A survey of state-of-the-art on blockchains: Theories, modelings, and tools
To draw a roadmap of current research activities of the blockchain community, we first
conduct a brief overview of state-of-the-art blockchain surveys published in the past 5 years …
conduct a brief overview of state-of-the-art blockchain surveys published in the past 5 years …
SoK: cryptojacking malware
Emerging blockchain and cryptocurrency-based technologies are redefining the way we
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …
[HTML][HTML] Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection
G Xu, W Dong, J Xing, W Lei, J Liu, L Gong… - Digital Communications …, 2023 - Elsevier
Cryptojacking is a type of resource embezzlement attack, wherein an attacker secretly
executes the cryptocurrency mining program in the target host to gain profits. It has been …
executes the cryptocurrency mining program in the target host to gain profits. It has been …
Cryptocurrencies emerging threats and defensive mechanisms: A systematic literature review
E Badawi, GV Jourdan - IEEE Access, 2020 - ieeexplore.ieee.org
Cryptocurrencies have been a target for cybercriminal activities because of the pseudo-
anonymity and privacy they offer. Researchers have been actively working on analyzing and …
anonymity and privacy they offer. Researchers have been actively working on analyzing and …
[HTML][HTML] Cryptomining makes noise: Detecting cryptojacking via machine learning
Cryptojacking occurs when an adversary illicitly runs crypto-mining software over the
devices of unaware users. This novel cybersecurity attack, that is emerging in both the …
devices of unaware users. This novel cybersecurity attack, that is emerging in both the …
Invisible poison: A blackbox clean label backdoor attack to deep neural networks
This paper reports a new clean-label data poisoning backdoor attack, named Invisible
Poison, which stealthily and aggressively plants a backdoor in neural networks. It converts a …
Poison, which stealthily and aggressively plants a backdoor in neural networks. It converts a …
FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification
B Zou, C Cao, L Wang, S Fu, T Qiao, J Sun - Computers & Security, 2024 - Elsevier
The struggle between security researchers and malware perpetuates an endless arms race.
Recent studies indicate that converting malware into grayscale images and using …
Recent studies indicate that converting malware into grayscale images and using …
[HTML][HTML] Kernel-level tracing for detecting stegomalware and covert channels in Linux environments
Modern malware is becoming hard to spot since attackers are increasingly adopting new
techniques to elude signature-and rule-based detection mechanisms. Among the others …
techniques to elude signature-and rule-based detection mechanisms. Among the others …
Scams and solutions in cryptocurrencies—A survey analyzing existing machine learning models
LP Krishnan, I Vakilinia, S Reddivari, S Ahuja - Information, 2023 - mdpi.com
With the emergence of cryptocurrencies and Blockchain technology, the financial sector is
turning its gaze toward this latest wave. The use of cryptocurrencies is becoming very …
turning its gaze toward this latest wave. The use of cryptocurrencies is becoming very …
Statistical perspectives on reliability of artificial intelligence systems
Artificial intelligence (AI) systems are increasingly popular in many applications.
Nevertheless, AI technologies are still developing, and many issues need to be addressed …
Nevertheless, AI technologies are still developing, and many issues need to be addressed …