication-title: Computers & Security doi: 10.1016/j.cose.2020.102019 – volume: 104 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0325 article-title: Deep learning for insider threat detection: Review, challenges and opportunities publication-title: Computers & Security doi: 10.1016/j.cose.2021.102221 – volume: 152 start-page: 428 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0170 article-title: Performing Attack Halting Process with Digital Pattern and Proactive Model Resolving the Security Issues in IoT Based Models publication-title: Pattern Recognition Letters doi: 10.1016/j.patrec.2021.11.009 – volume: 60 issue: 3 year: 2023 ident: 10.1016/j.eswa.2023.122697_b0660 article-title: Responsible and human centric AI-based insurance advisors publication-title: Information Processing and Management doi: 10.1016/j.ipm.2023.103273 – ident: 10.1016/j.eswa.2023.122697_b0375 doi: 10.1016/S1353-4858(15)70001-2 – ident: 10.1016/j.eswa.2023.122697_b0425 doi: 10.1145/3178370 – volume: 19 start-page: 19 issue: 1 year: 2022 ident: 10.1016/j.eswa.2023.122697_b0200 article-title: On Ransomware Family Attribution Using Pre-Attack Paranoia Activities publication-title: IEEE Transactions on Network and Service Management doi: 10.1109/TNSM.2021.3112056 – volume: 51 issue: 4 year: 2018 ident: 10.1016/j.eswa.2023.122697_b0065 article-title: Systematically Understanding the Cyber Attack Business: A Survey publication-title: ACM Computing Surveys doi: 10.1145/3199674 – year: 2018 ident: 10.1016/j.eswa.2023.122697_b0340 – volume: 100 start-page: 408 year: 2019 ident: 10.1016/j.eswa.2023.122697_b0420 article-title: Consumer-facing technology fraud: Economics, attack methods and potential solutions publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2019.03.041 – volume: 21 start-page: 1267 issue: 8 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0560 article-title: When the blockchain does not block: On hackings and uncertainty in the cryptocurrency market publication-title: Quant Finance doi: 10.1080/14697688.2020.1849779 – volume: 105 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0630 article-title: Cybercrime threat intelligence: A systematic multi-vocal literature review publication-title: Computers & Security doi: 10.1016/j.cose.2021.102258 – volume: 55 issue: 6 year: 2022 ident: 10.1016/j.eswa.2023.122697_b0510 article-title: Engineering Blockchain-Based Software Systems: Foundations, Survey, and Future Directions publication-title: ACM Computing Surveys doi: 10.1145/3530813 – volume: 26 year: 2019 ident: 10.1016/j.eswa.2023.122697_b0285 article-title: The enhanced security control model for critical infrastructures with the blocking prioritization process to cyber threats in power system publication-title: International Journal of Critical Infrastructure Protection doi: 10.1016/j.ijcip.2019.100312 – year: 2016 ident: 10.1016/j.eswa.2023.122697_b0645 – year: 2022 ident: 10.1016/j.eswa.2023.122697_b0265 article-title: Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review publication-title: Journal of King Saud University - Computer and Information Sciences doi: 10.1016/j.jksuci.2021.12.016 – volume: 104 year: 2022 ident: 10.1016/j.eswa.2023.122697_b0335 article-title: Aligning social concerns with information system security: A fundamental ontology for social engineering publication-title: Information Systems doi: 10.1016/j.is.2020.101699 – volume: 119 year: 2022 ident: 10.1016/j.eswa.2023.122697_b0620 article-title: Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise publication-title: Computers & Security doi: 10.1016/j.cose.2022.102756 – year: 2016 ident: 10.1016/j.eswa.2023.122697_b0280 – volume: 54 start-page: 453 year: 2016 ident: 10.1016/j.eswa.2023.122697_b0490 article-title: An empirical study on trust in mobile banking: A developing country perspective publication-title: Comput Human Behav doi: 10.1016/j.chb.2015.08.039 – volume: 116 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0260 article-title: The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives publication-title: Journal of Systems Architecture doi: 10.1016/j.sysarc.2021.102143 – volume: 165 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0640 article-title: Development of a consumer financial goals ontology for use with FinTech applications for improving financial capability publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2020.113843 – start-page: 249 year: 2015 ident: 10.1016/j.eswa.2023.122697_b0355 – volume: 51 issue: 4 year: 2018 ident: 10.1016/j.eswa.2023.122697_b0350 article-title: Who Watches the Watchmen: A Security-Focused Review on Current State-of-the-Art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms publication-title: ACM Computing Surveys doi: 10.1145/3199673 – volume: 33 start-page: 304 issue: 4 year: 2018 ident: 10.1016/j.eswa.2023.122697_b0670 article-title: Dialectic tensions in the financial markets: A longitudinal study of pre- and post-crisis regulatory technology publication-title: Journal of Information Technology doi: 10.1057/s41265-017-0047-5 – volume: 24 start-page: 62 issue: 1 year: 2019 ident: 10.1016/j.eswa.2023.122697_b0580 article-title: Understanding blockchain technology for future supply chains: A systematic literature review and research agenda publication-title: Supply Chain Management doi: 10.1108/SCM-03-2018-0148 – volume: 33 year: 2020 ident: 10.1016/j.eswa.2023.122697_b0190 article-title: Evaluation of live forensic techniques in ransomware attack mitigation publication-title: Forensic Science International: Digital Investigation – volume: 1 year: 2023 ident: 10.1016/j.eswa.2023.122697_b0410 article-title: Understanding the rise of fraud in England and Wales through field theory: Blip or flip? publication-title: Journal of Economic Criminology doi: 10.1016/j.jeconc.2023.100012 – volume: 207 year: 2022 ident: 10.1016/j.eswa.2023.122697_b0530 article-title: Forecasting corporate credit ratings using big data from social media publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2022.118042 – ident: 10.1016/j.eswa.2023.122697_b0015 doi: 10.1080/07421222.2018.1440768 – volume: 5 start-page: pp issue: 3 year: 2023 ident: 10.1016/j.eswa.2023.122697_b0035 article-title: Generating scholarly content with ChatGPT: Ethical challenges for medical publishing publication-title: Lancet Digit Health – ident: 10.1016/j.eswa.2023.122697_b0085 doi: 10.1145/3372823 – volume: 67 year: 2022 ident: 10.1016/j.eswa.2023.122697_b0320 article-title: Insider-threat detection: Lessons from deploying the CITD tool in three multinational organisations publication-title: Journal of Information Security and Applications doi: 10.1016/j.jisa.2022.103167 – volume: 10 start-page: 1 issue: 4 year: 2016 ident: 10.1016/j.eswa.2023.122697_b0380 article-title: Black mobility matters: An exploratory study of Uber, hacking, and the commons in Baltimore publication-title: Architecture_MPS – volume: 2023 start-page: 1 year: 2023 ident: 10.1016/j.eswa.2023.122697_b0575 article-title: Analysis of sustainable supply chain and industry 4.0 enablers: A step towards decarbonization of supply chains publication-title: Ann. Oper. Res. – volume: 32 year: 2020 ident: 10.1016/j.eswa.2023.122697_b0245 article-title: IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers publication-title: Forensic Science International: Digital Investigation – volume: 18 start-page: 1378 issue: 3 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0675 article-title: DBank DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans publication-title: IEEE Transactions on Dependable and Secure Computing – volume: 80 year: 2022 ident: 10.1016/j.eswa.2023.122697_b0665 article-title: Regulatory technology (Reg-Tech) in financial stability supervision: Taxonomy, key methods, applications and future directions publication-title: International Review of Financial Analysis doi: 10.1016/j.irfa.2022.102023 – volume: 8 start-page: 155859 year: 2020 ident: 10.1016/j.eswa.2023.122697_b0140 article-title: A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine Learning publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3019330 – volume: 9 issue: 1 year: 2023 ident: 