PeerJ Computer Science最新文献

筛选
英文 中文
An online intelligent detection method for slurry density in concept drift data streams based on collaborative computing.
IF 3.5 4区 计算机科学
PeerJ Computer Science Pub Date : 2025-02-12 eCollection Date: 2025-01-01 DOI: 10.7717/peerj-cs.2683
Lanhao Wang, Hao Wang, Taojie Wei, Wei Dai, Hongyan Wang
{"title":"An online intelligent detection method for slurry density in concept drift data streams based on collaborative computing.","authors":"Lanhao Wang, Hao Wang, Taojie Wei, Wei Dai, Hongyan Wang","doi":"10.7717/peerj-cs.2683","DOIUrl":"10.7717/peerj-cs.2683","url":null,"abstract":"<p><p>In industrial environments, slurry density detection models often suffer from performance degradation due to concept drift. To address this, this article proposes an intelligent detection method tailored for slurry density in concept drift data streams. The method begins by building a model using Gaussian process regression (GPR) combined with regularized stochastic configuration. A sliding window-based online GPR is then applied to update the linear model's parameters, while a forgetting mechanism enables online recursive updates for the nonlinear model. Network pruning and stochastic configuration techniques dynamically adjust the nonlinear model's structure. These approaches enhance the mechanistic model's ability to capture dynamic relationships and reduce the data-driven model's reliance on outdated data. By focusing on recent data to reflect current operating conditions, the method effectively mitigates concept drift in complex process data. Additionally, the method is applied in industrial settings through collaborative computing, ensuring real-time slurry density detection and model adaptability. Experimental results on industrial data show that the proposed method outperforms other algorithms in all density estimation metrics, significantly improving slurry density detection accuracy.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e2683"},"PeriodicalIF":3.5,"publicationDate":"2025-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11888939/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143588260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
U-TSS: a novel time series segmentation model based U-net applied to automatic detection of interference events in geomagnetic field data.
IF 3.5 4区 计算机科学
PeerJ Computer Science Pub Date : 2025-02-11 eCollection Date: 2025-01-01 DOI: 10.7717/peerj-cs.2678
Weifeng Shan, Mengyu Wang, Jinzhu Xia, Jun Chen, Qi Li, Lili Xing, Ruilei Zhang, Maofa Wang, Suqin Zhang, Xiuxia Zhang
{"title":"U-TSS: a novel time series segmentation model based U-net applied to automatic detection of interference events in geomagnetic field data.","authors":"Weifeng Shan, Mengyu Wang, Jinzhu Xia, Jun Chen, Qi Li, Lili Xing, Ruilei Zhang, Maofa Wang, Suqin Zhang, Xiuxia Zhang","doi":"10.7717/peerj-cs.2678","DOIUrl":"10.7717/peerj-cs.2678","url":null,"abstract":"<p><p>With the rapid advancement of Internet of Things (IoT) technology, the volume of sensor data collection has increased significantly. These data are typically presented in the form of time series, gradually becoming a crucial component of big data. Traditional time series analysis methods struggle with complex patterns and long-term dependencies, whereas deep learning technologies offer new solutions. This study introduces the U-TSS, a U-net-based sequence-to-sequence fully convolutional network, specifically designed for one-dimensional time series segmentation tasks. U-TSS maps input sequences of arbitrary length to corresponding sequences of class labels across different temporal scales. This is achieved by implicitly classifying each individual time point in the input time series and then aggregating these classifications over varying intervals to form the final prediction. This enables precise segmentation at each time step, ensuring both global sequence awareness and accurate classification of complex time series data. We applied U-TSS to geomagnetic field observation data for the detection of high-voltage direct current (HVDC) interference events. In experiments, U-TSS achieved superior performance in detecting HVDC interference events, with accuracies of 99.42%, 94.61%, and 95.54% on the training, validation, and test sets, respectively, outperforming state-of-the-art models in accuracy, precision, recall, F1-score, and AUC. Our code can be accessed openly in the GitHub repository at https://github.com/wangmengyu1/U-TSS.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e2678"},"PeriodicalIF":3.5,"publicationDate":"2025-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11888873/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143588208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A user-embedded temporal attention neural network for IoT trajectories prediction.
