Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (24)

Search Parameters:
Keywords = cryptocurrency classification

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 868 KiB  
Article
Detecting Cryptojacking Containers Using eBPF-Based Security Runtime and Machine Learning
by Riyeong Kim, Jeongeun Ryu, Sumin Kim, Soomin Lee and Seongmin Kim
Electronics 2025, 14(6), 1208; https://doi.org/10.3390/electronics14061208 - 19 Mar 2025
Viewed by 696
Abstract
As the use of containers has become mainstream in the cloud environment, various security threats targeting containers have also been increasing. Among them, a notable malicious activity is a cryptojacking attack that steals resources without the consent of an instance owner to mine [...] Read more.
As the use of containers has become mainstream in the cloud environment, various security threats targeting containers have also been increasing. Among them, a notable malicious activity is a cryptojacking attack that steals resources without the consent of an instance owner to mine cryptocurrency. However, detecting such anomalies in a containerized environment is more complex because containers share the host kernel, making it challenging to pinpoint resource usage and anomalies at the container granularity without introducing significant overhead. To this end, this study proposes a runtime detection framework for identifying malicious mining behaviors in the cloud-native environment. By leveraging Tetragon, a runtime security tool based on the extended Berkeley Packet Filter (eBPF), we capture system call traces and flow-level information of cryptojacking containers to extract rich feature representations for training and evaluating various machine learning models. As a result of the experiment, our framework delivers up to 99.75% classification accuracy with moderate runtime monitoring overhead. Full article
(This article belongs to the Special Issue Machine Learning and Cybersecurity—Trends and Future Challenges)
Show Figures

Figure 1

36 pages, 6451 KiB  
Article
Cryptocurrency Taxation: A Bibliometric Analysis and Emerging Trends
by Georgiana-Iulia Lazea, Maria-Roxana Balea-Stanciu, Ovidiu-Constantin Bunget, Anca-Diana Sumănaru and Ana-Maria Georgiana Coraș
Int. J. Financial Stud. 2025, 13(1), 37; https://doi.org/10.3390/ijfs13010037 - 3 Mar 2025
Viewed by 2116
Abstract
This article conducts a comprehensive bibliometric analysis of 182 papers to trace the progression of research on cryptocurrency taxation. The study highlights prevailing patterns, influential contributors, and collaborative networks by utilising data from Scopus and the Web of Science Core Collection from 2002 [...] Read more.
This article conducts a comprehensive bibliometric analysis of 182 papers to trace the progression of research on cryptocurrency taxation. The study highlights prevailing patterns, influential contributors, and collaborative networks by utilising data from Scopus and the Web of Science Core Collection from 2002 to 2023. The findings underscore an interdisciplinary character, encompassing studies in legal frameworks, fiscal policy, economics, and technology. By employing analytical tools such as VOSviewer 1.6.20, Bibliometrix 4.0 and Microsoft Excel, the study identifies key themes and concepts focused on four main themes: international tax frameworks and regulatory variations, classification and reporting of crypto-related income, tax implications for emerging crypto segments, and issues surrounding compliance and enforcement. Tax treatment differs based on jurisdiction. Direct taxation may be levied as capital gains, income, or profit tax. Although cryptocurrency exchanges are not subject to value-added tax, intermediary services offered by platforms might incur this indirect tax. The insights generated are valuable for policymakers, scholars, and professionals aiming to comprehend the relationship between cryptocurrency and tax regulation. A limitation of the study is its exclusion of sources beyond the established timeframe. Given the fast-paced changes in cryptocurrency tax regulation, ongoing updates are crucial to capturing the full scope of this evolving field. Full article
(This article belongs to the Special Issue Cryptocurrency Markets, Centralized Finance and Decentralized Finance)
Show Figures

