Filters








497 Hits in 4.5 sec

BAD: A Blockchain Anomaly Detection Solution

Matteo Signorini, Matteo Pontecorvi, Wael Kanoun, Roberto Di Pietro
<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
BAD: A Blockchain Anomaly Detection SOLUTION The core idea behind Blockchain Anomaly Detection (BAD) consists in providing a new decentralized system based on the blockchain technology which leverages  ...  Contributions In this paper we propose BAD: a general solution that leverages the features of blockchain to provide an Anomaly Detection Service.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.3025622">doi:10.1109/access.2020.3025622</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zy5zztkgdbfqhbjo7idkmi7paq">fatcat:zy5zztkgdbfqhbjo7idkmi7paq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201108183415/https://ieeexplore.ieee.org/ielx7/6287639/6514899/09201454.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/be/34/be34ca649abfdb75d3906acd7df0495151c02c02.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.3025622"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

BAD: Blockchain Anomaly Detection [article]

Matteo Signorini, Matteo Pontecorvi, Wael Kanoun, Roberto Di Pietro
<span title="2020-07-03">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
However, no proposal has addressed attacks targeting blockchain-based systems. In this paper we present BAD: the first Blockchain Anomaly Detection solution.  ...  Our proposal is validated via both experimental results and theoretical complexity analysis, that highlight the quality and viability of our Blockchain Anomaly Detection solution.  ...  We detailed BAD, and provided an analysis of its overhead, as well as a prototype implementation, showing as an example its effectiveness in detecting the dreadful eclipse attack.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1807.03833v3">arXiv:1807.03833v3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3tvo5rpbrncgpalrq3erwqkml4">fatcat:3tvo5rpbrncgpalrq3erwqkml4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200720105546/https://arxiv.org/pdf/1807.03833v3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7a/36/7a364a6943b7c61985c9bf3fb09bd7322f18bd7a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1807.03833v3" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Cyber-Physical System Architecture for Minimizing the Possibility of Producing Bad Products in a Manufacturing System [chapter]

Salvador Cobos Guzman, Maria Dolores Cima Cabal, Francisco Machio Regidor, Lucia Alonso Virgos
<span title="2019-09-19">2019</span> <i title="IntechOpen"> Innovative Design and Operation of Digital Manufacturing Equipment - Trends and Prospect of Manufacturing Intelligence [Working Title] </i> &nbsp;
The combination of the previous techniques will be implemented in the architecture proposed for minimizing the possibility of producing bad products.  ...  The new industry 4.0 requires the implementation of several cyber-physical systems to increase the level of productivity in a manufacturing system.  ...  ., detecting anomalies).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5772/intechopen.88461">doi:10.5772/intechopen.88461</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5ve3unld4bgtzdo7s3fr3vvoam">fatcat:5ve3unld4bgtzdo7s3fr3vvoam</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200310093812/https://api.intechopen.com/chapter/pdf-download/69091.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e2/4e/e24ed6ac0a3c8402bb2e06fe6b2a929e68a016d4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5772/intechopen.88461"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

BCEAD: A Blockchain-Empowered Ensemble Anomaly Detection for Wireless Sensor Network via Isolation Forest

Xiong Yang, Yuling Chen, Xiaobin Qian, Tao Li, Xiao Lv, Weizhi Meng
<span title="2021-11-10">2021</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sdme5pnua5auzcsjgqmqefb66m" style="color: black;">Security and Communication Networks</a> </i> &nbsp;
Therefore, we propose a blockchain-based ensemble anomaly detection (BCEAD), which stores the model of a typical anomaly detection algorithm (isolated forest) in the blockchain for distributed anomaly  ...  By constructing a suitable block structure and consensus mechanism, the global model for detection can iteratively update to enhance detection performance.  ...  For the trust problem of distributed detection, blockchain is also a kind of solution worth trying.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2021/9430132">doi:10.1155/2021/9430132</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bysh6iqeubarvgm4lhhzxjjzvi">fatcat:bysh6iqeubarvgm4lhhzxjjzvi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220116151954/https://downloads.hindawi.com/journals/scn/2021/9430132.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bc/e8/bce8957d526f97dbb8d8c56fceba425c88b4779e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2021/9430132"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges

Salam Al-E'mari, Mohammed Anbar, Yousef Sanjalawe, Selvakumar Manickam, Iznan Hasbullah
<span title="">2022</span> <i title="Computers, Materials and Continua (Tech Science Press)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/pu36lprddffgdbdb5n2qwfvaxa" style="color: black;">Computer systems science and engineering</a> </i> &nbsp;
To explore and highlight the importance of integrating blockchain with intrusion detection systems, this paper provides a comprehensive background of intrusion detection systems and blockchain technology  ...  Furthermore, a comprehensive review of emerging intrusion detection systems based on blockchain technology is presented.  ...  [72] proposed a model called BAD, which is a blockchain anomaly detection approach for the Bitcoin network.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32604/csse.2022.017941">doi:10.32604/csse.2022.017941</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fms7ruts4bb2titxseevonsjzq">fatcat:fms7ruts4bb2titxseevonsjzq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220302223152/https://www.techscience.com/ueditor/files/csse/TSP_CSSE-40-1/TSP_CSSE_17941/TSP_CSSE_17941.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d8/20/d820c2f966b203b04f0ec49303bb488acb498072.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.32604/csse.2022.017941"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Anomaly Detection in Blockchain Networks: A Comprehensive Survey [article]

Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
<span title="2021-12-11">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Then, we demonstrate certain fundamental evaluation matrices and key requirements that can play a critical role while developing anomaly detection models for blockchain.  ...  Afterwards, we present a thorough survey of various anomaly detection models from perspective of each layer of blockchain to provide readers an in-depth overview of integration that has been carried out  ...  named it a 'BAD'.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2112.06089v1">arXiv:2112.06089v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/o6z2f7gunvd3fnxhfwmb57qwhm">fatcat:o6z2f7gunvd3fnxhfwmb57qwhm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211215010048/https://arxiv.org/pdf/2112.06089v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/00/5c/005ca2673b8b534b01869f0aee5db1f2172b1c30.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2112.06089v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Anomaly Detection Model Over Blockchain Electronic Transactions

Sirine SAYADI, Sonia BEN REJEB, Zied CHOUKAIR
<span title="">2019</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yqtglg5ntzaxjm5seols4mbqka" style="color: black;">2019 15th International Wireless Communications &amp; Mobile Computing Conference (IWCMC)</a> </i> &nbsp;
In this work, we propose a new model for anomaly detection over bitcoin electronic transactions.  ...  with the same type of anomalies.  ...  Signorini and al [5] proposes a Blockchain anomaly detection (BAD) solution exploiting blockchain metadata to collect malicious activity.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/iwcmc.2019.8766765">doi:10.1109/iwcmc.2019.8766765</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/iwcmc/SayadiRC19.html">dblp:conf/iwcmc/SayadiRC19</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zmelhhqo7bbztcdgntdezdm6te">fatcat:zmelhhqo7bbztcdgntdezdm6te</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200510110737/https://hal.archives-ouvertes.fr/hal-02386966/document" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3b/f9/3bf9a673e18860dc1f4993f2068f63eec40fd5ac.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/iwcmc.2019.8766765"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Evaluating a blockchain-based network performance for the intrusion detection system

I.A. Burmaka, Chernihiv National University of Technology, V.V. Lytvynov, I.S. Skiter, S.V. Lytvyn, Chernihiv National University of Technology, Institute of Mathematical Machines and Systems Problems National Academy of Science of Ukraine, Chernihiv National University of Technology
<span title="">2020</span> <i title="Institute of Mathematical Machines and Systems Problems of the NAS of Ukraine"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/t2fuaggepjd6deaenevrt45lzi" style="color: black;">Mathematical machines and systems</a> </i> &nbsp;
A blockchain can be used as such kind of mechanism, but most of working blockchains use cases are related to cryptocurrencies, where blockchain is successfully used as a decentralized database which saves  ...  In this paper, the results of the modeling of blockchain-based network to evaluate performance for a collaborative intrusion detection system are presented.  ...  If we map these cases on plain of intrusion detection solutions we will have two cases when we can use a blockchain.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.34121/1028-9763-2020-1-99-109">doi:10.34121/1028-9763-2020-1-99-109</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/s5j7mpsb5nehhhzrel3ophadhq">fatcat:s5j7mpsb5nehhhzrel3ophadhq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220309045609/http://www.immsp.kiev.ua/publications/articles/2020/2020_1/Burmaka_1_2020.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a7/25/a725c39ea4f59b02abb5523d66f533606b9698f5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.34121/1028-9763-2020-1-99-109"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A New Network Intrusion Detection System based on Blockchain

Fu Jinhua, Xu Mixue, Huang Yongzhong, Tao Hongwei
<span title="">2019</span> <i title="Totem Publisher, Inc."> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7jcg35zmwbdmpmvxhyrwzy26s4" style="color: black;">International Journal of Performability Engineering</a> </i> &nbsp;
In this paper, a new network intrusion detection system is designed based on blockchain, which can enable users to share feature libraries over the whole network by means of P2P network transmission.  ...  However, if a user wants to effectively detect malicious behaviors in the network, a large feature library is needed, and it cannot be shared with other users, which makes the quality of single user detection  ...  At present, it is mainly divided into anomaly-based network intrusion detection and feature-based network intrusion detection.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.23940/ijpe.19.12.p10.31873195">doi:10.23940/ijpe.19.12.p10.31873195</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/eeoleslvdjbxpeudr7syfiy54u">fatcat:eeoleslvdjbxpeudr7syfiy54u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210716071300/http://www.ijpe-online.com/EN/article/downloadArticleFile.do?attachType=PDF&amp;id=4312" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/26/73/26734f1b089d091a9f6a8ab81a944f71bdd43c3f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.23940/ijpe.19.12.p10.31873195"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

