Blockchain-based synergistic solution to current cybersecurity frameworks
暂无分享,去创建一个
Arushi Arora | Sumit Kumar Yadav | Kavita Sharma | Chanchal Kumar | S. Yadav | Arushi Arora | Kavita Sharma | C. Kumar
[1] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[2] Shuai Liu,et al. Extended Kalman filtering for stochastic nonlinear systems with randomly occurring cyber attacks , 2016, Neurocomputing.
[3] Soohyung Kim,et al. Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).
[4] Manju Khari,et al. Role of Cyber Security in Today's Scenario , 2017 .
[5] Bruno Sinopoli,et al. A set-theoretic approach for secure and resilient control of Cyber-Physical Systems subject to false data injection attacks , 2016, 2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS).
[6] R. Sridaran,et al. Cloud Security Issues and Challenges , 2018 .
[7] Kung Chen,et al. Blockchain and the Internet of Things: A Software Architecture Perspective , 2019 .
[8] Praveen Gauravaram,et al. Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[9] Anthony Skjellum,et al. A brief survey of Cryptocurrency systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[10] Dongil Shin,et al. Scenario-based cyber attack·defense education system on virtual machines integrated by web technologies for protection of multimedia contents in a network , 2020, Multimedia Tools and Applications.
[11] Gulshan Shrivastava,et al. Blockchain technology: A DNN token‐based approach in healthcare and COVID‐19 to generate extracted data , 2021, Expert Syst. J. Knowl. Eng..
[12] Xiangjian He,et al. Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[13] Moritz Petersen,et al. Blockchain in logistics and supply chain : trick or treat? , 2017 .
[14] Irem Demirkan,et al. Blockchain technology in the future of business cyber security and accounting , 2020 .
[15] Zhetao Li,et al. Consortium Blockchain for Secure Energy Trading in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[16] Jong Hyuk Park,et al. Blockchain based hybrid network architecture for the smart city , 2018, Future Gener. Comput. Syst..
[17] Fan Zhang,et al. Town Crier: An Authenticated Data Feed for Smart Contracts , 2016, CCS.
[18] Jong Hyuk Park,et al. Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City , 2017, J. Inf. Process. Syst..
[19] Morteza Amini,et al. RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks , 2006, Comput. Secur..
[20] Isao Ono,et al. Detection of Cyber Attacks Against Voltage Control in Distribution Power Grids With PVs , 2016, IEEE Transactions on Smart Grid.
[21] Sajal K. Das,et al. Blockchain for the Internet of Things: Present and Future , 2019, ArXiv.
[22] Pramod K. Srivastava,et al. Defensive Modeling of Fake News Through Online Social Networks , 2020, IEEE Transactions on Computational Social Systems.
[23] Liming Zhu,et al. Blockchain Based Data Integrity Service Framework for IoT Data , 2017, 2017 IEEE International Conference on Web Services (ICWS).
[24] Gareth W. Peters,et al. Understanding Modern Banking Ledgers Through Blockchain Technologies: Future of Transaction Processing and Smart Contracts on the Internet of Money , 2015, ArXiv.
[25] Parinaz Naghizadeh Ardabili,et al. Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents , 2015, USENIX Security Symposium.
[26] Stefanos Gritzalis,et al. Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities , 2018, IEEE Transactions on Industrial Informatics.
[27] Andrew Lippman,et al. MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).
[28] Mei Li,et al. Blockchain-based reward point exchange systems , 2020, Multimedia Tools and Applications.
[29] Toshiyuki Sawa. Blockchain technology outline and its application to field of power and energy system , 2019 .
[30] Arushi Arora,et al. Block Chain Based Security Mechanism for Internet of Vehicles (IoV) , 2018 .
[31] Arushi Arora,et al. BATMAN: Blockchain-Based Aircraft Transmission Mobile Ad Hoc Network , 2018, Proceedings of 2nd International Conference on Communication, Computing and Networking.
[32] Sachin Shetty,et al. ProvChain: A Blockchain-Based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).
[33] G. Manimaran,et al. Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[34] Mehedi Hassan,et al. BlockChain for IoT Security and Management: Current Prospects, Challenges and Future Directions , 2018, 2018 5th International Conference on Networking, Systems and Security (NSysS).
[35] Lei Zhang,et al. Blockchain based secure data sharing system for Internet of vehicles: A position paper , 2019, Veh. Commun..
[36] Chenquan Gan,et al. Blockchain-based access control scheme with incentive mechanism for eHealth systems: patient as supervisor , 2020, Multimedia Tools and Applications.
[37] Feng Tian,et al. An agri-food supply chain traceability system for China based on RFID & blockchain technology , 2016, 2016 13th International Conference on Service Systems and Service Management (ICSSSM).
[38] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[39] Kyung Kyu Kim,et al. Modified cyber kill chain model for multimedia service environments , 2018, Multimedia Tools and Applications.
[40] Rasool Jalili,et al. Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks , 2005, ISPEC.
[41] Darcy W. E. Allen,et al. Blockchains and the Boundaries of Self-Organized Economies: Predictions for the Future of Banking , 2016 .
[42] Adi Shamir,et al. Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.
[43] Lei Wu,et al. A Risk-Based Optimization Model for Electric Vehicle Infrastructure Response to Cyber Attacks , 2018, IEEE Transactions on Smart Grid.
[44] Daniel W. C. Ho,et al. Observer-Based Event-Triggering Consensus Control for Multiagent Systems With Lossy Sensors and Cyber-Attacks , 2017, IEEE Transactions on Cybernetics.
[45] Arushi Arora,et al. Denial-of-Service (DoS) Attack and Botnet: Network Analysis, Research Tactics, and Mitigation , 2018 .
[46] Xavier Boyen,et al. A Survey of Anonymity of Cryptocurrencies , 2019, ACSW.
[47] Anand Nayyar,et al. RETRACTED ARTICLE: A remix IDE: smart contract-based framework for the healthcare sector by using Blockchain technology , 2020, Multimedia Tools and Applications.
[48] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.