IF 3.5 4区 计算机科学
PeerJ Computer Science Pub Date : 2025-02-11 eCollection Date: 2025-01-01 DOI: 10.7717/peerj-cs.2681
Dongdong Feng, Siyao Li, Yong Xiang, Jiahuan Zheng
{"title":"A user-embedded temporal attention neural network for IoT trajectories prediction.","authors":"Dongdong Feng, Siyao Li, Yong Xiang, Jiahuan Zheng","doi":"10.7717/peerj-cs.2681","DOIUrl":"10.7717/peerj-cs.2681","url":null,"abstract":"<p><p>Over the past two decades, sequential recommendation systems have garnered significant research interest, driven by their potential applications in personalized product recommendations. In this article, we seek to explicitly model an algorithm based on Internet of Things (IoT) data to predict the next cell reached by the user equipment (UE). This algorithm exploits UE embedding and cell embedding combining the visit time interval information, and uses sliding window sampling to process more UE trajectory data. Furthermore, we use the attention mechanism, removed the query matrix operation and the attention mask, to obtain key information in data and reduce the number of parameters to speed up training. In the prediction layer, combining the positive and negative sampling and computing cross entropy loss also provides assistance to increase the precision and dependability of the entire model. We take the six adjacent cells of the current cell as candidates due to the limitation of the space problem, from which we predict the next destination cell of track movement. Extensive empirical study shows the recall of our algorithm reaches 0.5766, which infers the optimal result and high performance of our model.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e2681"},"PeriodicalIF":3.5,"publicationDate":"2025-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11888941/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143588209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-task snake optimization algorithm for global optimization and planar kinematic arm control problem.
IF 3.5 4区 计算机科学
PeerJ Computer Science Pub Date : 2025-02-11 eCollection Date: 2025-01-01 DOI: 10.7717/peerj-cs.2688
Qingrui Li, Yongquan Zhou, Qifang Luo
{"title":"Multi-task snake optimization algorithm for global optimization and planar kinematic arm control problem.","authors":"Qingrui Li, Yongquan Zhou, Qifang Luo","doi":"10.7717/peerj-cs.2688","DOIUrl":"10.7717/peerj-cs.2688","url":null,"abstract":"<p><p>Multi-task optimization (MTO) algorithms aim to simultaneously solve multiple optimization tasks. Addressing issues such as limited optimization precision and high computational costs in existing MTO algorithms, this article proposes a multi-task snake optimization (MTSO) algorithm. The MTSO algorithm operates in two phases: first, independently handling each optimization problem; second, transferring knowledge. Knowledge transfer is determined by the probability of knowledge transfer and the selection probability of elite individuals. Based on this decision, the algorithm either transfers elite knowledge from other tasks or updates the current task through self-perturbation. Experimental results indicate that, compared to other advanced MTO algorithms, the proposed algorithm achieves the most accurate solutions on multitask benchmark functions, the five-task and 10-task planar kinematic arm control problems, the multitask robot gripper problem, and the multitask car side-impact design problem. The code and data for this article can be obtained from: https://doi.org/10.5281/zenodo.14197420.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e2688"},"PeriodicalIF":3.5,"publicationDate":"2025-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11888922/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143588172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated essay scoring with SBERT embeddings and LSTM-Attention networks.
