Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
bitcoin security
biblio
DDoS Attack Detection on Bitcoin Ecosystem using Deep-Learning
Submitted by grigby1 on Fri, 09/04/2020 - 3:59pm
bitcoin security
service-level DDoS attacks
network-level data
detection
Deep-learning
DDoS attack detection
DDoS
bitcoin network-level
Bitcoin ecosystem
computer network security
financial data processing
bitcoin
cryptocurrency market
cryptocurrencies
Human behavior
pubcrawl
blockchain technology
Scalability
biblio
Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic
Submitted by grigby1 on Fri, 09/04/2020 - 3:59pm
bitcoin
temporal spatio-temporal
spatial spatio-temporal
peer-to-peer transactions
partitioning
network dynamics
network distribution
logical partitioning attacks
decentralized network architecture
Bitcoin network
attack scenarios
bitcoin security
security of data
Distributed databases
Software
Human behavior
pubcrawl
Peer-to-peer computing
Organizations
blockchain
internet
Scalability
IP networks
biblio
The Cryptocurrency Simulation using Elliptic Curve Cryptography Algorithm in Mining Process from Normal, Failed, and Fake Bitcoin Transactions
Submitted by grigby1 on Fri, 09/04/2020 - 3:59pm
ECC algorithm
transaction process
total processing time
time 6.0 s
time 152.0 s
securing transactions
scenario
RSA processing time
RSA algorithm
normal bitcoin transactions
mining process
high-level security
fake bitcoin transactions
Elliptic Curve Cryptography algorithm
Elliptic curve cryptography (ECC)
efficient processing time
Scalability
cryptography algorithms
cryptocurrency transaction
cryptocurrency simulation
Cryptocurrency security
appropriate algorithm
transaction processing
bitcoin security
bitcoin
cryptocurrency
security level
Human behavior
pubcrawl
public key cryptography
digital signatures
Cryptography
biblio
TendrilStaller: Block Delay Attack in Bitcoin
Submitted by grigby1 on Fri, 09/04/2020 - 3:59pm
Distributed databases
TendrilStaller
peer-to-peer network
eclipse attack
countermeasure
blockchain state
block propagation protocol
block propagation
block delay attack
Bitcoin protocol
Bitcoin peer-to-peer network
bitcoin security
bitcoin
IP networks
Security analysis
cryptocurrencies
Human behavior
pubcrawl
Peer-to-peer computing
Cryptographic Protocols
Bandwidth
blockchain
Scalability
delays
Protocols
biblio
Nash Equilibrium of Multiple, Non-Uniform Bitcoin Block Withholding Attackers
Submitted by grigby1 on Fri, 09/04/2020 - 3:59pm
bitcoin security
seemingly malicious behavior
nonuniform Bitcoin mining pools
nonuniform Bitcoin block withholding attackers
Nash equilibrium conditions
Nash Equilibrium
Miner's Dilemma
MATLAB
mathematical analysis
in-depth profit analysis
cryptocurrency miners
BWH attack
blockchain distributed databases
Bitcoin-like systems
Scalability
profitability
bitcoin
cryptocurrency
Distributed databases
game theory
Peer-to-peer computing
cryptocurrencies
Data mining
Human behavior
pubcrawl
Hardware
blockchain
biblio
Front-End IoT Application for the Bitcoin based on Proof of Elapsed Time (PoET)
Submitted by grigby1 on Fri, 09/04/2020 - 3:58pm
key location
complete block
constructive exchanges
elapsed time
front-end applications
front-end IoT application
front-end Web applications
Internet applications
IoT
block-dependent IoT applications
mandatory IoT gadget
neighborhood gadget
PoET
possible designs
registry agreements
remote Bitcoin customers
remote blockchain client
remote server
financial data processing
data privacy
Scalability
internet
blockchain
pubcrawl
Human behavior
cryptocurrencies
bitcoin
Internet of Things
bitcoin security
active exchanges
BC IoT
Bitcoin block chain customer
Bitcoin distributor
Bitcoin store
block block
biblio
Identification of Darknet Markets’ Bitcoin Addresses by Voting Per-address Classification Results
Submitted by grigby1 on Fri, 09/04/2020 - 3:58pm
bitcoin security
Weapons
voting per-address classification
security forensics aspect
Measurement
law enforcement
illegal products
forensic
DNM
decentralized digital currency
darknet markets
common ledger
classification
Bitcoin transactions
data privacy
financial data processing
bitcoin
drugs
Distributed databases
Roads
cryptocurrencies
blockchain
Human behavior
pubcrawl
machine learning
feature extraction
Scalability
biblio
Forensic Analysis of Bitcoin Transactions
Submitted by grigby1 on Fri, 09/04/2020 - 3:58pm
bitcoin security
transaction processing
transaction patterns
suspicious bitcoin addresses
Petri nets
forensic investigation
forensic analysis
Firing
FABT
Bitcoin transactions
bitcoin transaction net
bitcoin transaction data
data privacy
financial data processing
bitcoin
pattern matching
visualization
cryptocurrencies
Data mining
Human behavior
pubcrawl
computer science
Forensics
Scalability
biblio
Targeted Addresses Identification for Bitcoin with Network Representation Learning
Submitted by grigby1 on Fri, 09/04/2020 - 3:58pm
Human behavior
transaction addresses
transaction address
security risk
security of data
Scalability
pubcrawl
pattern classification
network representation learning
learning (artificial intelligence)
imbalanced multi-classification
illegal transactions
addresses identification algorithms
feature extraction
fault tolerance
drugs
Decision trees
de-anonymity approach
Data mining
cryptocurrencies
bitcoin security
bitcoin
annotated data
biblio
Bitcoin Security Reference Model: An Implementation Platform
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
digital wallet
security services
security risk minimization
security functional architecture
Scalability
Resiliency
pubcrawl
peer to peer security
P2P transaction
Metrics
IP protocol
IP networks
Human Factors
application protocol
digital money
decentralized payment system
Cybersecurity
Cryptographic Protocols
cryptocurrency
cryptocurrencies
Bitcoin security reference model
Bitcoin security features
bitcoin security
Bitcoin cyberattacks
bitcoin
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »