A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit <a rel="external noopener" href="https://ieeexplore.ieee.org/ielx7/6287639/6514899/09201454.pdf">the original URL</a>. The file type is <code>application/pdf</code>.
Filters
BAD: A Blockchain Anomaly Detection Solution
<span title="">2020</span>
<i title="Institute of Electrical and Electronics Engineers (IEEE)">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a>
</i>
BAD: A Blockchain Anomaly Detection SOLUTION The core idea behind Blockchain Anomaly Detection (BAD) consists in providing a new decentralized system based on the blockchain technology which leverages ...
Contributions In this paper we propose BAD: a general solution that leverages the features of blockchain to provide an Anomaly Detection Service. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.3025622">doi:10.1109/access.2020.3025622</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zy5zztkgdbfqhbjo7idkmi7paq">fatcat:zy5zztkgdbfqhbjo7idkmi7paq</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201108183415/https://ieeexplore.ieee.org/ielx7/6287639/6514899/09201454.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/be/34/be34ca649abfdb75d3906acd7df0495151c02c02.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.3025622">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="unlock alternate icon" style="background-color: #fb971f;"></i>
ieee.com
</button>
</a>
BAD: Blockchain Anomaly Detection
[article]
<span title="2020-07-03">2020</span>
<i >
arXiv
</i>
<span class="release-stage" >pre-print</span>
However, no proposal has addressed attacks targeting blockchain-based systems. In this paper we present BAD: the first Blockchain Anomaly Detection solution. ...
Our proposal is validated via both experimental results and theoretical complexity analysis, that highlight the quality and viability of our Blockchain Anomaly Detection solution. ...
We detailed BAD, and provided an analysis of its overhead, as well as a prototype implementation, showing as an example its effectiveness in detecting the dreadful eclipse attack. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1807.03833v3">arXiv:1807.03833v3</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3tvo5rpbrncgpalrq3erwqkml4">fatcat:3tvo5rpbrncgpalrq3erwqkml4</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200720105546/https://arxiv.org/pdf/1807.03833v3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/7a/36/7a364a6943b7c61985c9bf3fb09bd7322f18bd7a.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1807.03833v3" title="arxiv.org access">
<button class="ui compact blue labeled icon button serp-button">
<i class="file alternate outline icon"></i>
arxiv.org
</button>
</a>
Cyber-Physical System Architecture for Minimizing the Possibility of Producing Bad Products in a Manufacturing System
[chapter]
<span title="2019-09-19">2019</span>
<i title="IntechOpen">
Innovative Design and Operation of Digital Manufacturing Equipment - Trends and Prospect of Manufacturing Intelligence [Working Title]
</i>
The combination of the previous techniques will be implemented in the architecture proposed for minimizing the possibility of producing bad products. ...
The new industry 4.0 requires the implementation of several cyber-physical systems to increase the level of productivity in a manufacturing system. ...
., detecting anomalies). ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5772/intechopen.88461">doi:10.5772/intechopen.88461</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5ve3unld4bgtzdo7s3fr3vvoam">fatcat:5ve3unld4bgtzdo7s3fr3vvoam</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200310093812/https://api.intechopen.com/chapter/pdf-download/69091.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/e2/4e/e24ed6ac0a3c8402bb2e06fe6b2a929e68a016d4.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5772/intechopen.88461">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="unlock alternate icon" style="background-color: #fb971f;"></i>
Publisher / doi.org
</button>
</a>
BCEAD: A Blockchain-Empowered Ensemble Anomaly Detection for Wireless Sensor Network via Isolation Forest
<span title="2021-11-10">2021</span>
<i title="Hindawi Limited">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sdme5pnua5auzcsjgqmqefb66m" style="color: black;">Security and Communication Networks</a>
</i>
Therefore, we propose a blockchain-based ensemble anomaly detection (BCEAD), which stores the model of a typical anomaly detection algorithm (isolated forest) in the blockchain for distributed anomaly ...
By constructing a suitable block structure and consensus mechanism, the global model for detection can iteratively update to enhance detection performance. ...