Graphical abstract

31 pages, 1616 KiB  
Article
Conceptualizing an Institutional Framework to Mitigate Crypto-Assets’ Operational Risk
by Deepankar Roy, Ashutosh Dubey and Daitri Tiwary
J. Risk Financial Manag. 2024, 17(12), 550; https://doi.org/10.3390/jrfm17120550 - 9 Dec 2024
Viewed by 4422
Abstract
Extent ecosystems of crypto financial assets (crypto-assets) lack parity and coherence across the globe. This asymmetry is further heightened with a knowledge gap in operational risk management, wherein the global landscape of crypto-assets is characterized by unprecedented external risks and internal vulnerabilities. In [...] Read more.
Extent ecosystems of crypto financial assets (crypto-assets) lack parity and coherence across the globe. This asymmetry is further heightened with a knowledge gap in operational risk management, wherein the global landscape of crypto-assets is characterized by unprecedented external risks and internal vulnerabilities. In this study, we present a critical examination and comprehensive analysis of current crypto-asset operational guidelines across geographies. We benchmark these guidelines to the Basel Committee for Banking Supervision (BCBS) risk classification framework for crypto-assets, identifying gaps in the operations across organizations. We, hence, conceptualize a novel institutional framework which may help in understanding and mitigating the gaps in operational risks’ regulation of crypto-assets. Our proposed Crypto-asset Operational Risk Management (CORM) framework determines how operational risk associated with crypto-assets of financial institutions can be mitigated to respond to the increasing demand for crypto-assets, cross border payments, electronic money, and cryptocurrencies, across countries. Applicable to firms irrespective of their size and scale of operations, CORM aligns with global regulatory initiatives, facilitating compliance and fostering trust among stakeholders. Strengthening our argument of CORM’s applicability, we present its efficacy in the form of alternate hypothetical outcomes in two distinct real-life cases wherein crypto-asset exchanges succumbed to either external risks, such as hacking, or internal vulnerabilities. It paves the way for future regulatory response with a structured approach to addressing the unique operational risks associated with crypto-assets. The framework advocates for collaborative efforts among industry stakeholders, ensuring its adaptability to the rapidly evolving crypto landscape. It further contributes to the establishment of a more resilient and regulated financial ecosystem, inclusive of crypto-assets. By implementing CORM, institutions can navigate the complexities of crypto-assets while safeguarding their interests and promoting sustainable growth in the digital asset market. Full article
Show Figures

Figure 1

17 pages, 1493 KiB  
Article
LLMs and NLP Models in Cryptocurrency Sentiment Analysis: A Comparative Classification Study
by Konstantinos I. Roumeliotis, Nikolaos D. Tselikas and Dimitrios K. Nasiopoulos
Big Data Cogn. Comput. 2024, 8(6), 63; https://doi.org/10.3390/bdcc8060063 - 5 Jun 2024
Cited by 10 | Viewed by 9929
Abstract
Cryptocurrencies are becoming increasingly prominent in financial investments, with more investors diversifying their portfolios and individuals drawn to their ease of use and decentralized financial opportunities. However, this accessibility also brings significant risks and rewards, often influenced by news and the sentiments of [...] Read more.
Cryptocurrencies are becoming increasingly prominent in financial investments, with more investors diversifying their portfolios and individuals drawn to their ease of use and decentralized financial opportunities. However, this accessibility also brings significant risks and rewards, often influenced by news and the sentiments of crypto investors, known as crypto signals. This paper explores the capabilities of large language models (LLMs) and natural language processing (NLP) models in analyzing sentiment from cryptocurrency-related news articles. We fine-tune state-of-the-art models such as GPT-4, BERT, and FinBERT for this specific task, evaluating their performance and comparing their effectiveness in sentiment classification. By leveraging these advanced techniques, we aim to enhance the understanding of sentiment dynamics in the cryptocurrency market, providing insights that can inform investment decisions and risk management strategies. The outcomes of this comparative study contribute to the broader discourse on applying advanced NLP models to cryptocurrency sentiment analysis, with implications for both academic research and practical applications in financial markets. Full article
(This article belongs to the Special Issue Generative AI and Large Language Models)
Show Figures

Figure 1

32 pages, 10179 KiB  
Article
Contrastive Learning Framework for Bitcoin Crash Prediction
by Zhaoyan Liu, Min Shu and Wei Zhu
Stats 2024, 7(2), 402-433; https://doi.org/10.3390/stats7020025 - 8 May 2024
Viewed by 1717
Abstract
Due to spectacular gains during periods of rapid price increase and unpredictably large drops, Bitcoin has become a popular emergent asset class over the past few years. In this paper, we are interested in predicting the crashes of Bitcoin market. To tackle this [...] Read more.
Due to spectacular gains during periods of rapid price increase and unpredictably large drops, Bitcoin has become a popular emergent asset class over the past few years. In this paper, we are interested in predicting the crashes of Bitcoin market. To tackle this task, we propose a framework for deep learning time series classification based on contrastive learning. The proposed framework is evaluated against six machine learning (ML) and deep learning (DL) baseline models, and outperforms them by 15.8% in balanced accuracy. Thus, we conclude that the contrastive learning strategy significantly enhance the model’s ability of extracting informative representations, and our proposed framework performs well in predicting Bitcoin crashes. Full article
Show Figures