IF 3.5 4区 计算机科学
PeerJ Computer Science Pub Date : 2025-02-11 eCollection Date: 2025-01-01 DOI: 10.7717/peerj-cs.2634
Yuzhe Nie
{"title":"Automated essay scoring with SBERT embeddings and LSTM-Attention networks.","authors":"Yuzhe Nie","doi":"10.7717/peerj-cs.2634","DOIUrl":"10.7717/peerj-cs.2634","url":null,"abstract":"<p><p>Automated essay scoring (AES) is essential in the field of educational technology, providing rapid and accurate evaluations of student writing. This study presents an innovative AES method that integrates Sentence-BERT (SBERT) with Long Short-Term Memory (LSTM) networks and attention mechanisms to improve the scoring process. SBERT generates embedding vectors for each essay, which are subsequently analyzed using a bidirectional LSTM (BiLSTM) to learn the features of these embedding vectors. An attention layer is introduced to enable the system to prioritize the most significant components of the essay. Evaluated using a benchmark dataset, our approach shows significant improvements in scoring accuracy, highlighting its ability to improve the reliability and efficiency of automated assessment systems.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e2634"},"PeriodicalIF":3.5,"publicationDate":"2025-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11888861/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143588295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud-to-Thing continuum-based sports monitoring system using machine learning and deep learning model.
IF 3.5 4区 计算机科学
PeerJ Computer Science Pub Date : 2025-02-10 eCollection Date: 2025-01-01 DOI: 10.7717/peerj-cs.2539
Amal Alshardan, Hany Mahgoub, Saad Alahmari, Mohammed Alonazi, Radwa Marzouk, Abdullah Mohamed
{"title":"Cloud-to-Thing continuum-based sports monitoring system using machine learning and deep learning model.","authors":"Amal Alshardan, Hany Mahgoub, Saad Alahmari, Mohammed Alonazi, Radwa Marzouk, Abdullah Mohamed","doi":"10.7717/peerj-cs.2539","DOIUrl":"10.7717/peerj-cs.2539","url":null,"abstract":"<p><p>Sports monitoring and analysis have seen significant advancements by integrating cloud computing and continuum paradigms facilitated by machine learning and deep learning techniques. This study presents a novel approach for sports monitoring, specifically focusing on basketball, that seamlessly transitions from traditional cloud-based architectures to a continuum paradigm, enabling real-time analysis and insights into player performance and team dynamics. Leveraging machine learning and deep learning algorithms, our framework offers enhanced capabilities for player tracking, action recognition, and performance evaluation in various sports scenarios. The proposed Cloud-to-Thing continuum-based sports monitoring system utilizes advanced techniques such as Improved Mask R-CNN for pose estimation and a hybrid metaheuristic algorithm combined with a generative adversarial network (GAN) for classification. Our system significantly improves latency and accuracy, reducing latency to 5.1 ms and achieving an accuracy of 94.25%, which outperforms existing methods in the literature. These results highlight the system's ability to provide real-time, precise, and scalable sports monitoring, enabling immediate feedback for time-sensitive applications. This research has significantly improved real-time sports event analysis, contributing to improved player performance evaluation, enhanced team strategies, and informed tactical adjustments.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e2539"},"PeriodicalIF":3.5,"publicationDate":"2025-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11888854/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143588332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting amyloid proteins using attention-based long short-term memory.
IF 3.5 4区 计算机科学
PeerJ Computer Science Pub Date : 2025-02-07 eCollection Date: 2025-01-01 DOI: 10.7717/peerj-cs.2660
Zhuowen Li
{"title":"Predicting amyloid proteins using attention-based long short-term memory.","authors":"Zhuowen Li","doi":"10.7717/peerj-cs.2660","DOIUrl":"10.7717/peerj-cs.2660","url":null,"abstract":"<p><p>Alzheimer's disease (AD) is one of the genetically inherited neurodegenerative disorders that mostly occur when people get old. It can be recognized by severe memory impairment in the late stage, affecting cognitive function and general daily living. Reliable evidence confirms that the enhanced symptoms of AD are linked to the accumulation of amyloid proteins. The dense population of amyloid proteins forms insoluble fibrillar structures, causing significant pathological impacts in various tissues. Understanding amyloid protein's mechanisms and identifying them at an early stage plays an essential role in treating AD as well as prevalent amyloid-related diseases. Recently, although several machine learning methods proposed for amyloid protein identification have shown promising results, most of them have not yet fully exploited the sequence information of the amyloid proteins. In this study, we develop a computational model for <i>in silico</i> identification of amyloid proteins using bidirectional long short-term memory in combination with an attention mechanism. In the testing phase, our findings showed that the model developed by our proposed method outperformed those developed by state-of-the-art methods with an area under the receiver operating characteristic curve of 0.9126.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e2660"},"PeriodicalIF":3.5,"publicationDate":"2025-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11888867/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143586905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RCE-IFE: recursive cluster elimination with intra-cluster feature elimination.