For the trust problem of distributed detection, blockchain is also a kind of solution worth trying. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2021/9430132">doi:10.1155/2021/9430132</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bysh6iqeubarvgm4lhhzxjjzvi">fatcat:bysh6iqeubarvgm4lhhzxjjzvi</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220116151954/https://downloads.hindawi.com/journals/scn/2021/9430132.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/bc/e8/bce8957d526f97dbb8d8c56fceba425c88b4779e.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2021/9430132">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="unlock alternate icon" style="background-color: #fb971f;"></i>
hindawi.com
</button>
</a>
Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges
<span title="">2022</span>
<i title="Computers, Materials and Continua (Tech Science Press)">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/pu36lprddffgdbdb5n2qwfvaxa" style="color: black;">Computer systems science and engineering</a>
</i>
To explore and highlight the importance of integrating blockchain with intrusion detection systems, this paper provides a comprehensive background of intrusion detection systems and blockchain technology ...
Furthermore, a comprehensive review of emerging intrusion detection systems based on blockchain technology is presented. ...
[72] proposed a model called BAD, which is a blockchain anomaly detection approach for the Bitcoin network. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32604/csse.2022.017941">doi:10.32604/csse.2022.017941</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fms7ruts4bb2titxseevonsjzq">fatcat:fms7ruts4bb2titxseevonsjzq</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220302223152/https://www.techscience.com/ueditor/files/csse/TSP_CSSE-40-1/TSP_CSSE_17941/TSP_CSSE_17941.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/d8/20/d820c2f966b203b04f0ec49303bb488acb498072.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32604/csse.2022.017941">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
Publisher / doi.org
</button>
</a>
Anomaly Detection in Blockchain Networks: A Comprehensive Survey
[article]
<span title="2021-12-11">2021</span>
<i >
arXiv
</i>
<span class="release-stage" >pre-print</span>
Then, we demonstrate certain fundamental evaluation matrices and key requirements that can play a critical role while developing anomaly detection models for blockchain. ...
Afterwards, we present a thorough survey of various anomaly detection models from perspective of each layer of blockchain to provide readers an in-depth overview of integration that has been carried out ...
named it a 'BAD'. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2112.06089v1">arXiv:2112.06089v1</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/o6z2f7gunvd3fnxhfwmb57qwhm">fatcat:o6z2f7gunvd3fnxhfwmb57qwhm</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211215010048/https://arxiv.org/pdf/2112.06089v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/00/5c/005ca2673b8b534b01869f0aee5db1f2172b1c30.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2112.06089v1" title="arxiv.org access">
<button class="ui compact blue labeled icon button serp-button">
<i class="file alternate outline icon"></i>
arxiv.org
</button>
</a>
Anomaly Detection Model Over Blockchain Electronic Transactions
<span title="">2019</span>
<i title="IEEE">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yqtglg5ntzaxjm5seols4mbqka" style="color: black;">2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)</a>
</i>
In this work, we propose a new model for anomaly detection over bitcoin electronic transactions. ...
with the same type of anomalies. ...
Signorini and al [5] proposes a Blockchain anomaly detection (BAD) solution exploiting blockchain metadata to collect malicious activity. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/iwcmc.2019.8766765">doi:10.1109/iwcmc.2019.8766765</a>
<a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/iwcmc/SayadiRC19.html">dblp:conf/iwcmc/SayadiRC19</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zmelhhqo7bbztcdgntdezdm6te">fatcat:zmelhhqo7bbztcdgntdezdm6te</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200510110737/https://hal.archives-ouvertes.fr/hal-02386966/document" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/3b/f9/3bf9a673e18860dc1f4993f2068f63eec40fd5ac.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/iwcmc.2019.8766765">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
ieee.com
</button>
</a>
Evaluating a blockchain-based network performance for the intrusion detection system
<span title="">2020</span>
<i title="Institute of Mathematical Machines and Systems Problems of the NAS of Ukraine">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/t2fuaggepjd6deaenevrt45lzi" style="color: black;">Mathematical machines and systems</a>
</i>
A blockchain can be used as such kind of mechanism, but most of working blockchains use cases are related to cryptocurrencies, where blockchain is successfully used as a decentralized database which saves ...
In this paper, the results of the modeling of blockchain-based network to evaluate performance for a collaborative intrusion detection system are presented. ...