Figure 1

21 pages, 4039 KiB  
Article
Enhanced Genetic-Algorithm-Driven Triple Barrier Labeling Method and Machine Learning Approach for Pair Trading Strategy in Cryptocurrency Markets
by Ning Fu, Mingu Kang, Joongi Hong and Suntae Kim
Mathematics 2024, 12(5), 780; https://doi.org/10.3390/math12050780 - 6 Mar 2024
Cited by 1 | Viewed by 4153
Abstract
In the dynamic world of finance, the application of Artificial Intelligence (AI) in pair trading strategies is gaining significant interest among scholars. Current AI research largely concentrates on regression analyses of prices or spreads between paired assets for formulating trading strategies. However, AI [...] Read more.
In the dynamic world of finance, the application of Artificial Intelligence (AI) in pair trading strategies is gaining significant interest among scholars. Current AI research largely concentrates on regression analyses of prices or spreads between paired assets for formulating trading strategies. However, AI models typically exhibit less precision in regression tasks compared to classification tasks, presenting a challenge in refining the accuracy of pair trading strategies. In pursuit of high-performance labels to elevate the precision of classification models, this study advanced the Triple Barrier Labeling Method for enhanced compatibility with pair trading strategies. This refinement enables the creation of diverse label sets, each tailored to distinct barrier configurations. Focusing on achieving maximal profit or minimizing the Maximum Drawdown (MDD), Genetic Algorithms (GAs) were employed for the optimization of these labels. After optimization, the labels were classified into two distinct types: High Risk and High Profit (HRHP) and Low Risk and Low Profit (LRLP). These labels then serve as the foundation for training machine learning models, which are designed to predict future trading activities in the cryptocurrency market. Our approach, employing cryptocurrency price data from 9 November 2017 to 31 August 2022 for training and 1 September 2022 to 1 December 2023 for testing, demonstrates a substantial improvement over traditional pair trading strategies. In particular, models trained with HRHP signals realized a 51.42% surge in profitability, while those trained with LRLP signals significantly mitigated risk, marked by a 73.24% reduction in the MDD. This innovative method marks a significant advancement in cryptocurrency pair trading strategies, offering traders a powerful and refined tool for optimizing their trading decisions. Full article
(This article belongs to the Special Issue Advances in Financial Mathematics and Risk Management)
Show Figures

Figure 1

24 pages, 2867 KiB  
Article
Bitcoin Money Laundering Detection via Subgraph Contrastive Learning
by Shiyu Ouyang, Qianlan Bai, Hui Feng and Bo Hu
Entropy 2024, 26(3), 211; https://doi.org/10.3390/e26030211 - 28 Feb 2024
Cited by 5 | Viewed by 4925
Abstract
The rapid development of cryptocurrencies has led to an increasing severity of money laundering activities. In recent years, leveraging graph neural networks for cryptocurrency fraud detection has yielded promising results. However, many existing methods predominantly focus on node classification, i.e., detecting individual illicit [...] Read more.
The rapid development of cryptocurrencies has led to an increasing severity of money laundering activities. In recent years, leveraging graph neural networks for cryptocurrency fraud detection has yielded promising results. However, many existing methods predominantly focus on node classification, i.e., detecting individual illicit transactions, rather than uncovering behavioral pattern differences among money laundering groups. In this paper, we tackle the challenges presented by the organized, heterogeneous, and noisy nature of Bitcoin money laundering. We propose a novel subgraph-based contrastive learning algorithm for heterogeneous graphs, named Bit-CHetG, to perform money laundering group detection. Specifically, we employ predefined metapaths to construct the homogeneous subgraphs of wallet addresses and transaction records from the address–transaction heterogeneous graph, enhancing our ability to capture heterogeneity. Subsequently, we utilize graph neural networks to separately extract the topological embedding representations of transaction subgraphs and associated address representations of transaction nodes. Lastly, supervised contrastive learning is introduced to reduce the effect of noise, which pulls together the transaction subgraphs with the same class while pushing apart the subgraphs with different classes. By conducting experiments on two real-world datasets with homogeneous and heterogeneous graphs, the Micro F1 Score of our proposed Bit-CHetG is improved by at least 5% compared to others. Full article
(This article belongs to the Special Issue Blockchain and Cryptocurrency Complexity)
Show Figures

