Volume no :
9 |Issue no :
02Article Type :
Scholarly ArticleAuthor :
Prof.P.S.Ingle,Karan Pradip Morey, Om Vishwanath VasuPublished Date :
June, 2025Publisher :
Journal of Artificial Intelligence and Cyber Security (JAICS)Mahmoud Abdallah M. M. Mousa, “Credit Card Fraud Detection in the Banking Sector: A Comprehensive Machine Learning Approach for Information Security”, Artificial Intell. Cyb.Vol. 2(2025) 1–13
Tejaswini Patil, Kiran Khadare, “Credit Card Fraud Detection”, Online ISSN: 2395-602X (www.ijsrst.com)
Ibrahim Y. Hafez, Ahmed Y. Hafez, Ahmed Saleh, Amr A. Abd El‑Mageed,Amr A. Abohany, “A systematic review of AI‑enhanced techniques in credit card fraud detection”, Journal of Big Data (2025) 12:6 Parkar P, Bilimoria A. A survey on cyber security IDS using ML methods. 2021 5th International Conference on Intelligent
Computing and Control Systems (ICICCS), pp. 352–360, 2021. https:// api. seman ticsc holar. org/ Corpu sID: 23520 8042.
Musa N, Mirza N, Rafique S, Abdallah A, Murugan T. machine learning and deep learning techniques for distributed denial of service anomaly detection in software defined networks—current research solutions. IEEE Access. 2024. https:// doi. org/ 10. 1109/ ACCESS. 2024. 33608 68.
Eswaran M, Hamsanandhini S, Lakshmi KI. Survey of cyber security approaches for attack detection and prevention.
[1] Turk J Comput Math Educ. 2021;12(2):3436–41. https:// www. proqu est. com/ schol arly-journ als/ survey-cyber-security-appro aches-attack-detec tion/ docvi ew/ 26246 98524/ se-2.
[2] Barik K, Misra S, Konar K, Fernandez-Sanz L, Koyuncu M. Cybersecurity deep: approaches, attacks dataset, and comparative study. Appl Artif Intell. 2022. https:// doi. org/ 10. 1080/ 08839 514. 2022. 20553 99.
[3] Morovat K, Panda B. A survey of artificial intelligence in cybersecurity. In 2020 International Conference on Computational Science and Computational Intelligence (CSCI), 2020, pp. 109–115. https:// doi. org/ 10. 1109/ CSCI5 1800. 2020. 00026.
[4] Rauf U, Mohsen F, Wei Z. A taxonomic classification of insider threats: existing techniques, future directions & recommendations. J Cyber Secur Mobil. 2023;12(2):221–52. https:// doi. org/ 10. 13052/ jcsm2 245-1439. 1225.
[5] Thanh Vu SN, Stege M, El-Habr PI, Bang J, Dragoni N. A survey on botnets: incentives, evolution, detection and current trends. Future Internet. 2021. https:// doi. org/ 10. 3390/ fi130 80198.
[6] Abu Bakar A, Zolkipli MF. Cyber security threats and predictions: a survey. Int J Adv Eng Manag IJAEM. 2023;5:73. https:// doi. org/ 10. 35629/ 5252-05027 33741.
[7] Parizad A, Hatziadoniu CJ. Cyber-attack detection using principal component analysis and noisy clustering algorithms: a collaborative machine learning-based framework. IEEE Trans Smart Grid. 2022. https:// doi. org/ 10. 1109/ TSG. 2022. 31763 11.