A survey on security challenges and solutions in the IOTA

M Conti, G Kumar, P Nerurkar, R Saha… - Journal of Network and …, 2022 - Elsevier
Wide-scale adoption of the Internet of Everything requires decentralized security,
responsibility, and trust among the stakeholders. All these can be achieved by a Distributed …

Bitcoin concepts, threats, and machine-learning security solutions

M Rahouti, K Xiong, N Ghani - Ieee Access, 2018 - ieeexplore.ieee.org
The concept of Bitcoin was first introduced by an unknown individual (or a group of people)
named Satoshi Nakamoto before it was released as open-source software in 2009. Bitcoin is …

Machine learning adoption in blockchain-based smart applications: The challenges, and a way forward

S Tanwar, Q Bhatia, P Patel, A Kumari, PK Singh… - IEEE …, 2019 - ieeexplore.ieee.org
In recent years, the emergence of blockchain technology (BT) has become a unique, most
disruptive, and trending technology. The decentralized database in BT emphasizes data …

Tracking ransomware end-to-end

DY Huang, MM Aliapoulios, VG Li… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Ransomware is a type of malware that encrypts the files of infected hosts and demands
payment, often in a crypto-currency like Bitcoin. In this paper, we create a measurement …

When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies

S Goldfeder, H Kalodner, D Reisman… - arXiv preprint arXiv …, 2017 - arxiv.org
We show how third-party web trackers can deanonymize users of cryptocurrencies. We
present two distinct but complementary attacks. On most shopping websites, third party …

Knowledge discovery in cryptocurrency transactions: A survey

XF Liu, XJ Jiang, SH Liu, CK Tse - Ieee access, 2021 - ieeexplore.ieee.org
Cryptocurrencies gain trust in users by publicly disclosing the full creation and transaction
history. In return, the transaction history faithfully records the whole spectrum of …

Ethics of blockchain: A framework of technology, applications, impacts, and research directions

Y Tang, J Xiong, R Becerril-Arreola… - Information Technology & …, 2020 - emerald.com
Purpose The purpose of this paper is fourfold: first, to provide the first systematic study on the
ethics of blockchain, mapping its main socio-technical challenges in technology and …

Enhancing digital advertising with blockchain technology

V Stallone, M Wetzels, D Mahr… - Journal of Interactive …, 2024 - journals.sagepub.com
The increasing popularity of blockchain technology (BCT) has spurred interest in its potential
to rejuvenate the digital advertising ecosystem. Due to its transparency, decentralization …

Secure smart contracts for cloud‐based manufacturing using Ethereum blockchain

A Kumar, K Abhishek, P Nerurkar… - Transactions on …, 2022 - Wiley Online Library
Past international trade practices have been associated with opaque information flows that
have hindered traceability and created hurdles in hassle‐free trade. Blockchain and allied …

The tools and tactics used in intimate partner surveillance: An analysis of online infidelity forums

E Tseng, R Bellini, N McDonald, M Danos… - 29th USENIX security …, 2020 - usenix.org
Abusers increasingly use spyware apps, account compromise, and social engineering to
surveil their intimate partners, causing substantial harms that can culminate in violence. This …