Figure 1

22 pages, 359 KiB  
Article
Genetic Algorithm for Feature Selection Applied to Financial Time Series Monotonicity Prediction: Experimental Cases in Cryptocurrencies and Brazilian Assets
by Rodrigo Colnago Contreras, Vitor Trevelin Xavier da Silva, Igor Trevelin Xavier da Silva, Monique Simplicio Viana, Francisco Lledo dos Santos, Rodrigo Bruno Zanin, Erico Fernandes Oliveira Martins and Rodrigo Capobianco Guido
Entropy 2024, 26(3), 177; https://doi.org/10.3390/e26030177 - 20 Feb 2024
Cited by 2 | Viewed by 2303
Abstract
Since financial assets on stock exchanges were created, investors have sought to predict their future values. Currently, cryptocurrencies are also seen as assets. Machine learning is increasingly adopted to assist and automate investments. The main objective of this paper is to make daily [...] Read more.
Since financial assets on stock exchanges were created, investors have sought to predict their future values. Currently, cryptocurrencies are also seen as assets. Machine learning is increasingly adopted to assist and automate investments. The main objective of this paper is to make daily predictions about the movement direction of financial time series through classification models, financial time series preprocessing methods, and feature selection with genetic algorithms. The target time series are Bitcoin, Ibovespa, and Vale. The methodology of this paper includes the following steps: collecting time series of financial assets; data preprocessing; feature selection with genetic algorithms; and the training and testing of machine learning models. The results were obtained by evaluating the models with the area under the ROC curve metric. For the best prediction models for Bitcoin, Ibovespa, and Vale, values of 0.61, 0.62, and 0.58 were obtained, respectively. In conclusion, the feature selection allowed the improvement of performance in most models, and the input series in the form of percentage variation obtained a good performance, although it was composed of fewer attributes in relation to the other sets tested. Full article
(This article belongs to the Special Issue Advanced Statistical Applications in Financial Econometrics)
Show Figures

Figure 1

13 pages, 1896 KiB  
Article
Disentangled Prototypical Graph Convolutional Network for Phishing Scam Detection in Cryptocurrency Transactions
by Seok-Jun Buu and Hae-Jung Kim
Electronics 2023, 12(21), 4390; https://doi.org/10.3390/electronics12214390 - 24 Oct 2023
Cited by 1 | Viewed by 1671
Abstract
Blockchain technology has generated an influx of transaction data and complex interactions, posing significant challenges for traditional machine learning methods, which struggle to capture high-dimensional patterns in transaction networks. In this paper, we present the disentangled prototypical graph convolutional network (DP-GCN), an innovative [...] Read more.
Blockchain technology has generated an influx of transaction data and complex interactions, posing significant challenges for traditional machine learning methods, which struggle to capture high-dimensional patterns in transaction networks. In this paper, we present the disentangled prototypical graph convolutional network (DP-GCN), an innovative approach to account classification in Ethereum transaction records. Our method employs a unique disentanglement mechanism that isolates relevant features, enhancing pattern recognition within the network. Additionally, we apply prototyping to disentangled representations, to classify scam nodes robustly, despite extreme class imbalances. We further employ a joint learning strategy, combining triplet loss and prototypical loss with a gamma coefficient, achieving an effective balance between the two. Experiments on real Ethereum data showcase the success of our approach, as the DP-GCN attained an F1 score improvement of 32.54%p over the previous best-performing GCN model and an area under the ROC curve (AUC) improvement of 4.28%p by incorporating our novel disentangled prototyping concept. Our research highlights the importance of advanced techniques in detecting malicious activities within large-scale real-world cryptocurrency transactions. Full article
(This article belongs to the Special Issue Security, Privacy, Confidentiality and Trust in Blockchain)
Show Figures