IF 3.5 4区 计算机科学
PeerJ Computer Science Pub Date : 2025-02-07 eCollection Date: 2025-01-01 DOI: 10.7717/peerj-cs.2528
Cihan Kuzudisli, Burcu Bakir-Gungor, Bahjat Qaqish, Malik Yousef
{"title":"RCE-IFE: recursive cluster elimination with intra-cluster feature elimination.","authors":"Cihan Kuzudisli, Burcu Bakir-Gungor, Bahjat Qaqish, Malik Yousef","doi":"10.7717/peerj-cs.2528","DOIUrl":"10.7717/peerj-cs.2528","url":null,"abstract":"<p><p>The computational and interpretational difficulties caused by the ever-increasing dimensionality of biological data generated by new technologies pose a significant challenge. Feature selection (FS) methods aim to reduce the dimension, and feature grouping has emerged as a foundation for FS techniques that seek to detect strong correlations among features and identify irrelevant features. In this work, we propose the Recursive Cluster Elimination with Intra-Cluster Feature Elimination (RCE-IFE) method that utilizes feature grouping and iterates grouping and elimination steps in a supervised context. We assess dimensionality reduction and discriminatory capabilities of RCE-IFE on various high-dimensional datasets from different biological domains. For a set of gene expression, microRNA (miRNA) expression, and methylation datasets, the performance of RCE-IFE is comparatively evaluated with RCE-IFE-SVM (the SVM-adapted version of RCE-IFE) and SVM-RCE. On average, RCE-IFE attains an area under the curve (AUC) of 0.85 among tested expression datasets with the fewest features and the shortest running time, while RCE-IFE-SVM (the SVM-adapted version of RCE-IFE) and SVM-RCE achieve similar AUCs of 0.84 and 0.83, respectively. RCE-IFE and SVM-RCE yield AUCs of 0.79 and 0.68, respectively when averaged over seven different metagenomics datasets, with RCE-IFE significantly reducing feature subsets. Furthermore, RCE-IFE surpasses several state-of-the-art FS methods, such as Minimum Redundancy Maximum Relevance (MRMR), Fast Correlation-Based Filter (FCBF), Information Gain (IG), Conditional Mutual Information Maximization (CMIM), SelectKBest (SKB), and eXtreme Gradient Boosting (XGBoost), obtaining an average AUC of 0.76 on five gene expression datasets. Compared with a similar tool, Multi-stage, RCE-IFE gives a similar average accuracy rate of 89.27% using fewer features on four cancer-related datasets. The comparability of RCE-IFE is also verified with other biological domain knowledge-based Grouping-Scoring-Modeling (G-S-M) tools, including mirGediNET, 3Mint, and miRcorrNet. Additionally, the biological relevance of the selected features by RCE-IFE is evaluated. The proposed method also exhibits high consistency in terms of the selected features across multiple runs. Our experimental findings imply that RCE-IFE provides robust classifier performance and significantly reduces feature size while maintaining feature relevance and consistency.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e2528"},"PeriodicalIF":3.5,"publicationDate":"2025-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11888879/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143587976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gradient pooling distillation network for lightweight single image super-resolution reconstruction. 用于轻量级单图像超分辨率重建的梯度汇集蒸馏网络
IF 3.5 4区 计算机科学
PeerJ Computer Science Pub Date : 2025-02-07 eCollection Date: 2025-01-01 DOI: 10.7717/peerj-cs.2679
Zhiyong Hong, GuanJie Liang, Liping Xiong
{"title":"Gradient pooling distillation network for lightweight single image super-resolution reconstruction.","authors":"Zhiyong Hong, GuanJie Liang, Liping Xiong","doi":"10.7717/peerj-cs.2679","DOIUrl":"10.7717/peerj-cs.2679","url":null,"abstract":"<p><p>The single image super-resolution (SISR) is a classical problem in the field of computer vision, aiming to enhance high-resolution details from low-resolution images. In recent years, significant progress about SISR has been achieved through the utilization of deep learning technology. However, these deep methods often exhibit large-scale networks architectures, which are computationally intensive and hardware-demanding, and this limits their practical application in some scenarios (<i>e.g</i>., autonomous driving, streaming media) requiring stable and efficient image transmission with high-definition picture quality. In such application settings, computing resources