A blockchain based approach for the definition of auditable access control systems

DDF Maesa, P Mori, L Ricci - Computers & Security, 2019 - Elsevier
This work proposes to exploit blockchain technology to define Access Control systems that
guarantee the auditability of access control policies evaluation. The key idea of our proposal …

A survey of cyber security trends, emerging technologies and threats

AB Pandey, A Tripathi, PC Vashist - Cyber Security in Intelligent …, 2022 - Springer
Data are on Internet-connected devices and the number of these devices is increasing
exponentially, the challenges are also mushrooming for the cyber security experts in …

Measuring privacy leaks in online social networks

A Srivastava, G Geethakumari - 2013 International Conference …, 2013 - ieeexplore.ieee.org
Online Social Networking has gained huge popularity amongst the masses. It is common for
the users of Online Social Networks (OSNs) to share information with digital friends but in …

Online social network security: a comparative review using machine learning and deep learning

C Kumar, TS Bharati, S Prakash - Neural Processing Letters, 2021 - Springer
In the present era, Online Social Networking has become an important phenomenon in
human society. However, a large section of users are not aware of the security and privacy …

Network analysis of erc20 tokens trading on ethereum blockchain

S Somin, G Gordon, Y Altshuler - Unifying Themes in Complex Systems IX …, 2018 - Springer
Issuance of cryptocurrencies on top of the Blockchain system by startups and private sector
companies is becoming a ubiquitous phenomenon, inducing the trading of these crypto …

Deanonymizing Tor hidden service users through Bitcoin transactions analysis

H Al Jawaheri, M Al Sabah, Y Boshmaf, A Erbad - Computers & Security, 2020 - Elsevier
With the rapid increase of threats on the Internet, people are continuously seeking privacy
and anonymity. Services such as Bitcoin and Tor were introduced to provide anonymity for …

Ethical dilemmas using social media in qualitative social research: A case study of online participant observation

K Hennell, M Limmer… - Sociological research …, 2020 - journals.sagepub.com
Social media platforms that enable users to create and share online content with others are
used increasingly in social research. This article explores the complex ethical issues …

Selfholding: A combined attack model using selfish mining with block withholding attack

X Dong, F Wu, A Faree, D Guo, Y Shen, J Ma - Computers & Security, 2019 - Elsevier
Bitcoin is one of the most influential digital cryptocurrencies in the world, of which the
security is under serious threat. One of the most serious security problems is facing several …

Z-channel: Scalable and efficient scheme in zerocash

Y Zhang, Y Long, Z Liu, Z Liu, D Gu - Computers & Security, 2019 - Elsevier
Decentralized ledger-based cryptocurrencies like Bitcoin present a way to construct
payment systems without trusted banks. However, the anonymity of Bitcoin is fragile. Many …

Towards link inference attack against network structure perturbation

X Xian, T Wu, Y Liu, W Wang, C Wang, G Xu… - Knowledge-Based …, 2021 - Elsevier
The increasing popularity and diversity of social media sites have resulted in an emergent
number of available social networks. These social networks are now the source of …