Figure 1

15 pages, 3388 KiB  
Article
A K-Means Classification and Entropy Pooling Portfolio Strategy for Small and Large Capitalization Cryptocurrencies
by Jules Clement Mba and Ehounou Serge Eloge Florentin Angaman
Entropy 2023, 25(8), 1208; https://doi.org/10.3390/e25081208 - 14 Aug 2023
Cited by 2 | Viewed by 1583
Abstract
In this study, we propose three portfolio strategies: allocation based on the normality assumption, the skewed-Student t distribution, and the entropy pooling (EP) method for 14 small- and large-capitalization (cap) cryptocurrencies. We categorize our portfolios into three groups: portfolio 1, consisting of three [...] Read more.
In this study, we propose three portfolio strategies: allocation based on the normality assumption, the skewed-Student t distribution, and the entropy pooling (EP) method for 14 small- and large-capitalization (cap) cryptocurrencies. We categorize our portfolios into three groups: portfolio 1, consisting of three large-cap cryptocurrencies and four small-cap cryptocurrencies from various K-means classification clusters; and portfolios 2 and 3, consisting of seven small-cap and seven large-cap cryptocurrencies, respectively. Then, we investigate the performance of the proposed strategies on these portfolios by performing a backtest during a crypto market crash. Our backtesting covers April 2022 to October 2022, when many cryptocurrencies experienced significant losses. Our results indicate that the wealth progression under the normality assumption exceeds that of the other two strategies, though they all exhibit losses in terms of final wealth. In addition, we found that portfolio 3 is the best-performing portfolio in terms of wealth progression and performance measures, followed by portfolios 1 and 2, respectively. Hence, our results suggest that investors will benefit from investing in a portfolio consisting of large-cap cryptocurrencies. In other words, it may be safer to invest in large-cap cryptocurrencies than in small-cap cryptocurrencies. Moreover, our results indicate that adding large- and small-cap cryptocurrencies to a portfolio could improve the diversification benefit and risk-adjusted returns. Therefore, while cryptocurrencies may offer potentially high returns and diversification benefits in a portfolio, investors should be aware of the risks and carefully consider their investment objectives and risk tolerance before investing in them. Full article
(This article belongs to the Special Issue Entropy in Data Analysis II)
Show Figures

Figure 1

21 pages, 3120 KiB  
Article
CEAT: Categorising Ethereum Addresses’ Transaction Behaviour with Ensemble Machine Learning Algorithms
by Tiffany Tien Nee Pragasam, John Victor Joshua Thomas, Maria Anu Vensuslaus and Subhashini Radhakrishnan
Computation 2023, 11(8), 156; https://doi.org/10.3390/computation11080156 - 9 Aug 2023
Cited by 5 | Viewed by 2498
Abstract
Cryptocurrencies are rapidly growing and are increasingly accepted by major commercial vendors. However, along with their rising popularity, they have also become the go-to currency for illicit activities driven by the anonymity they provide. Cryptocurrencies such as the one on the Ethereum blockchain [...] Read more.
Cryptocurrencies are rapidly growing and are increasingly accepted by major commercial vendors. However, along with their rising popularity, they have also become the go-to currency for illicit activities driven by the anonymity they provide. Cryptocurrencies such as the one on the Ethereum blockchain provide a way for entities to hide their real-world identities behind pseudonyms, also known as addresses. Hence, the purpose of this work is to uncover the level of anonymity in Ethereum by investigating multiclass classification models for Externally Owned Accounts (EOAs) of Ethereum. The researchers aim to achieve this by examining patterns of transaction activity associated with these addresses. Using a labelled Ethereum address dataset from Kaggle and the Ethereum crypto dataset by Google BigQuery, an address profiles dataset was compiled based on the transaction history of the addresses. The compiled dataset, consisting of 4371 samples, was used to tune and evaluate the Random Forest, Gradient Boosting and XGBoost classifier for predicting the category of the addresses. The best-performing model found for the problem was the XGBoost classifier, achieving an accuracy of 75.3% with a macro-averaged F1-Score of 0.689. Following closely was the Random Forest classifier, with an accuracy of 73.7% and a macro-averaged F1-Score of 0.641. Gradient Boosting came in last with 73% accuracy and a macro-averaged F1-Score of 0.659. Owing to the data limitations in this study, the overall scores of the best model were weaker in comparison to similar research, with the exception of precision, which scored slightly higher. Nevertheless, the results proved that it is possible to predict the category of an Ethereum wallet address such as Phish/Hack, Scamming, Exchange and ICO wallets based on its transaction behaviour. Full article
(This article belongs to the Special Issue Intelligent Computing, Modeling and its Applications)
Show Figures

