Blockchain-based synergistic solution to current cybersecurity frameworks

[1]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[2]  Shuai Liu,et al.  Extended Kalman filtering for stochastic nonlinear systems with randomly occurring cyber attacks , 2016, Neurocomputing.

[3]  Soohyung Kim,et al.  Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[4]  Manju Khari,et al.  Role of Cyber Security in Today's Scenario , 2017 .

[5]  Bruno Sinopoli,et al.  A set-theoretic approach for secure and resilient control of Cyber-Physical Systems subject to false data injection attacks , 2016, 2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS).

[6]  R. Sridaran,et al.  Cloud Security Issues and Challenges , 2018 .

[7]  Kung Chen,et al.  Blockchain and the Internet of Things: A Software Architecture Perspective , 2019 .

[8]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[9]  Anthony Skjellum,et al.  A brief survey of Cryptocurrency systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[10]  Dongil Shin,et al.  Scenario-based cyber attack·defense education system on virtual machines integrated by web technologies for protection of multimedia contents in a network , 2020, Multimedia Tools and Applications.

[11]  Gulshan Shrivastava,et al.  Blockchain technology: A DNN token‐based approach in healthcare and COVID‐19 to generate extracted data , 2021, Expert Syst. J. Knowl. Eng..

[12]  Xiangjian He,et al.  Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[13]  Moritz Petersen,et al.  Blockchain in logistics and supply chain : trick or treat? , 2017 .

[14]  Irem Demirkan,et al.  Blockchain technology in the future of business cyber security and accounting , 2020 .

[15]  Zhetao Li,et al.  Consortium Blockchain for Secure Energy Trading in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[16]  Jong Hyuk Park,et al.  Blockchain based hybrid network architecture for the smart city , 2018, Future Gener. Comput. Syst..

[17]  Fan Zhang,et al.  Town Crier: An Authenticated Data Feed for Smart Contracts , 2016, CCS.

[18]  Jong Hyuk Park,et al.  Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City , 2017, J. Inf. Process. Syst..

[19]  Morteza Amini,et al.  RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks , 2006, Comput. Secur..

[20]  Isao Ono,et al.  Detection of Cyber Attacks Against Voltage Control in Distribution Power Grids With PVs , 2016, IEEE Transactions on Smart Grid.

[21]  Sajal K. Das,et al.  Blockchain for the Internet of Things: Present and Future , 2019, ArXiv.

[22]  Pramod K. Srivastava,et al.  Defensive Modeling of Fake News Through Online Social Networks , 2020, IEEE Transactions on Computational Social Systems.

[23]  Liming Zhu,et al.  Blockchain Based Data Integrity Service Framework for IoT Data , 2017, 2017 IEEE International Conference on Web Services (ICWS).

[24]  Gareth W. Peters,et al.  Understanding Modern Banking Ledgers Through Blockchain Technologies: Future of Transaction Processing and Smart Contracts on the Internet of Money , 2015, ArXiv.

[25]  Parinaz Naghizadeh Ardabili,et al.  Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents , 2015, USENIX Security Symposium.

[26]  Stefanos Gritzalis,et al.  Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities , 2018, IEEE Transactions on Industrial Informatics.

[27]  Andrew Lippman,et al.  MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).

[28]  Mei Li,et al.  Blockchain-based reward point exchange systems , 2020, Multimedia Tools and Applications.

[29]  Toshiyuki Sawa Blockchain technology outline and its application to field of power and energy system , 2019 .

[30]  Arushi Arora,et al.  Block Chain Based Security Mechanism for Internet of Vehicles (IoV) , 2018 .

[31]  Arushi Arora,et al.  BATMAN: Blockchain-Based Aircraft Transmission Mobile Ad Hoc Network , 2018, Proceedings of 2nd International Conference on Communication, Computing and Networking.

[32]  Sachin Shetty,et al.  ProvChain: A Blockchain-Based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).

[33]  G. Manimaran,et al.  Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[34]  Mehedi Hassan,et al.  BlockChain for IoT Security and Management: Current Prospects, Challenges and Future Directions , 2018, 2018 5th International Conference on Networking, Systems and Security (NSysS).

[35]  Lei Zhang,et al.  Blockchain based secure data sharing system for Internet of vehicles: A position paper , 2019, Veh. Commun..

[36]  Chenquan Gan,et al.  Blockchain-based access control scheme with incentive mechanism for eHealth systems: patient as supervisor , 2020, Multimedia Tools and Applications.

[37]  Feng Tian,et al.  An agri-food supply chain traceability system for China based on RFID & blockchain technology , 2016, 2016 13th International Conference on Service Systems and Service Management (ICSSSM).

[38]  Erhan Guven,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.

[39]  Kyung Kyu Kim,et al.  Modified cyber kill chain model for multimedia service environments , 2018, Multimedia Tools and Applications.

[40]  Rasool Jalili,et al.  Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks , 2005, ISPEC.

[41]  Darcy W. E. Allen,et al.  Blockchains and the Boundaries of Self-Organized Economies: Predictions for the Future of Banking , 2016 .

[42]  Adi Shamir,et al.  Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.

[43]  Lei Wu,et al.  A Risk-Based Optimization Model for Electric Vehicle Infrastructure Response to Cyber Attacks , 2018, IEEE Transactions on Smart Grid.

[44]  Daniel W. C. Ho,et al.  Observer-Based Event-Triggering Consensus Control for Multiagent Systems With Lossy Sensors and Cyber-Attacks , 2017, IEEE Transactions on Cybernetics.

[45]  Arushi Arora,et al.  Denial-of-Service (DoS) Attack and Botnet: Network Analysis, Research Tactics, and Mitigation , 2018 .

[46]  Xavier Boyen,et al.  A Survey of Anonymity of Cryptocurrencies , 2019, ACSW.

[47]  Anand Nayyar,et al.  RETRACTED ARTICLE: A remix IDE: smart contract-based framework for the healthcare sector by using Blockchain technology , 2020, Multimedia Tools and Applications.

[48]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.