{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T13:03:46Z","timestamp":1763643826881,"version":"3.28.0"},"reference-count":54,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T00:00:00Z","timestamp":1678233600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T00:00:00Z","timestamp":1678233600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,3,8]]},"DOI":"10.1109\/ccwc57344.2023.10099355","type":"proceedings-article","created":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T17:28:01Z","timestamp":1681838881000},"page":"0368-0374","source":"Crossref","is-referenced-by-count":8,"title":["Recent Advances in Cybersecurity and Fraud Detection in Financial Services: A Survey"],"prefix":"10.1109","author":[{"given":"Aakriti","family":"Bajracharya","sequence":"first","affiliation":[{"name":"Howard University,Washington, DC,USA,20058"}]},{"given":"Barron","family":"Harvey","sequence":"additional","affiliation":[{"name":"Howard University,Washington, DC,USA,20058"}]},{"given":"Danda B.","family":"Rawat","sequence":"additional","affiliation":[{"name":"Howard University,Washington, DC,USA,20058"}]}],"member":"263","reference":[{"key":"ref1","first-page":"24","article-title":"The global cyber threat","author":"Maurer","year":"2021","journal-title":"Finance & Development"},{"issue":"1","key":"ref2","first-page":"32","article-title":"A survey on recent advances in cloud computing security","volume":"9","author":"Malomo","journal-title":"J. Next Gener. Inf. Technol"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.22360\/SpringSim.2020.CSE.004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2907247"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3150363"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11020213"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1108\/JFC-12-2017-0128"},{"volume-title":"Financial services risk: Cyber: Ages","year":"2021","author":"Stanislawski","key":"ref8"},{"volume-title":"Modern bank heists 5.0: The escalation from dwell to destruction","year":"2022","author":"Kellermann","key":"ref9"},{"volume-title":"new data shows FTC received 2.8 million fraud reports from consumers in 2021","year":"2022","key":"ref10"},{"volume-title":"Building an effective financial fraud detection solution using cloud-based, gpu-accelerated systems","year":"2022","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1177\/1071181321651206"},{"volume-title":"Analysis - the u.s. isnt getting ahead of the cyber threat, experts say","year":"2022","author":"Marks","key":"ref13"},{"key":"ref14","article-title":"Sonicwall cyber threat report","author":"Conner","year":"2022","journal-title":"Sonic Wall"},{"volume-title":"Flashpoint year in review: 2022 financial threat landscape","year":"2022","author":"Team","key":"ref15"},{"volume-title":"Number of ransomware attacks per year 2016-Hl 2022","year":"2022","author":"Petrosyan","key":"ref17"},{"volume-title":"The state of ransomware in financial services 2022 - sophos","year":"2022","author":"Mahendru","key":"ref18"},{"volume-title":"Wall street banks quietly test cyber defenses at treasurys direction","year":"2022","author":"Condon","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2016.01.002"},{"volume-title":"Howler security predictions: How will the threat landscape evolve in 2023?","year":"2022","author":"Skipper","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/23738871.2021.2014920"},{"volume-title":"Enemy at the gates: Analyzing attacks on financial services","author":"Doytshman","key":"ref23"},{"volume-title":"Shields up","key":"ref24"},{"volume-title":"Fraudsters cloned company directors voice in 35 million bank heist, police find","year":"2022","author":"Brewster","key":"ref25"},{"volume-title":"Bnpl (buy now pay later) research","year":"2022","author":"Tetnowski","key":"ref26"},{"volume-title":"Buy now pay later transactions will surpass $00 billion by 2024","year":"2022","author":"Clark","key":"ref27"},{"key":"ref28","article-title":"Grow now, regulate later? regulation urgently needed to support transparency and sustainable growth for buy-now, pay-later","author":"Lux","year":"2022","journal-title":"M-RCBG Associate Working Paper Series"},{"volume-title":"Can banks win in the booming buy-now-pay-later space?","year":"2021","author":"Hrushka","key":"ref29"},{"volume-title":"Fraud is becoming the biggest headache in financial services","year":"2022","author":"Ciutina","key":"ref30"},{"volume-title":"Reported crypto scam losses since 2021 top $ billion, says ftc data spotlight","year":"2022","author":"Fair","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1186\/s40163-021-00163-8"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.20955\/r.103.153-74"},{"volume-title":"United states financial services cyber security market analysis by product type (hardware, software, services); and by application (banking institutions, insurance companies, investment management companies, others)-supply amp; demand analysis amp; opportunity out-look 2022\u20132031","year":"2022","author":"Research","key":"ref34"},{"key":"ref35","article-title":"Commercial propertyl casualty market index","author":"Council","year":"2022","journal-title":"The Council of Insurance Agents & Brokers"},{"key":"ref36","article-title":"The future of cyber insurance","author":"Butler","year":"2022","journal-title":"Dark Reading"},{"volume-title":"23 eye-opening cybersecurity insurance statistics (2023)","year":"2023","author":"Cole","key":"ref37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbvi.2019.e00151"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64322-8_1"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1108\/02686901111142558"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.xinn.2021.100176"},{"volume-title":"The life and times of cybersecurity professionals 2021- volume v","year":"2021","author":"Oltsik","key":"ref42"},{"key":"ref43","article-title":"Cybersecurity trends: Looking over the horizon","author":"Boehm","year":"2022","journal-title":"McKinsey amp; Company"},{"journal-title":"Cybersecurity Workforce Study","article-title":"A critical need for cybersecurity professionals persists amidst a year of cultural and workplace evolution","year":"2022, 2022","key":"ref44"},{"key":"ref45","article-title":"Council post: A new approach is needed to close the cyber-security talent gap","author":"Sass","year":"2022","journal-title":"Forbes"},{"volume-title":"Gartner Says More Than Half of Enterprise IT Spending in Key Market Segments Will Shift to the Cloud by 2025","year":"2022","key":"ref46"},{"key":"ref47","article-title":"Red team versus blue team: how to run an effective simulation","author":"Mejia","year":"2008","journal-title":"CSO Online-Security and Risk"},{"key":"ref48","first-page":"1","article-title":"Market impact: Cloud shift - 2022 through 2025","volume":"2022","author":"Moore","year":"2022","journal-title":"In-foworld"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT49673.2020.9208856"},{"key":"ref50","article-title":"Innovation insight for extended detection and response","author":"Firstbrook","year":"2021","journal-title":"Gartner ID G00718616"},{"journal-title":"Global extended detection and response market by component (solutions and services), deployment mode (cloud and on-premises), organization size (smes and large enterprises), vertical (bfsi, government, retail and ecommerce) and region - forecast to 2027","key":"ref51","article-title":"R. ltd and Markets"},{"journal-title":"Quantum computing: progress and prospects","article-title":"E. National Academies of Sciences, Medicine et al","year":"2019","key":"ref52"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.18034\/ei.v9i2.549"},{"key":"ref54","article-title":"The im-pact of quantum computing on present cryptography","author":"Mavroeidis","year":"2018","journal-title":"ar Xiv preprint"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.revip.2019.100028"}],"event":{"name":"2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC)","start":{"date-parts":[[2023,3,8]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2023,3,11]]}},"container-title":["2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10099037\/10098906\/10099355.pdf?arnumber=10099355","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T01:35:55Z","timestamp":1710380155000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10099355\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,8]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/ccwc57344.2023.10099355","relation":{},"subject":[],"published":{"date-parts":[[2023,3,8]]}}}