Figure 1

14 pages, 795 KiB  
Article
Phishing Node Detection in Ethereum Transaction Network Using Graph Convolutional Networks
by Zhen Zhang, Tao He, Kai Chen, Boshen Zhang, Qiuhua Wang and Lifeng Yuan
Appl. Sci. 2023, 13(11), 6430; https://doi.org/10.3390/app13116430 - 24 May 2023
Cited by 4 | Viewed by 2660
Abstract
As the use of digital currencies, such as cryptocurrencies, increases in popularity, phishing scams and other cybercriminal activities on blockchain platforms (e.g., Ethereum) have also risen. Current methods of detecting phishing in Ethereum focus mainly on the transaction features and local network structure. [...] Read more.
As the use of digital currencies, such as cryptocurrencies, increases in popularity, phishing scams and other cybercriminal activities on blockchain platforms (e.g., Ethereum) have also risen. Current methods of detecting phishing in Ethereum focus mainly on the transaction features and local network structure. However, these methods fail to account for the complexity of interactions between edges and the handling of large graphs. Additionally, these methods face significant issues due to the limited number of positive labels available. Given this, we propose a scheme that we refer to as the Bagging Multiedge Graph Convolutional Network to detect phishing scams on Ethereum. First, we extract the features from transactions and transform the complex Ethereum transaction network into three simple inter-node graphs. Then, we use graph convolution to generate node embeddings that leverage the global structural information of the inter-node graphs. Further, we apply the bagging strategy to overcome the issues of data imbalance and the Positive Unlabeled (PU) problem in transaction data. Finally, to evaluate our approach’s effectiveness, we conduct experiments using actual transaction data. The results demonstrate that our Bagging Multiedge Graph Convolutional Network (0.877 AUC) outperforms all of the baseline classification methods in detecting phishing scams on Ethereum. Full article
(This article belongs to the Special Issue Advances in Cybersecurity: Challenges and Solutions)
Show Figures

Figure 1

13 pages, 2818 KiB  
Article
Predicting Cryptocurrency Fraud Using ChaosNet: The Ethereum Manifestation
by Anurag Dutta, Liton Chandra Voumik, Athilingam Ramamoorthy, Samrat Ray and Asif Raihan
J. Risk Financial Manag. 2023, 16(4), 216; https://doi.org/10.3390/jrfm16040216 - 29 Mar 2023
Cited by 19 | Viewed by 4738
Abstract
Cryptocurrencies are in high demand now due to their volatile and untraceable nature. Bitcoin, Ethereum, and Dogecoin are just a few examples. This research seeks to identify deception and probable fraud in Ethereum transactional processes. We have developed this capability via ChaosNet, an [...] Read more.
Cryptocurrencies are in high demand now due to their volatile and untraceable nature. Bitcoin, Ethereum, and Dogecoin are just a few examples. This research seeks to identify deception and probable fraud in Ethereum transactional processes. We have developed this capability via ChaosNet, an Artificial Neural Network constructed using Generalized Luröth Series maps. Chaos has been objectively discovered in the brain at many spatiotemporal scales. Several synthetic neuronal simulations, including the Hindmarsh–Rose model, possess chaos, and individual brain neurons are known to display chaotic bursting phenomena. Although chaos is included in several Artificial Neural Networks (ANNs), for instance, in Recursively Generating Neural Networks, no ANNs exist for classical tasks entirely made up of chaoticity. ChaosNet uses the chaotic GLS neurons’ property of topological transitivity to perform classification problems on pools of data with cutting-edge performance, lowering the necessary training sample count. This synthetic neural network can perform categorization tasks by gathering a definite amount of training data. ChaosNet utilizes some of the best traits of networks composed of biological neurons, which derive from the strong chaotic activity of individual neurons, to solve complex classification tasks on par with or better than standard Artificial Neural Networks. It has been shown to require much fewer training samples. This ability of ChaosNet has been well exploited for the objective of our research. Further, in this article, ChaosNet has been integrated with several well-known ML algorithms to cater to the purposes of this study. The results obtained are better than the generic results. Full article
(This article belongs to the Special Issue Financial Applications to Business and Financial Risk Management)
Show Figures