If we map these cases on plain of intrusion detection solutions we will have two cases when we can use a blockchain. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.34121/1028-9763-2020-1-99-109">doi:10.34121/1028-9763-2020-1-99-109</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/s5j7mpsb5nehhhzrel3ophadhq">fatcat:s5j7mpsb5nehhhzrel3ophadhq</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220309045609/http://www.immsp.kiev.ua/publications/articles/2020/2020_1/Burmaka_1_2020.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/a7/25/a725c39ea4f59b02abb5523d66f533606b9698f5.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.34121/1028-9763-2020-1-99-109">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
Publisher / doi.org
</button>
</a>
A New Network Intrusion Detection System based on Blockchain
<span title="">2019</span>
<i title="Totem Publisher, Inc.">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7jcg35zmwbdmpmvxhyrwzy26s4" style="color: black;">International Journal of Performability Engineering</a>
</i>
In this paper, a new network intrusion detection system is designed based on blockchain, which can enable users to share feature libraries over the whole network by means of P2P network transmission. ...
However, if a user wants to effectively detect malicious behaviors in the network, a large feature library is needed, and it cannot be shared with other users, which makes the quality of single user detection ...
At present, it is mainly divided into anomaly-based network intrusion detection and feature-based network intrusion detection. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.23940/ijpe.19.12.p10.31873195">doi:10.23940/ijpe.19.12.p10.31873195</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/eeoleslvdjbxpeudr7syfiy54u">fatcat:eeoleslvdjbxpeudr7syfiy54u</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210716071300/http://www.ijpe-online.com/EN/article/downloadArticleFile.do?attachType=PDF&id=4312" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/26/73/26734f1b089d091a9f6a8ab81a944f71bdd43c3f.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.23940/ijpe.19.12.p10.31873195">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
Publisher / doi.org
</button>
</a>
PIRATE: A Blockchain-based Secure Framework of Distributed Machine Learning in 5G Networks
[article]
<span title="2019-12-17">2019</span>
<i >
arXiv
</i>
<span class="release-stage" >pre-print</span>
Therefore, to provide the byzantine-resilience for distributed learning in 5G era, this article proposes a secure computing framework based on the sharding-technique of blockchain, namely PIRATE. ...
However, the model safety will become a challenge. ...
A pretrained anomaly detection model would assign a weight to each gradient according to the anomaly score. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1912.07860v1">arXiv:1912.07860v1</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/f77hexw7ybbb5nfhleujbaji5q">fatcat:f77hexw7ybbb5nfhleujbaji5q</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200907072840/https://arxiv.org/pdf/1912.07860v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/43/15/431597cd71a9ea727e4091f2d25a656d646e16ac.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1912.07860v1" title="arxiv.org access">
<button class="ui compact blue labeled icon button serp-button">
<i class="file alternate outline icon"></i>
arxiv.org
</button>
</a>
A Data Quarantine Model to Secure Data in Edge Computing
[article]
<span title="2021-11-15">2021</span>
<i >
arXiv
</i>
<span class="release-stage" >pre-print</span>
The efficient security solutions in cloud, ad-hoc networks, and computer systems using quarantine have motivated adopting it in edge computing. ...
Therefore, this paper proposes a new concept of data quarantine model to mitigate data integrity attacks by quarantining intruders. ...
Currently, there are many data integrity verification solutions to secure the data in edge computing, such as using blockchain devices, data assessments, collaborative methods or statistical anomaly detections ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2111.07672v1">arXiv:2111.07672v1</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5w735f5dw5bnrjsttswuv5tozq">fatcat:5w735f5dw5bnrjsttswuv5tozq</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211201015611/https://arxiv.org/ftp/arxiv/papers/2111/2111.07672.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/31/1a/311a9498018b203fd9ba77c21d7c3bc7dea12d29.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2111.07672v1" title="arxiv.org access">
<button class="ui compact blue labeled icon button serp-button">
<i class="file alternate outline icon"></i>
arxiv.org
</button>
</a>
Decentralised Trustworthy Collaborative Intrusion Detection System for IoT
[article]
<span title="2021-10-21">2021</span>
<i >
arXiv
</i>
<span class="release-stage" >pre-print</span>
In our proposed solution, each CIDS node exchanges detection rules to help other nodes detect new types of intrusion. ...
Our architecture offloads the trust computation to the blockchain and utilises a decentralised storage to host the shared trustworthy detection rules, ensuring scalability. ...