are often restricted. Thus, there is a pressing demand to devise efficient super-resolution algorithms. To address this issue, we propose a gradient pooling distillation network (GPDN), which can enable the efficient construction of a single image super-resolution system. In the GPDN we leverage multi-level stacked feature distillation hybrid units to capture multi-scale feature representations, which are subsequently synthesized for dynamic feature space optimization. The central to the GPDN is the Gradient Pooling Distillation module, which operates through hierarchical pooling to decompose and refine critical features across various dimensions. Furthermore, we introduce the Feature Channel Attention module to accurately filter and strengthen pixel features crucial for recovering high-resolution images. Extensive experimental results demonstrate that our proposed method achieves competitive performance while maintaining relatively low resource occupancy of the model. This model strikes for a balance between excellent performance and resource utilization-particularly when trading off high recovery quality with small memory occupancy.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e2679"},"PeriodicalIF":3.5,"publicationDate":"2025-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11888847/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143588116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unveiling personalized and gamification-based cybersecurity risks within financial institutions.
IF 3.5 4区 计算机科学
PeerJ Computer Science Pub Date : 2025-02-07 eCollection Date: 2025-01-01 DOI: 10.7717/peerj-cs.2598
Amna Shahzadi, Kashif Ishaq, Naeem A Nawaz, Fadhilah Rosdi, Fawad Ali Khan
{"title":"Unveiling personalized and gamification-based cybersecurity risks within financial institutions.","authors":"Amna Shahzadi, Kashif Ishaq, Naeem A Nawaz, Fadhilah Rosdi, Fawad Ali Khan","doi":"10.7717/peerj-cs.2598","DOIUrl":"10.7717/peerj-cs.2598","url":null,"abstract":"<p><p>Gamification has emerged as a transformative e-business strategy, introducing innovative methods to engage customers and drive sales. This article explores the integration of game design principles into business contexts, termed \"gamification,\" a subject of increasing interest among both scholars and industry professionals. The discussion systematically addresses key themes, like the role of gamification in marketing strategies, enhancing website functionality, and its application within the financial sector, including e-banking, drawing insights from academic and industry perspectives. By conducting a systematic literature review of 48 academic articles published between 2015 and 2024, this study examines the use of personalized, gamification-based strategies to mitigate cyber threats in the financial domain. The review highlights the growing digitization of financial services and the corresponding rise in sophisticated cyber threats, including traditional attacks and advanced persistent threats (APTs). This article critically assesses the evolving landscape of cyber threats specific to the financial industry, identifying trends, challenges, and innovative solutions to strengthen cybersecurity practices. Of particular interest is the application of AI-enhanced gamification strategies to reinforce cybersecurity protocols, particularly in the face of novel threats in gaming platforms. Furthermore, the review evaluates techniques grounded in user behavior, motivation, and readiness to enhance cybersecurity. The article also offers a comprehensive taxonomy of financial services, categorizing cyber threats into game-based (<i>e.g</i>., phishing, malware, APTs) and non-game-based (<i>e.g</i>., social engineering, compliance issues) threats. AI-driven measures for prevention and detection emphasize regular security assessments, user training, and system monitoring with incident response plans. This research provides valuable insights into the intersection of gamification and cybersecurity, offering a forward-looking perspective for both academic researchers and industry professionals.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e2598"},"PeriodicalIF":3.5,"publicationDate":"2025-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11888878/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143588206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信