Figure 1

42 pages, 3130 KiB  
Review
A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions
by Ömer Aslan, Semih Serkant Aktuğ, Merve Ozkan-Okay, Abdullah Asim Yilmaz and Erdal Akin
Electronics 2023, 12(6), 1333; https://doi.org/10.3390/electronics12061333 - 11 Mar 2023
Cited by 252 | Viewed by 94820
Abstract
Internet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) pandemic has accelerated this process. As a result of the widespread usage of the digital environment, traditional crimes have [...] Read more.
Internet usage has grown exponentially, with individuals and companies performing multiple daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) pandemic has accelerated this process. As a result of the widespread usage of the digital environment, traditional crimes have also shifted to the digital space. Emerging technologies such as cloud computing, the Internet of Things (IoT), social media, wireless communication, and cryptocurrencies are raising security concerns in cyberspace. Recently, cyber criminals have started to use cyber attacks as a service to automate attacks and leverage their impact. Attackers exploit vulnerabilities that exist in hardware, software, and communication layers. Various types of cyber attacks include distributed denial of service (DDoS), phishing, man-in-the-middle, password, remote, privilege escalation, and malware. Due to new-generation attacks and evasion techniques, traditional protection systems such as firewalls, intrusion detection systems, antivirus software, access control lists, etc., are no longer effective in detecting these sophisticated attacks. Therefore, there is an urgent need to find innovative and more feasible solutions to prevent cyber attacks. The paper first extensively explains the main reasons for cyber attacks. Then, it reviews the most recent attacks, attack patterns, and detection techniques. Thirdly, the article discusses contemporary technical and nontechnical solutions for recognizing attacks in advance. Using trending technologies such as machine learning, deep learning, cloud platforms, big data, and blockchain can be a promising solution for current and future cyber attacks. These technological solutions may assist in detecting malware, intrusion detection, spam identification, DNS attack classification, fraud detection, recognizing hidden channels, and distinguishing advanced persistent threats. However, some promising solutions, especially machine learning and deep learning, are not resistant to evasion techniques, which must be considered when proposing solutions against intelligent cyber attacks. Full article
Show Figures

Figure 1

21 pages, 2088 KiB  
Review
The Emerging Technologies of Digital Payments and Associated Challenges: A Systematic Literature Review
by Khando Khando, M. Sirajul Islam and Shang Gao
Future Internet 2023, 15(1), 21; https://doi.org/10.3390/fi15010021 - 30 Dec 2022
Cited by 44 | Viewed by 73990
Abstract
The interplay between finance and technology with the use of the internet triggered the emergence of digital payment technologies. Such technological innovation in the payment industry is the foundation for financial inclusion. However, despite the continuous progress and potential of moving the payment [...] Read more.
The interplay between finance and technology with the use of the internet triggered the emergence of digital payment technologies. Such technological innovation in the payment industry is the foundation for financial inclusion. However, despite the continuous progress and potential of moving the payment landscape towards digital payments and connecting the population to the ubiquitous digital environment, some critical issues need to be addressed to achieve a more harmonious inclusive and sustainable cashless society. The study aims to provide a comprehensive literature review on the emerging digital payment technologies and associated challenges. By systematically reviewing existing empirical studies, this study puts forward the state-of-the-art classification of digital payment technologies and presents four categories of digital payment technologies: card payment, e-payment,mobile payment and cryptocurrencies. Subsequently, the paper presents the key challenges in digital payment technologies categorized into broad themes: social, economic, technical, awareness and legal. The classification and categorization of payment technologies and associated challenges can be useful to both researchers and practitioners to understand, elucidate and develop a coherent digital payment strategy. Full article
(This article belongs to the Collection Featured Reviews of Future Internet Research)
Show Figures

Figure 1

Back to TopTop