Frontiers in Emerging Multidisciplinary Sciences

Open Access Peer Review International
Open Access

Elevating Asset Protection with the Application of Cognitive Computing for Identifying Suspicious Behavior in Electronic Payment Infrastructures

4 University of Brussels, Belgium

Abstract

The rapid evolution of electronic payment infrastructures has significantly enhanced financial transaction efficiency, but it has simultaneously introduced complex security vulnerabilities. Traditional rule-based security systems are increasingly insufficient to detect sophisticated fraudulent behaviors, which are adaptive, distributed, and often embedded within legitimate transaction flows. This research explores the application of cognitive computing frameworks to elevate asset protection mechanisms by enabling intelligent, context-aware detection of suspicious behavior in electronic payment environments.

The study integrates advancements in machine learning, cognitive systems, and intelligent infrastructure monitoring to propose a conceptual model for adaptive fraud detection and asset protection. Drawing upon developments in microprocessor evolution (Nikolic et al., 2022), communication protocols such as IEC 61850 (IEC, 2013), and centralized protection architectures (IEEE PES, 2016), the paper establishes a multidisciplinary foundation for intelligent security systems.

Furthermore, the research synthesizes methodologies from predictive analytics and anomaly detection systems used in financial cybersecurity contexts, including insights from machine learning-based fraud detection frameworks (Enhancing Financial Security through the Integration of Machine Learning Models for Effective Fraud Detection in Transaction Systems, 2025). This integration demonstrates how cognitive computing can dynamically learn behavioral patterns, adapt to evolving threats, and enhance decision-making accuracy in real time.

The findings highlight that cognitive computing significantly improves detection sensitivity, reduces false positives, and strengthens resilience against zero-day fraud attacks. However, challenges such as computational overhead, data privacy constraints, and system interoperability remain critical limitations.

This paper contributes to the field by presenting a structured cognitive architecture for electronic payment security, bridging industrial control system protection principles with financial cybersecurity frameworks. It concludes that cognitive computing represents a transformative paradigm shift in asset protection strategies, enabling proactive rather than reactive defense mechanisms in digital financial ecosystems.

How to Cite

Dr. Pierre Laurent. (2026). Elevating Asset Protection with the Application of Cognitive Computing for Identifying Suspicious Behavior in Electronic Payment Infrastructures. Frontiers in Emerging Multidisciplinary Sciences, 3(02), 60–66. Retrieved from https://irjernet.com/index.php/fems/article/view/376

References

📄 Abdelkader Abdelmoumene, Hamid Bentarzi, “A review on protective relays' development and trends ”, Signals and Systems Laboratory, IGEE, Bourmerdes University, Algeria - Journal of Energy in Southern Africa, Vol 25 No 2, May 2014.
📄 D. B. Durocher and D. Loucks, “Infrared windows applied in switchgear assemblies: Taking another look,” IEEE Trans. Ind. Appl., vol. 51, no. 6, pp. 4868–4873, Nov./Dec. 2015.
📄 Edgar Perez Flores and Joemoan Xavier, “Centralized Ptotection and Control- Enhancing reliability, availability and improving operating cost efficiency of Distribution Substations ”. [Abstract]. Available: CentralizedProtection_and_Control_paper.pdf ( tamu.edu ) [Accessed Dec 22, 2023 ].
📄 Enhancing Financial Security through the Integration of Machine Learning Models for Effective Fraud Detection in Transaction Systems. (2025). Architecture Image Studies, 6(3), 531-555. https://doi.org/10.62754/ais.v6i3.248
📄 Goran Nikolic, Bojan Dimitrijevic, Tatjana Nikolic, Mile Stojcev “Fifty Years Of Microprocessor Evolution: From Single CPU TO Multicore And Manycore Systems ” Series: Electronics and Energetics Vol. 35, No 2, June 2022.
📄 IEEE Guide for Testing Metal-Enclosed Switchgear Rated Up to 38 kV for Internal Arcing Faults, ANSI/IEEE Standard C37.20.7, 2017.
📄 IEEE PES Power System Relaying and Control Committee, “Centralized Substation Protection and Control ”, 2016. Available: http://www.ieee-pes.org. [Accessed: Nov 23, 2022 ].
📄 IEEE Recommended Practice for the Selection, Field Testing, and Life Expectancy of Molded Case Circuit Breakers for Industrial Applications, IEEE Standard 1458, 2005.
📄 International Electrotechnical Commission (IEC), Communication Protocols for Intelligent Electronic Devices, IEC 61850, 2013.
📄 Malaysia's Energy Commission Act 1194, Regulation 110 ( 4 ).
📄 National Electrical Testing Association Standard for Maintenance Testing, ANSI/NETA MTS-2019.
📄 NFPA Standard 70B, Recommended Practice for Electrical Equipment Maintenance, 2019.
📄 NFPA Standard 70E, Standard for Electrical Safety in the Workplace, 2021.
📄 R. Kennedy, “Are you building in obsolescence to mission critical infrastructure? ” PCIC Energy Middle East, Abu Dhabi, UAE, Paper No. ME18_11, 2018.
📄 S. DeGrate, J. Payne, and R. Belak, “Thermal imaging: Just a note, not the whole tune,” presented at the IEEE/IAS-PCIC Conf., Chicago, IL, USA, 2013.
📄 Salmey A Halim, M Khairil M Hatta, Huswan Hadi W Hussien, Fitriah Shafe'i, Nur Azra Bt Azmi, Faizah Bt Othman, M Ridhwan B Ahmad Fuad. Conference, Topic: “Centralized Protection and Control: Alternative Digital Application for Advanced Relay Protection System - A Proven Case Study ” IEEE ICPEA Conference, March 2024.
📄 T. Holliday and J. A. Kay, “Understanding infrared windows and their effects on infrared readings,” in Proc. IEEE Conf. Rec. Annu. Pulp Paper Ind. Tech. Conf. (PPIC), 2013, pp. 26–33.