This study characterized the double-averaged (time and space) turbulence parameters and local flow distributions through the experimental measurement over fully submerged artificially made hemispherical rough bed. Thr...
详细信息
This paper investigates the performance trade-offs between accuracy and inference time in real-time object detection models, particularly for detecting landmines and unexploded ordnance (UXO). Using subsets from the C...
详细信息
—The current research is focused on designing a multithreaded parallel solution for processing a pair of raster image files that are used to create an animation. In the computational process, a multithreaded model wa...
详细信息
The fourth industrial revolution has seen the evolution and wide adoption of game-changing and disruptive innovation "financial technologies (FinTech)" around the globe. However, the security of FinTech syst...
详细信息
The fourth industrial revolution has seen the evolution and wide adoption of game-changing and disruptive innovation "financial technologies (FinTech)" around the globe. However, the security of FinTech systems and networks remains critical. This paper comprehensively reviews the evolving landscape of cybersecurity issues within the FinTech sector and explores effective mitigation measures. Four independent researchers reviewed relevant literature from IEEE Xplore Digital Library, ScienceDirect, Taylor & Francis, Emerald Insight, Springer, SAGE, Wiley Online Library, Hindawi, MDPI, ACM Digital Library, IGI Global, and Google Scholar. The research paper begins by examining the history and evolution of FinTech, drivers for the growth of FinTech, segments of the FinTech industry, FinTech ecosystem, FinTech business model, and FinTech application. Subsequently, it then delves into an analysis of the most pressing cybersecurity issues confronting FinTech firms, such as privacy concerns, data breaches, malware attacks, hacking, insider threats, identity theft, social engineering attacks, distributed denial-of-service attacks, and others. In response to these cybersecurity issues, the paper evaluates various mitigation strategies and best practices adopted by FinTech firms and regulatory bodies globally. These measures include technological solutions such as authentication and access control mechanisms, cryptography, big data analytics, intrusion detection/prevention systems, regular data backup, artificial intelligence and machine learning, cloud computing technologies, blockchain technologies, and fraud detection and prevention systems. The paper also emphasizes the importance of FinTech regulatory sandboxes, regulatory compliance, basic security training, continuous monitoring of threats, zero-trust policy, robust cybersecurity culture, regular testing, and stringent security policies to strengthen the FinTech ecosystem's cyber resilience. Based on empirical research, i
We analyze an aggregated dynamic model for the development of gas fields. The same company consistently drills all fields. We pose and solve the problem of maximizing accumulated gas production over a predetermined pe...
详细信息
In this study, we introduce the Sheffer stroke L-algebra and prove some fundamental theorems, propositions and lemmas of Sheffer Stroke L-algebras. The notions of filter and ultrafilter for Sheffer stroke L-algebra ar...
详细信息
The process of unsteady flow of a single-phase liquid in a cylindrical reservoir arising under the elastic mode of reservoir development is considered. To describe this process, a power law of filtration is proposed f...
详细信息
Predicting student success is an important task in educational institutions, as it allows for targeted interventions and support systems to enhance educational outcomes. This paper explores the use of SHAP (SHapley Ad...
详细信息
The principle of multiplicity is introduced for the components of the investment planning process. Some algorithms are given that ensure the process of investment planning at the regional level: the formation of integ...
详细信息
作者:
Gancheva, VeskaTechnical University of Sofia
Faculty of Computer Systems and Technologies Department of Programming and Computer Technologies 8 Kliment Ohridski blvd. Sofia1000 Bulgaria
A rising variety of platforms and software programs have leveraged repository-stored datasets and remote access in recent years. As a result, datasets are more vulnerable to malicious attacks. As a result, network sec...
详细信息
暂无评论