Review
References
Abdullayev V, Chauhan AS (2023). SQL Injection Attack: Quick View. Mesopotamian Journal of Cybersecurity 2023:30-34 |
|
Abuhamad M, Abusnaina A, Nyang DH, Mohaisen D (2020). Sensor Based Continuous Authentication of Smartphones' Users Using Behavioral Biometrics: A Contemporary Survey. IEEE Internet of Things Journal 8(1):65-84. |
|
Acharya S, Joshi S (2020). Impact of Cyber-attacks on Banking Institutions in India.A Study of Safety Mechanisms and Prevention Measures. Palarch's Journal of Archeology of Egypt 17(6):4656-4670. |
|
Agrawal DP, Wang H (2018). Computer and Cyber Security. Auerbach Publications, New York. |
|
Alajanbi M, Ismail MA, Hasan RA, Sulaiman J (2021). Intrusion Detection: A Review, Mesopotamian Journal of Cyber Security 2021:1-4. |
|
Anu P, Vimala S (2017). A Survey of Sniffing Attacks on Computer Networks. International Conference on Intelligent Computing and (I2C2) pp. 1-5. |
|
Bagudu H, Khan S., Roslan A (2017). The Effect of Mobile Banking on the Performance of Commercial Banks in Nigeria. International Research Journal of Management, IT & Social Sciences 4(2):71-76. |
|
Baklizi M, Atoum I, Hasan MAS, Abdullah N, Al-Wesabi OA, Otoom AA (2023). Prevention of Website SQL Injection Using a New Query Comparison and Encryption Algorithm. International Journal of Intelligent Systems and Applications in Engineering 11(1):228-238. |
|
Bhattacharya I, Reddy PS (2022). Packet Sniffer. Journal of Engineering Sciences 13(6):204-211. |
|
Bojjagani S, Sastry VN (2017). A Threat Model for Vulnerability Assessment and Penetration Testing for Android and Ios Mobile Banking Applications. 3rd International Conference on Collaborative and Internet Computing pp. 77-86. IEEE. |
|
Brandt M, Dai T, Klein A, Shulman H, Waidner M (2018). Domain Validation for Man in the Middle Resilient Public Key Infrastructure. In Proceedings of the 2018 Conference on Computer and Communications Security pp. 2060-2076 |
|
Camillo M (2017). Cybersecurity. Risks and Management of Risks for Global Banks and Financial Institutions. Journal of Risk Management in Financial Institutions 10(2):196-200. |
|
Chen HC, Nshimiyimana A, Damarjati C, Chang PH (2021). Detection and Prevention of Cross-Site Scripting attack with Combined Approaches. International Conference on Electronics, Information, and Communication pp. 1-4. IEEE |
|
Chou D, Jiang M (2021). A survey on data-driven network intrusion detection, ACM Computing Surveys 54(9):1-36. |
|
Costantino G, La Marra FA, Martinelli F, Matteucci I (2018). Candy. A Social Engineering Attack to Leak Information from Infotainment System. 87th Vehicular Technology Conference pp. 1-5. |
|
Crespo-Martínez IS, Campazas-Vega A, Guerrero-Higueras AM, Riego-DelCastillo V, Álvarez-Aparicio C, Fernández-Llamas C (2023). SQL injection attack detection in network flow data. Computers and Security 127:103093 |
|
Digital Transformation Cyber Security News (2016). Tesco Bank Fined £16.4m after Hackers siphoned £2.26m from customers in 2016. |
|
EMBASB (2022). European Mobile Banking Apps White Paper. |
|
Ghafir I (2016). Social Engineering Attack Atrategies and Defense Approaches. Proceedings of the IEEE International Conference on Future Internet of Things and Cloud pp. 145-149. |
|
Gupta S, Gupta BB (2016). XSS-SAFE: A Server-Side Approach to Detect and Mitigate Cross-Site Scripting (XSS) Attacks in JavaScript Code. Arabian Journal for Science and Engineering 41:897-920. |
|
Gupta BB, Gupta S, Chaudhary P (2017). Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud. International Journal of Cloud Applications and Computing 7(1):1-31. |
|
Gupta S, Gupta BB (2018). XSS-Secure as a Service for the Platforms of Online Social Network-Based Multimedia Web Applications in Cloud. Multimedia Tools and Applications 77:4829-4861. |
|
Hadabi A, Elsamani E, Abdallah A, Elhabob R (2022). An Efficient Model to Detect and Prevent SQL Injection Attack, Journal of Karary University for Engineering and Science pp. 1-6. |
|
Hasham S, Joshi S, Mikkelsen D (2019). Financial crime and fraud in the age of cybersecurity. McKinsey & Company pp. 1-11. |
|
Hossain MA, Ahmed F (2014). Evaluating the Impact of Mobile Banking Deployment for Microfinance. University of Dhaka Journal of Marketing 2012(15):144-157. |
|
Hubballi N, Tripathi N (2017). A Closer Look into DHCP Starvation Attack in Wireless Networks. Computers & Security 65:387-404. |
|
Imagine IT (2023). The Rise of Mobile Malware. |
|
Javeed D, Badamasi UM, Ndubuisi CO, Soomro F, Asif M (2020). Man in the Middle Attacks: Analysis, Motivation and Prevention. International Journal of Computer Networks and Computing Security 8(7):52-57. |
|
Jiang F, Fu Y, Gupta BB, Liang Y, Rho S, Lou F (2020). Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security. IEEE Transactions on Sustainable Computing 5(2):204-212. |
|
