[go: up one dir, main page]

Asmar et al., 2024 - Google Patents

Integrating machine learning for sustaining cybersecurity in digital banks

Asmar et al., 2024

View HTML @Full View
Document ID
9139803970244815223
Author
Asmar M
Tuqan A
Publication year
Publication venue
Heliyon

External Links

Snippet

Cybersecurity continues to be an important concern for financial institutions given the technology's rapid development and increasing adoption of digital services. Effective safety measures must be adopted to safeguard sensitive financial data and protect clients from …
Continue reading at www.cell.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Similar Documents

Publication Publication Date Title
Asmar et al. Integrating machine learning for sustaining cybersecurity in digital banks
El-Sofany et al. Using machine learning algorithms to enhance IoT system security
Sun et al. Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new perspectives
Basheer et al. Threats from the dark: a review over dark web investigation research for cyber threat intelligence
Essien et al. Neural network-based phishing attack detection and prevention systems
Alsowail et al. Empirical detection techniques of insider threat incidents
Mahmood et al. Optimizing network security with machine learning and multi-factor authentication for enhanced intrusion detection
Gupta et al. Cyber security using machine learning: techniques and business applications
Pillai et al. Hybrid unsupervised web-attack detection and classification–A deep learning approach
Das et al. Integration of machine learning with cybersecurity: applications and challenges
Rajasekar et al. Security analytics
Kumar et al. Machine Learning in Cybersecurity: A Comprehensive Survey of Data Breach Detection, Cyber-Attack Prevention, and Fraud Detection
Banirostam et al. Analysis and Evaluation of Various Fraud Detection Methods for Electronic Payment Cards Transactions in Big Data
Hosain et al. XAI-XGBoost: an innovative explainable intrusion detection approach for securing internet of medical things systems
Syllaidopoulos et al. A Comprehensive Survey on AI in Counter-Terrorism and Cybersecurity: Challenges and Ethical Dimensions
Chy et al. A machine learning driven website platform and browser extension for real-time scoring and fraud detection for website legitimacy verification and consumer protection
Mudgal Leveraging AI and ML for Proactive Threat Detection for E-Commerce
Kolosnjaji et al. Artificial Intelligence for Cybersecurity: Develop AI approaches to solve cybersecurity problems in your organization
Karangara Adaptive Machine Learning Models for Securing Payment Gateways: A Resilient Approach to Mitigating Evolving Cyber Threats in Digital Transactions
Razavi et al. AI-Driven Cybersecurity: Revolutionizing Threat Detection and Defence Systems
Misbha et al. Security assessment framework for DDOS attack detection via deep learning
Sharma et al. A Grey Wolf Optimized XGboost-Multilayer Stacking Approach to Detect XSS Attacks
Quan et al. Enhancing national security: a multidimensional situational awareness model for emerging economic crime prevention
Wickramasinghe Brahmana et al. Machine learning for cybersecurity
Dasari et al. Enhanced Network Intrusion Detection Systems With Explainable Artificial Intelligence for Network Security