{"id":"https://openalex.org/W4366248982","doi":"https://doi.org/10.1109/ccwc57344.2023.10099355","title":"Recent Advances in Cybersecurity and Fraud Detection in Financial Services: A Survey","display_name":"Recent Advances in Cybersecurity and Fraud Detection in Financial Services: A Survey","publication_year":2023,"publication_date":"2023-03-08","ids":{"openalex":"https://openalex.org/W4366248982","doi":"https://doi.org/10.1109/ccwc57344.2023.10099355"},"language":"en","primary_location":{"id":"doi:10.1109/ccwc57344.2023.10099355","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccwc57344.2023.10099355","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045767787","display_name":"Aakriti Bajracharya","orcid":null},"institutions":[{"id":"https://openalex.org/I137853757","display_name":"Howard University","ror":"https://ror.org/05gt1vc06","country_code":"US","type":"education","lineage":["https://openalex.org/I137853757"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Aakriti Bajracharya","raw_affiliation_strings":["Howard University,Washington, DC,USA,20058"],"affiliations":[{"raw_affiliation_string":"Howard University,Washington, DC,USA,20058","institution_ids":["https://openalex.org/I137853757"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017151879","display_name":"Barron Harvey","orcid":null},"institutions":[{"id":"https://openalex.org/I137853757","display_name":"Howard University","ror":"https://ror.org/05gt1vc06","country_code":"US","type":"education","lineage":["https://openalex.org/I137853757"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Barron Harvey","raw_affiliation_strings":["Howard University,Washington, DC,USA,20058"],"affiliations":[{"raw_affiliation_string":"Howard University,Washington, DC,USA,20058","institution_ids":["https://openalex.org/I137853757"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046343080","display_name":"Danda B. Rawat","orcid":"https://orcid.org/0000-0003-3638-3464"},"institutions":[{"id":"https://openalex.org/I137853757","display_name":"Howard University","ror":"https://ror.org/05gt1vc06","country_code":"US","type":"education","lineage":["https://openalex.org/I137853757"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Danda B. Rawat","raw_affiliation_strings":["Howard University,Washington, DC,USA,20058"],"affiliations":[{"raw_affiliation_string":"Howard University,Washington, DC,USA,20058","institution_ids":["https://openalex.org/I137853757"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5045767787"],"corresponding_institution_ids":["https://openalex.org/I137853757"],"apc_list":null,"apc_paid":null,"fwci":5.0398,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.95475543,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"0368","last_page":"0374"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7750298380851746},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7566640973091125},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5929186344146729},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.4938376545906067},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4825384020805359},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.457857221364975},{"id":"https://openalex.org/keywords/financial-services","display_name":"Financial services","score":0.44559693336486816},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4281075596809387},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3288276195526123},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.3129943013191223},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.10160684585571289}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7750298380851746},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7566640973091125},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5929186344146729},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.4938376545906067},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4825384020805359},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.457857221364975},{"id":"https://openalex.org/C139043278","wikidata":"https://www.wikidata.org/wiki/Q837171","display_name":"Financial services","level":2,"score":0.44559693336486816},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4281075596809387},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3288276195526123},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.3129943013191223},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.10160684585571289},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccwc57344.2023.10099355","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccwc57344.2023.10099355","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2285943860","https://openalex.org/W2764674196","https://openalex.org/W2794556148","https://openalex.org/W2841500134","https://openalex.org/W2910205570","https://openalex.org/W2989739431","https://openalex.org/W2992054303","https://openalex.org/W3090638973","https://openalex.org/W3090707795","https://openalex.org/W3104703121","https://openalex.org/W3155602733","https://openalex.org/W3191067537","https://openalex.org/W3206093631","https://openalex.org/W3211314335","https://openalex.org/W3211672407","https://openalex.org/W4200157692","https://openalex.org/W4206141920","https://openalex.org/W4206298626","https://openalex.org/W4210960727","https://openalex.org/W6749951605"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703"],"abstract_inverted_index":{"Cybersecurity":[0],"issues":[1],"have":[2,15],"been":[3],"gaining":[4],"continuous":[5],"attention":[6],"from":[7],"financial":[8,30,82],"institutions":[9],"and":[10,13,28,54,66,81,98],"regulatory":[11],"bodies":[12],"cyberattacks":[14],"escalated":[16],"after":[17],"the":[18,29,48,60],"pandemic.":[19],"Adversaries":[20],"are":[21,90],"often":[22],"determined":[23],"to":[24,92],"exploit":[25],"new":[26,75],"vulnerabilities":[27],"service":[31],"industry":[32],"is":[33],"losing":[34],"huge":[35],"amounts":[36],"in":[37,63,77],"spite":[38],"of":[39,51,59],"strong":[40],"layered":[41],"defenses.":[42],"In":[43],"this":[44],"paper,":[45],"we":[46],"analyze":[47],"current":[49],"scenario":[50],"cybersecurity":[52,65,79],"risks":[53],"provide":[55],"a":[56],"comprehensive":[57],"overview":[58],"recent":[61],"approaches":[62],"evolving":[64],"fraud":[67,83],"detection":[68],"practices":[69],"at":[70],"scale.":[71],"This":[72],"paper":[73],"reviews":[74],"challenges":[76],"effective":[78],"measures":[80],"detection.":[84],"Finally":[85],"some":[86],"key":[87],"potential":[88],"directions":[89],"proposed":[91],"inspire":[93],"intelligent":[94],"solutions":[95],"for":[96],"defending":[97],"mitigating":[99],"against":[100],"cyberattacks.":[101]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":9}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
