Asmar et al., 2024 - Google Patents
Integrating machine learning for sustaining cybersecurity in digital banksAsmar et al., 2024
View HTML- Document ID
- 9139803970244815223
- Author
- Asmar M
- Tuqan A
- Publication year
- Publication venue
- Heliyon
External Links
Snippet
Cybersecurity continues to be an important concern for financial institutions given the technology's rapid development and increasing adoption of digital services. Effective safety measures must be adopted to safeguard sensitive financial data and protect clients from …
- 238000010801 machine learning 0 title abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Asmar et al. | Integrating machine learning for sustaining cybersecurity in digital banks | |
| El-Sofany et al. | Using machine learning algorithms to enhance IoT system security | |
| Sun et al. | Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new perspectives | |
| Basheer et al. | Threats from the dark: a review over dark web investigation research for cyber threat intelligence | |
| Essien et al. | Neural network-based phishing attack detection and prevention systems | |
| Alsowail et al. | Empirical detection techniques of insider threat incidents | |
| Mahmood et al. | Optimizing network security with machine learning and multi-factor authentication for enhanced intrusion detection | |
| Gupta et al. | Cyber security using machine learning: techniques and business applications | |
| Pillai et al. | Hybrid unsupervised web-attack detection and classification–A deep learning approach | |
| Das et al. | Integration of machine learning with cybersecurity: applications and challenges | |
| Rajasekar et al. | Security analytics | |
| Kumar et al. | Machine Learning in Cybersecurity: A Comprehensive Survey of Data Breach Detection, Cyber-Attack Prevention, and Fraud Detection | |
| Banirostam et al. | Analysis and Evaluation of Various Fraud Detection Methods for Electronic Payment Cards Transactions in Big Data | |
| Hosain et al. | XAI-XGBoost: an innovative explainable intrusion detection approach for securing internet of medical things systems | |
| Syllaidopoulos et al. | A Comprehensive Survey on AI in Counter-Terrorism and Cybersecurity: Challenges and Ethical Dimensions | |
| Chy et al. | A machine learning driven website platform and browser extension for real-time scoring and fraud detection for website legitimacy verification and consumer protection | |
| Mudgal | Leveraging AI and ML for Proactive Threat Detection for E-Commerce | |
| Kolosnjaji et al. | Artificial Intelligence for Cybersecurity: Develop AI approaches to solve cybersecurity problems in your organization | |
| Karangara | Adaptive Machine Learning Models for Securing Payment Gateways: A Resilient Approach to Mitigating Evolving Cyber Threats in Digital Transactions | |
| Razavi et al. | AI-Driven Cybersecurity: Revolutionizing Threat Detection and Defence Systems | |
| Misbha et al. | Security assessment framework for DDOS attack detection via deep learning | |
| Sharma et al. | A Grey Wolf Optimized XGboost-Multilayer Stacking Approach to Detect XSS Attacks | |
| Quan et al. | Enhancing national security: a multidimensional situational awareness model for emerging economic crime prevention | |
| Wickramasinghe Brahmana et al. | Machine learning for cybersecurity | |
| Dasari et al. | Enhanced Network Intrusion Detection Systems With Explainable Artificial Intelligence for Network Security |