Kaka S, Sastry VN, Maiti RR (2017). On the MitM Vulnerability in Mobile Banking Applications for Android Devices. International Conference on Advanced Networks and Telecommunications Systems pp. 1-6. |
|
Kaur G, Pande B, Bhardwaj A, Bhagat G, Gupta S (2018). Efficient yet Robust Elimination of XSS Attack Vectors from HTML5 Web Applications Hosted on OSN-Based Cloud Platforms. Procedia Computer Science 125:669-675. |
|
Khomich A (2022). Designing Mobile Banking Apps. |
|
Kieseberg P, Fruhwirt P, Schrittwieser S, Weippl E (2015). Security Tests for Mobile Applications why using tls/ssl is not enough. 8th International Conference on Software Testing, Verification and Validation pp. 1-2. |
|
Kirsten S (2016). Cross Site Scripting (XSS) Software Attack. |
|
Kumar M (2023). SQL Injection Attack on Database System. Wireless Communication Security pp. 183-198. |
|
Manhas S (2022). An Interpretive Saga of SQL Injection Attacks," in Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 1:3-12. Singapore: Springer Nature Singapore. |
|
Mastkar N, Isankar M, Sheikh FR, Singh D, Ramteka S (2018). Survey Paper on Securing Online Transaction using Cryptography and Steganography. International Journal of Scientific Research in Science, Engineering and Technology 4(4):463-465. |
|
Mtaho AB (2015). Improving Mobile Money Security with Two-Factor Authentication. International Journal of Computer Application 109(7). |
|
Ndatinya V, Xiao Z (2015). Network Forensic Analysis using Wireshark, International Journal of Sensor Networks 10(2):97-106 |
|
Nerwal B, Mohapatra AK, Usmani KA (2019). Towards a Taxonomy of Cyber Threats against Target Applications. Journal of Statistics and Management Systems 22(2):301-325. |
|
Okpara OS, Bekaroo G (2017). Fingerprint-Based Authentication in M-wallets using Embedded Cameras. IEEE International Conference on Environment and Electrical Engineering and Industrial and Commercial Power Systems Europe 1-5. |
|
Positive Technologies (2020). Vulnerabilities and Threats in Mobile Banking. |
|
Raharja PSJ, Tresna R (2019). Adoption of Information and Communication Technology on Enhancing Business Performance. Study on Creative Industry SMEs in Bandung City, Indonesia. Review of Integrative Business and Economics Research 8(3):20-30. |
|
Sahoo SR, Gupta BB (2019). Classification of Various Attacks and Their Defense Mechanism in Online Social Networks. A Survey. Enterprise Information Systems 13(6):832-864. |
|
Salahdine F, Kaabouch N (2019). Social Engineering Attacks: A Survey. Future Internet 11(4):89. |
|
Sahin M, Ünlü T, Hébert C, Shepherd LA, Coull N, Mc Lean C (2022). Measuring developers' web security awareness from attack and defense perspectives. In 2022 IEEE Security and Privacy Workshops (SPW) pp. 31-43. |
|
Salim A, Sagheer AM, Yaseen L (2020). Design and Implementation of a Secure Mobile Banking System based on Elliptic Curve Integrated Encryption Schema Springer Nature Switzerland 1174:424-438 |
|
Sang NM (2021). Critical Factors affecting Consumer Intention of using Mobile Banking Applications During CCOVID-19 Pandemic: An Empirical Study from Vietnam Journal of Asian Finance, Economics and Business 8(11):157-167. |
|
Shachi M, Shourav NS, Ahmed ASS, Brishty AA, Sakib NA (2021). Survey on Detection and Prevention of SQL and NoSQL Injection Attack on Server-side Applications. International Journal of Computer Applications 183(10):1-7. |
|
Stevens C (2020). Assembling Cybersecurity: The politics and materiality of Technical Malware Reports and the Case of Stuxnet. Contemporary Security Policy 41(1):129-152. |
|
Tran HTT, Corner J (2016). The impact of communication channels on mobile banking adoption. International Journal of Bank Marketing 34(1):78-109. |
|
Tripathi N, Hubballi N (2021). Application Layer Denial-of-Service (DoS) Attacks and Defense Mechanisms: A Survey. Association for Computing Machinery 1(1):1-33. |
|
Usman K, Obilikwu P, Patrick K, Karim R (2019). Securing Data on Transmission From Man-In-The-Middle Attacks using Diffie Hell-man Key Exchange Encryption Mechanism. International Journal of Engineering and Science 8(8):88-94. |
|
Xu G, Xie X, Huang S, Zhang J, Pan L, Lou W (2020). A Novel Policy-Based XSS Defense Mechanism for Browsers. IEEE Transactions on Dependable and Secure Computing 19(2):826-878. |
|
Yadav N, Shekokar NM (2023). SQL Injection Attacks on Indian Websites: A Case Study, in Cyber Security Threats and Challenges Facing Human Life: Chapman and Hall/CRC pp. 153-170. |
|
Yildirim N, Varol A (2019). A research on Security Vulnerabilities in Online and Mobile Banking Systems. 7th International Symposium on Digital Forensics and Security pp. 1-5. |
|
Zhu L, Hu Z, Heidemann J, Wessels D, Mankin A, Somaiya N (2015). Connection-Oriented DNS to Improve Privacy and Security. IEEE Symposium on Security and Privacy pp. 171-186. |
Copyright © 2025 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0