{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T07:54:04Z","timestamp":1768290844172,"version":"3.49.0"},"reference-count":32,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Engineering Applications of Artificial Intelligence"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1016\/j.engappai.2025.113358","type":"journal-article","created":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T07:55:31Z","timestamp":1764662131000},"page":"113358","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"PA","title":["Securing and classification of active directory domain banking data using the integration of blockchain and artificial intelligence"],"prefix":"10.1016","volume":"165","author":[{"given":"Nisha","family":"Rajpal","sequence":"first","affiliation":[]},{"given":"Dinesh","family":"Rai","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.engappai.2025.113358_bib1","doi-asserted-by":"crossref","first-page":"50","DOI":"10.63053\/ijrel.11","article-title":"Evaluating the influence of AI on market values in finance: distinguishing between authentic growth and speculative hype","volume":"1","author":"Ahmadirad","year":"2024","journal-title":"Int. J. Adv.Res. in Humanities and Law"},{"issue":"3","key":"10.1016\/j.engappai.2025.113358_bib2","first-page":"17","article-title":"Transformation in the internet of things (IoT) market in the banking sector: a case study of technology implementation for service improvement and transaction security","volume":"1","author":"Aripin","year":"2024","journal-title":"Journal of Jabar Economic Society Networking Forum"},{"key":"10.1016\/j.engappai.2025.113358_bib3","article-title":"Data privacy and cybersecurity challenges in the digital transformation of the banking sector","author":"Asif","year":"2024","journal-title":"Comput. Secur."},{"key":"10.1016\/j.engappai.2025.113358_bib4","series-title":"Natural Language Processing Applications in Business","author":"Bahja","year":"2020"},{"key":"10.1016\/j.engappai.2025.113358_bib5","article-title":"Late breaking results: fortifying neural networks: safeguarding against adversarial attacks with stochastic computing","author":"Banitaba","year":"2024","journal-title":"arXiv preprint arXiv:2407.04861"},{"issue":"1","key":"10.1016\/j.engappai.2025.113358_bib6","first-page":"85","article-title":"Machine learning approaches for enhancing fraud prevention in financial transactions","volume":"10","author":"Bello","year":"2023","journal-title":"Int.J.Manage.Technol."},{"issue":"1","key":"10.1016\/j.engappai.2025.113358_bib7","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1108\/JAAR-06-2022-0143","article-title":"Three lines model paradigm shift: a blockchain-based control framework","volume":"25","author":"Brender","year":"2024","journal-title":"J. Appl. Account. Res."},{"issue":"4","key":"10.1016\/j.engappai.2025.113358_bib8","doi-asserted-by":"crossref","first-page":"501","DOI":"10.51594\/farj.v6i4.990","article-title":"Revolutionizing banking security: integrating artificial intelligence, blockchain, and business intelligence for enhanced cybersecurity","volume":"6","author":"Farayola","year":"2024","journal-title":"Finan.Account. Res. J."},{"issue":"1","key":"10.1016\/j.engappai.2025.113358_bib9","first-page":"54","article-title":"Securing the future of finance: how AI, blockchain, and machine learning safeguard emerging neobank technology against evolving cyber threats","volume":"1","author":"George","year":"2023","journal-title":"Partners Univ. Innovat. Res. Pub."},{"issue":"1","key":"10.1016\/j.engappai.2025.113358_bib10","first-page":"51","article-title":"Cyber threats to critical infrastructure: assessing vulnerabilities across key sectors","volume":"2","author":"George","year":"2024","journal-title":"Partners Univ. Int. Innovat. J."},{"key":"10.1016\/j.engappai.2025.113358_bib11","article-title":"Intrusion detection in IoT networks using hyperdimensional computing: a case Study on the NSL-KDD dataset","author":"Ghajari","year":"2025","journal-title":"arXiv preprint arXiv:2503.03037"},{"key":"10.1016\/j.engappai.2025.113358_bib12","series-title":"International Conference on Data Analytics and Insights","first-page":"257","article-title":"Framework for integrating the synergies of blockchain with AI and IoT for secure distributed systems","author":"Girija","year":"2023"},{"issue":"2","key":"10.1016\/j.engappai.2025.113358_bib13","first-page":"26","article-title":"Advancing data security in global banking: innovative big data management techniques","volume":"1","author":"Hasan","year":"2024","journal-title":"Int. J.Manage.Infor.Syst.Data Sci."},{"issue":"14","key":"10.1016\/j.engappai.2025.113358_bib14","doi-asserted-by":"crossref","first-page":"8374","DOI":"10.3390\/su14148374","article-title":"Detection of distributed denial of service (DDoS) attacks in IOT based monitoring system of banking sector using machine learning models","volume":"14","author":"Islam","year":"2022","journal-title":"Sustainability"},{"issue":"1","key":"10.1016\/j.engappai.2025.113358_bib15","first-page":"20","article-title":"Literature review on computer network security in the financial sector in Indonesia challenges and solutions in facing digital security threats","volume":"1","author":"Judijanto","year":"2024","journal-title":"Sci.du Nord Nat. Sci.Technol."},{"issue":"1","key":"10.1016\/j.engappai.2025.113358_bib16","doi-asserted-by":"crossref","first-page":"15","DOI":"10.18034\/ajtp.v10i1.659","article-title":"Securing financial information in the digital realm: case studies in cybersecurity for accounting data protection","volume":"10","author":"Kafi","year":"2023","journal-title":"American. J. Trade. Policy."},{"key":"10.1016\/j.engappai.2025.113358_bib17","doi-asserted-by":"crossref","first-page":"745","DOI":"10.1016\/j.matpr.2021.04.228","article-title":"Intelligent mechanical systems and its applications on online fraud detection analysis using pattern recognition K-nearest neighbor algorithm for cloud security applications","volume":"81","author":"Kannagi","year":"2023","journal-title":"Mater. Today Proc."},{"key":"10.1016\/j.engappai.2025.113358_bib18","doi-asserted-by":"crossref","DOI":"10.3389\/frai.2021.622364","article-title":"Human-versus artificial intelligence","volume":"4","author":"Korteling","year":"2021","journal-title":"Frontiers in Artificial Intelligence"},{"key":"10.1016\/j.engappai.2025.113358_bib19","first-page":"376","article-title":"Active directory kerberoasting attack: detection using machine learning techniques","author":"Kotlaba","year":"2021","journal-title":"ICISSP"},{"issue":"3","key":"10.1016\/j.engappai.2025.113358_bib20","doi-asserted-by":"crossref","first-page":"271","DOI":"10.51594\/farj.v6i3.855","article-title":"Integrating AI with blockchain for enhanced financial services security","volume":"6","author":"Odeyemi","year":"2024","journal-title":"Finan.Account. Res. J."},{"issue":"1","key":"10.1016\/j.engappai.2025.113358_bib21","doi-asserted-by":"crossref","first-page":"1968","DOI":"10.30574\/ijsra.2024.11.1.0267","article-title":"Securing financial data storage: a review of cybersecurity challenges and solutions","volume":"11","author":"Okoye","year":"2024","journal-title":"Int. J. Sci. Res. Arch."},{"issue":"2","key":"10.1016\/j.engappai.2025.113358_bib22","first-page":"24","article-title":"Designing a comprehensive framework for data and network security in cloud computing: case of Kenyan banking industry","volume":"6","author":"Ouma","year":"2024","journal-title":"African Journal of Emerging Issues"},{"key":"10.1016\/j.engappai.2025.113358_bib23","series-title":"Advanced Computing and Intelligent Technologies: Proceedings of ICACIT 2021","first-page":"219","article-title":"Machine learning technique to prognosis diabetes disease: random forest classifier approach","author":"Palimkar","year":"2022"},{"issue":"2","key":"10.1016\/j.engappai.2025.113358_bib24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.63053\/ijrel.37","article-title":"Transformative impact of AI and digital technologies on the FinTech industry: a comprehensive review","volume":"2","author":"Pazouki","year":"2025","journal-title":"Int. J. Adv. Res. in Humanities and Law"},{"issue":"1","key":"10.1016\/j.engappai.2025.113358_bib25","doi-asserted-by":"crossref","first-page":"1172","DOI":"10.1109\/TVCG.2019.2934307","article-title":"GPGPU linear complexity t-SNE optimization","volume":"26","author":"Pezzotti","year":"2019","journal-title":"IEEE Trans. Visual. Comput. Graph."},{"key":"10.1016\/j.engappai.2025.113358_bib26","series-title":"Twentieth Symposium on Useable Privacy and Security (SOUPS 2024)","first-page":"101","article-title":"Evaluating privacy perceptions, experience, and behavior of software development teams","author":"Prybylo","year":"2024"},{"key":"10.1016\/j.engappai.2025.113358_bib27","series-title":"Advancements in Cybercrime Investigation and Digital Forensics","first-page":"161","article-title":"Data breach fraudulence and preventive measures in E-Commerce platforms","author":"Rajendran","year":"2024"},{"key":"10.1016\/j.engappai.2025.113358_bib28","series-title":"Blockchain and Artificial Intelligence (AI) Integration for Revolutionizing Security and Transparency in Finance","author":"Rane","year":"2023"},{"key":"10.1016\/j.engappai.2025.113358_bib29","unstructured":"Sridhar Madasamy, M., ADAPTIVE FRAUD DETECTION IN BANKING USING CLOUD-BASED DEEP LEARNING MODELS."},{"key":"10.1016\/j.engappai.2025.113358_bib30","series-title":"Intelligent Computing and Applications: Proceedings of ICICA","first-page":"395","article-title":"Blockchain technology: consensus protocol proof of work and proof of stake","author":"Sriman","year":"2019"},{"issue":"3","key":"10.1016\/j.engappai.2025.113358_bib31","first-page":"12","article-title":"Integrated SVM-FFNN for fraud detection in banking financial transactions","volume":"13","author":"Udayakumar","year":"2023","journal-title":"Journal of Internet Services and Information Security"},{"issue":"1","key":"10.1016\/j.engappai.2025.113358_bib32","doi-asserted-by":"crossref","first-page":"219","DOI":"10.51594\/csitrj.v5i1.718","article-title":"Big data analytics: a review of its transformative role in modern business intelligence","volume":"5","author":"Udeh","year":"2024","journal-title":"Computer Science & IT Research Journal"}],"container-title":["Engineering Applications of Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197625033895?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197625033895?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T00:15:46Z","timestamp":1768263346000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0952197625033895"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":32,"alternative-id":["S0952197625033895"],"URL":"https:\/\/doi.org\/10.1016\/j.engappai.2025.113358","relation":{},"ISSN":["0952-1976"],"issn-type":[{"value":"0952-1976","type":"print"}],"subject":[],"published":{"date-parts":[[2026,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Securing and classification of active directory domain banking data using the integration of blockchain and artificial intelligence","name":"articletitle","label":"Article Title"},{"value":"Engineering Applications of Artificial Intelligence","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.engappai.2025.113358","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"113358"}}