(BiLSTM) DL algorithm is trained to detect anomalies in the network. ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2110.11177v1">arXiv:2110.11177v1</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2glxhtnvzjgefcdsqrzhyc4vgy">fatcat:2glxhtnvzjgefcdsqrzhyc4vgy</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211024004842/https://arxiv.org/pdf/2110.11177v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/af/6d/af6d960c8badb73ac6907adc149bac074e4115ed.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2110.11177v1" title="arxiv.org access">
<button class="ui compact blue labeled icon button serp-button">
<i class="file alternate outline icon"></i>
arxiv.org
</button>
</a>
A data quarantine model to secure data in edge computing
<span title="2022-06-01">2022</span>
<i title="Institute of Advanced Engineering and Science">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/c3tlqqlmlrhohmjgwq5tzpde6m" style="color: black;">International Journal of Power Electronics and Drive Systems (IJPEDS)</a>
</i>
The efficient security solutions in cloud, ad-hoc networks, and computer systems using quarantine have motivated adopting it in edge computing. ...
Therefore, this paper proposes a new concept of data quarantine model to mitigate data integrity attacks by quarantining intruders. ...
Currently, there are many data integrity verification solutions to secure the data in edge computing, such as using blockchain devices, data assessments, collaborative methods or statistical anomaly detections ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11591/ijece.v12i3.pp3309-3319">doi:10.11591/ijece.v12i3.pp3309-3319</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xrm6aja2wra3xiwqsnzewnxizy">fatcat:xrm6aja2wra3xiwqsnzewnxizy</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220315124342/http://ijece.iaescore.com/index.php/IJECE/article/download/26383/15718" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/6c/b3/6cb38084f7d96445437d55d0bd09d73dc52b00c6.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11591/ijece.v12i3.pp3309-3319">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="unlock alternate icon" style="background-color: #fb971f;"></i>
Publisher / doi.org
</button>
</a>
A Survey of IoT and Blockchain Integration: Security Perspective
<span title="">2021</span>
<i title="Institute of Electrical and Electronics Engineers (IEEE)">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a>
</i>
In the Internet of Things (IoT), blockchain can be used to create a decentralized, reliable, and secure environment. ...
We have surveyed published articles from 2017 to 2021 on blockchain-based solutions for IoT security, taking into consideration different security areas and then, we have organized the available articles ...
Typical trust and reputation models employ machine learning or anomaly detection techniques to detect malicious nodes in a network [21] . ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3129697">doi:10.1109/access.2021.3129697</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/l3tj4zelejbobouc2ouw3j3pcy">fatcat:l3tj4zelejbobouc2ouw3j3pcy</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211208004324/https://ieeexplore.ieee.org/ielx7/6287639/9312710/09622256.pdf?tp=&arnumber=9622256&isnumber=9312710&ref=" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/0a/39/0a39fd2a2eeaeb0b64b0e3f5c15c7ded151a1666.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3129697">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="unlock alternate icon" style="background-color: #fb971f;"></i>
ieee.com
</button>
</a>
Smart Grid Nontechnical Loss Detection Based on Power Gateway Consortium Blockchain
<span title="2021-10-14">2021</span>
<i title="Hindawi Limited">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sdme5pnua5auzcsjgqmqefb66m" style="color: black;">Security and Communication Networks</a>
</i>
A hierarchical grid gateway blockchain is proposed and designed, and a new decentralized management MDMS system is constructed. ...
Recently, there are also some NTL detection programs. However, most of the schemes need huge amounts of supporting data and high labor costs. As a result, the NTL problem has not been well solved. ...
[21] proposed a blockchain-based anomaly detection method (BAD). ...
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2021/9501572">doi:10.1155/2021/9501572</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3ppxmsr4qfbyngxjyyg4lakika">fatcat:3ppxmsr4qfbyngxjyyg4lakika</a>
</span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211020195437/https://downloads.hindawi.com/journals/scn/2021/9501572.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/77/bc/77bc81e63284effff3bf90b1c867166cc421f7dd.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2021/9501572">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="unlock alternate icon" style="background-color: #fb971f;"></i>
hindawi.com
</button>
</a>
« Previous
Showing results 1 — 15 out of 497 results