10.1016/j.eswa.2023.122697_b0055 article-title: Behavioral intention to adopt FinTech services: An extension of unified theory of acceptance and use of technology publication-title: Journal of Open Innovation: Technology, Market, and Complexity doi: 10.1016/j.joitmc.2023.100010 – volume: 107 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0275 article-title: Assessing IoT enabled cyber-physical attack paths against critical systems publication-title: Computers & Security doi: 10.1016/j.cose.2021.102316 – volume: 54 start-page: 70 issue: 2 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0430 article-title: Do data almost always eventually leak? publication-title: Computer (Long Beach Calif) – volume: 30 start-page: 211 issue: 3 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0020 article-title: Artificial intelligence and fintech: An overview of opportunities and risks for banking, investments, and microfinance publication-title: Strategic Change doi: 10.1002/jsc.2404 – volume: 17 start-page: 8442 issue: 12 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0270 article-title: Fed-IIoT: A Robust Federated Malware Detection Architecture in Industrial IoT publication-title: IEEE Trans Industr Inform doi: 10.1109/TII.2020.3043458 – volume: 77 start-page: 756 year: 2018 ident: 10.1016/j.eswa.2023.122697_b0105 article-title: A survey of similarities in banking malware behaviours publication-title: Computers & Security doi: 10.1016/j.cose.2017.09.013 – volume: 8 start-page: 23391 year: 2020 ident: 10.1016/j.eswa.2023.122697_b0070 article-title: Towards Secure FinTech: A Survey, Taxonomy, and Open Research Challenges publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2970430 – year: 2003 ident: 10.1016/j.eswa.2023.122697_b0390 – volume: 16 start-page: 2413 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0470 article-title: CPS Device-Class Identification via Behavioral Fingerprinting: From Theory to Practice publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2021.3054968 – year: 2018 ident: 10.1016/j.eswa.2023.122697_b0250 publication-title: Towards Situational Awareness of Botnet Activity in the Internet of Things – volume: 28 start-page: 50 issue: 1 year: 2019 ident: 10.1016/j.eswa.2023.122697_b0550 article-title: Affordances, experimentation and actualization of FinTech: A blockchain implementation study publication-title: The Journal of Strategic Information Systems doi: 10.1016/j.jsis.2018.10.002 – volume: 12 start-page: 730 issue: 3 year: 2017 ident: 10.1016/j.eswa.2023.122697_b0165 article-title: Detecting Anomalous Behavior in VoIP Systems: A Discrete Event System Modeling publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2016.2632071 – volume: 37 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0460 article-title: Fuzzy-import hashing: A static analysis technique for malware detection publication-title: Forensic Science International: Digital Investigation – ident: 10.1016/j.eswa.2023.122697_b0650 – volume: 11 start-page: 3438 issue: 4 year: 2020 ident: 10.1016/j.eswa.2023.122697_b0310 article-title: Power System Parameter Attack for Financial Profits in Electricity Markets publication-title: IEEE Transactions on Smart Grid doi: 10.1109/TSG.2020.2977088 – volume: 34 start-page: 242 issue: 1 year: 2018 ident: 10.1016/j.eswa.2023.122697_b0615 article-title: Tutorials and Laboratory for Hands-on OS Cybersecurity Instruction publication-title: Journal of Computing Sciences in Colleges – volume: 53 issue: 3 year: 2020 ident: 10.1016/j.eswa.2023.122697_b0075 article-title: A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses publication-title: ACM Computing Surveys doi: 10.1145/3391195 – volume: 94 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0400 article-title: Enterprise Credential Spear-phishing attack detection publication-title: Computers & Electrical Engineering doi: 10.1016/j.compeleceng.2021.107363 – ident: 10.1016/j.eswa.2023.122697_b0695 doi: 10.1145/3368308.3415366 – volume: 2021 start-page: 357 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0520 article-title: Green Efficiency for