Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Ankit Gangwal"'
Publikováno v:
IEEE Access, Vol 12, Pp 28225-28234 (2024)
While user authentication happens before initiating or resuming a login session, de-authentication detects the absence of a previously-authenticated user to revoke her currently active login session. The absence of proper de-authentication can lead t
Externí odkaz:
https://doaj.org/article/675eea7096c14ee9a81ab6268a2e181f
Publikováno v:
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy.
After the success of the Bitcoin blockchain, came several cryptocurrencies and blockchain solutions in the last decade. Nonetheless, Blockchain-based systems still suffer from low transaction rates and high transaction processing latencies, which hin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::52230ca9fa664e592fc63e8868e7fafc
http://arxiv.org/abs/2204.08032
http://arxiv.org/abs/2204.08032
Publikováno v:
IEEE Communications Surveys & Tutorials
In recent years, the current Internet has experienced an unexpected paradigm shift in the usage model, which has pushed researchers towards the design of the Information-Centric Networking (ICN) paradigm as a possible replacement of the existing arch
Publikováno v:
Cryptology and Network Security ISBN: 9783031209734
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0740e58b07d566baba5c8cb1c4534b8d
https://doi.org/10.1007/978-3-031-20974-1_17
https://doi.org/10.1007/978-3-031-20974-1_17
Publikováno v:
Computer Security – ESORICS 2022 ISBN: 9783031171390
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f096ccce8dee6f18d06716ad30cf141e
https://doi.org/10.1007/978-3-031-17140-6_34
https://doi.org/10.1007/978-3-031-17140-6_34
Publikováno v:
eCrime
The Bitcoin block-chain is the scoreboard of Ransomware. By mining the data in it and within the malware itself, we can understand the distribution of ransoms and characterise ransomware risk. Ransoms follow the power-law distribution in their amount
Publikováno v:
Cryptology and Network Security ISBN: 9783030654108
CANS
CANS
Cybercriminals have been exploiting cryptocurrencies to commit various unique financial frauds. Covert cryptomining - which is defined as an unauthorized harnessing of victims’ computational resources to mine cryptocurrencies - is one of the preval
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::97ccd637acf9a2bc8aac8f93b7862750
http://hdl.handle.net/11577/3369046
http://hdl.handle.net/11577/3369046
Publikováno v:
IEEE Symposium on Security and Privacy
Learning useful representations from unstructured data is one of the core challenges, as well as a driving force, of modern data-driven approaches. Deep learning has demonstrated the broad advantages of learning and harnessing such representations. I
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c8a4e6dcac0a60711ad02829ba3104df
http://arxiv.org/abs/1910.04232
http://arxiv.org/abs/1910.04232
Publikováno v:
SAC
With the surge in popularity of cryptocurrencies, Bitcoin has emerged as one of the most promising means for remittance, payments, and trading. Supplemented by the convenience offered by the smartphones, an increasing number of users are adopting Bit
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9520e595c33545ae84b6374bf1d1fbab
http://hdl.handle.net/11577/3311074
http://hdl.handle.net/11577/3311074