Quality Models in the Field of Cryptocurrency; IOTA Green Efficiency publication-title: IEEE Green Technologies Conference (GreenTech) doi: 10.1109/GreenTech48523.2021.00101 – volume: 228 year: 2023 ident: 10.1016/j.eswa.2023.122697_b0155 article-title: Sin-Cos-bIAVOA: A new feature selection method based on improved African vulture optimization algorithm and a novel transfer function to DDoS attack detection publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2023.120404 – volume: 626 start-page: 315 year: 2023 ident: 10.1016/j.eswa.2023.122697_b0175 article-title: Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives publication-title: Inf Sci (N Y) doi: 10.1016/j.ins.2023.01.067 – volume: 28 start-page: 205 issue: 1 year: 2000 ident: 10.1016/j.eswa.2023.122697_b0505 article-title: MarketNet: Protecting access to information systems through financial market controls publication-title: Decision Support Systems doi: 10.1016/S0167-9236(99)00069-X – volume: 41 start-page: 2038 issue: 7 year: 2022 ident: 10.1016/j.eswa.2023.122697_b0205 article-title: A Content-Based Ransomware Detection and Backup Solid-State Drive for Ransomware Defense publication-title: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems doi: 10.1109/TCAD.2021.3099084 – volume: 1047 start-page: 223 year: 2019 ident: 10.1016/j.eswa.2023.122697_b0495 article-title: “Data protection on fintech platforms”, Communications in Computer and Information publication-title: Science – volume: 39 start-page: 52 year: 2017 ident: 10.1016/j.eswa.2023.122697_b0300 article-title: A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities publication-title: Pervasive and Mobile Computing doi: 10.1016/j.pmcj.2017.04.005 – volume: 1 start-page: 202 issue: 3–4 year: 2017 ident: 10.1016/j.eswa.2023.122697_b0095 article-title: A resilient cybersecurity framework for Mobile Financial Services (MFS) publication-title: Journal of Cyber Security Technology doi: 10.1080/23742917.2017.1386483 – volume: 9 issue: 5 year: 2018 ident: 10.1016/j.eswa.2023.122697_b0405 article-title: Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model publication-title: Information doi: 10.3390/info9050110 – volume: 29 start-page: 40 issue: 1 year: 2019 ident: 10.1016/j.eswa.2023.122697_b0565 article-title: Cryptojacking injection: A paradigm shift to cryptocurrency-based web-centric internet attacks publication-title: Journal of Organizational Computing and Electronic Commerce doi: 10.1080/10919392.2019.1552747 – ident: 10.1016/j.eswa.2023.122697_b0025 – start-page: 71 year: 2020 ident: 10.1016/j.eswa.2023.122697_b0370 article-title: “Connected Vehicles in the Shark Tank: Rethinking the Challenge for Cybersecurity to Keep Pace with Digital Innovation BT - – volume: 210 year: 2022 ident: 10.1016/j.eswa.2023.122697_b0680 article-title: Behaviour analysis of inter-app communication using a lightweight monitoring app for malware detection publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2022.118404 – volume: 76 start-page: 146 year: 2017 ident: 10.1016/j.eswa.2023.122697_b0130 article-title: Hardware Trojans against virtual keyboards on e-banking platforms – A proof of concept publication-title: AEU - International Journal of Electronics and Communications doi: 10.1016/j.aeue.2017.04.003 – volume: 2016 start-page: 12 issue: 11 year: 2016 ident: 10.1016/j.eswa.2023.122697_b0315 article-title: Insider threat response and recovery strategies in financial services firms publication-title: Computer Fraud & Security doi: 10.1016/S1361-3723(16)30091-4 – volume: 8 start-page: 24522 year: 2020 ident: 10.1016/j.eswa.2023.122697_b0195 article-title: Avoiding Future Digital Extortion Through Robust Protection Against Ransomware Threats Using Deep Learning Based Adaptive Approaches publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2970466 – ident: 10.1016/j.eswa.2023.122697_b0535 doi: 10.1145/3205230.3205234 – volume: 112 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0455 article-title: A survey on machine learning-based malware detection in executable files publication-title: Journal of Systems Architecture doi: 10.1016/j.sysarc.2020.101861 – volume: 31 start-page: 115 issue: 2–3 year: 2020 ident: 10.1016/j.eswa.2023.122697_b0590 article-title: Bitcoin, Blockchain and Fintech: A systematic review and case studies in the supply chain publication-title: Production Planning & Control doi: 10.1080/09537287.2019.1631460 – ident: 10.1016/j.eswa.2023.122697_b0445 doi: 10.1016/S1361-3723(21)00089-0 – year: 2022 ident: 10.1016/j.eswa.2023.122697_b0605 article-title: Cryptographic obfuscation for smart contracts: Trustless bitcoin bridge and more publication-title: Blockchain: Research and Applications – volume: 18 start-page: 1378 issue: 3 year: 2021 ident: 10.1016/j.eswa.2023.122697_b0480 article-title: DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans publication-title: IEEE Transactions on Dependable and Secure Computing – volume: 27 start-page: 379 issue: 3 year: 1948 ident: 10.1016/j.eswa.2023.122697_b0440 article-title: A mathematical theory of communication publication-title: Bell System Technical Journal doi: 10.1002/j.1538-7305.1948.tb01338.x – volume: 96 start-page: 227 year: 2019 ident: 10.1016/j.eswa.2023.122697_b0120 article-title: A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2019.02.013 – volume: 112 year: 2022 ident: 10.1016/j.eswa.2023.122697_b0600 article-title: Traceability in supply chains: A Cyber security analysis publication-title: Computers & Security doi: 10.1016/j.cose.2021.102536 – volume: 70 start-page: 618 year: 2017 ident: 10.1016/j.eswa.2023.122697_b0485 article-title: Protecting from Cloud-based SIP flooding attacks by leveraging temporal and structural fingerprints publication-title: Computers & Security doi: 10.1016/j.cose.2017.08.003 |
SSID | ssj0017007 |
Score | 2.5622654 |
SecondaryResourceType | review_article |
Snippet | •Adopting PRISMA methodology to investigate cybersecurity threats in FinTech.•Identifying the most effective defense strategies to negate the threats by... |
SourceID | crossref elsevier |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 122697 |
SubjectTerms | Banking trojan Business sustainability Cyber-attacks Data privacy Financial technology |
Title | Cybersecurity threats in FinTech: A systematic review |
URI | https://dx.doi.org/10.1016/j.eswa.2023.122697 |
Volume | 241 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELaqsrDwRpRH5YENpXUSO07YqoqqgOgClbpFjh-iCIWKBiEWfjvn2CkgoQ6Miewo-uzcfRfffYfQeci4ULTQQSjqkpxQBwV48kAmKfhPnpmkzs25myTjKb2ZsVkLDZtaGJtW6W2_s-m1tfZ3-h7N_mI-79_DI8Ed2pNGW4mT2YJfSrnd5b3PVZqHlZ_jTm-PB3a0L5xxOV56-W61h6K4FwINscJPfzmnHw5ntIO2PFPEA_cyu6ilyz203XRhwP6j3Eds-FEAh_N96HD1aGngEs9LPJqX9s_5JR7gb8Fm7IpVDtB0dPUwHAe-GUIgY0KqQEPcknKdiowaJZXkkYFYwBBasEgoCHt4qoEKJUJkKZdxRIxShCoaA4HTPCniQ9QuX0p9hLBhjCsSQ2woCIVFLJgUKTOZJDo0TKQdFDYo5NIrhduGFc95kxL2lFvkcotc7pDroIvVnIXTyVg7mjXg5r9WOwdDvmbe8T_nnaBNuKIuUfEUtavXN30GZKIquvVu6aKNwfXtePIFCLrHUw |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT4NAEJ7U9qAX38b63IM3g10eyy7emsaG2sfFNumNLLBEjMHGYoz_3tmyVE2MB6_AEPItzHzDznwDcGUzLlMvVpYtVy05trJijORW4guMnzzI_FVtznjihzPvfs7mDejVvTC6rNL4_sqnr7y1OdIxaHYWed55wFtiONQ7jboTJxAb0NLqVKwJre5gGE7WmwmcVl3TeL2lDUzvTFXmpZbvWn7IcW9sZCJa--m3-PQt5vR3YduQRdKtnmcPGqrYh516EAMx3-UBsN5HjDTOjKIj5aNmgkuSF6SfF_rn-S3pki_NZlL1qxzCrH837YWWmYdgJS6lpaUwdRFcCRl4WZqkCXcyTAcy6sXMkSlmPlwoZEO-lIHgievQLE2pl3oucjjF_dg9gmbxUqhjIBljPKUupoeSeriOMUukYFmQUGVnTIo22DUKUWLEwvXMiueorgp7ijRykUYuqpBrw_XaZlFJZfx5NavBjX4seIS-_A-7k3_aXcJmOB2PotFgMjyFLTzjVXWLZ9AsX9_UOXKLMr4w784n9SbKBA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cybersecurity+threats+in+FinTech%3A+A+systematic+review&rft.jtitle=Expert+systems+with+applications&rft.au=Javaheri%2C+Danial&rft.au=Fahmideh%2C+Mahdi&rft.au=Chizari%2C+Hassan&rft.au=Lalbakhsh%2C+Pooia&rft.date=2024-05-01&rft.pub=Elsevier+Ltd&rft.issn=0957-4174&rft.eissn=1873-6793&rft.volume=241&rft_id=info:doi/10.1016%2Fj.eswa.2023.122697&rft.externalDocID=S0957417423031998 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0957-4174&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0957-4174&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0957-4174&client=summon |