PIRATE: A Blockchain-based Secure Framework of Distributed Machine Learning in 5G Networks [article]

Sicong Zhou, Huawei Huang, Wuhui Chen, Zibin Zheng, Song Guo
<span title="2019-12-17">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Therefore, to provide the byzantine-resilience for distributed learning in 5G era, this article proposes a secure computing framework based on the sharding-technique of blockchain, namely PIRATE.  ...  However, the model safety will become a challenge.  ...  A pretrained anomaly detection model would assign a weight to each gradient according to the anomaly score.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1912.07860v1">arXiv:1912.07860v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/f77hexw7ybbb5nfhleujbaji5q">fatcat:f77hexw7ybbb5nfhleujbaji5q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200907072840/https://arxiv.org/pdf/1912.07860v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/43/15/431597cd71a9ea727e4091f2d25a656d646e16ac.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1912.07860v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

A Data Quarantine Model to Secure Data in Edge Computing [article]

Poornima Mahadevappa, Raja Kumar Murugesan
<span title="2021-11-15">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
The efficient security solutions in cloud, ad-hoc networks, and computer systems using quarantine have motivated adopting it in edge computing.  ...  Therefore, this paper proposes a new concept of data quarantine model to mitigate data integrity attacks by quarantining intruders.  ...  Currently, there are many data integrity verification solutions to secure the data in edge computing, such as using blockchain devices, data assessments, collaborative methods or statistical anomaly detections  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2111.07672v1">arXiv:2111.07672v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5w735f5dw5bnrjsttswuv5tozq">fatcat:5w735f5dw5bnrjsttswuv5tozq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211201015611/https://arxiv.org/ftp/arxiv/papers/2111/2111.07672.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/31/1a/311a9498018b203fd9ba77c21d7c3bc7dea12d29.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2111.07672v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Decentralised Trustworthy Collaborative Intrusion Detection System for IoT [article]

Guntur Dharma Putra, Volkan Dedeoglu, Abhinav Pathak, Salil S. Kanhere, Raja Jurdak
<span title="2021-10-21">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In our proposed solution, each CIDS node exchanges detection rules to help other nodes detect new types of intrusion.  ...  Our architecture offloads the trust computation to the blockchain and utilises a decentralised storage to host the shared trustworthy detection rules, ensuring scalability.  ...  (BiLSTM) DL algorithm is trained to detect anomalies in the network.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2110.11177v1">arXiv:2110.11177v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2glxhtnvzjgefcdsqrzhyc4vgy">fatcat:2glxhtnvzjgefcdsqrzhyc4vgy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211024004842/https://arxiv.org/pdf/2110.11177v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/af/6d/af6d960c8badb73ac6907adc149bac074e4115ed.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2110.11177v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

A data quarantine model to secure data in edge computing

Poornima Mahadevappa, Raja Kumar Murugesan
<span title="2022-06-01">2022</span> <i title="Institute of Advanced Engineering and Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/c3tlqqlmlrhohmjgwq5tzpde6m" style="color: black;">International Journal of Power Electronics and Drive Systems (IJPEDS)</a> </i> &nbsp;
The efficient security solutions in cloud, ad-hoc networks, and computer systems using quarantine have motivated adopting it in edge computing.  ...  Therefore, this paper proposes a new concept of data quarantine model to mitigate data integrity attacks by quarantining intruders.  ...  Currently, there are many data integrity verification solutions to secure the data in edge computing, such as using blockchain devices, data assessments, collaborative methods or statistical anomaly detections  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11591/ijece.v12i3.pp3309-3319">doi:10.11591/ijece.v12i3.pp3309-3319</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xrm6aja2wra3xiwqsnzewnxizy">fatcat:xrm6aja2wra3xiwqsnzewnxizy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220315124342/http://ijece.iaescore.com/index.php/IJECE/article/download/26383/15718" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6c/b3/6cb38084f7d96445437d55d0bd09d73dc52b00c6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11591/ijece.v12i3.pp3309-3319"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A Survey of IoT and Blockchain Integration: Security Perspective

Elham A. Shammar, Ammar T. Zahary, Asma A. Al-Shargabi
<span title="">2021</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
In the Internet of Things (IoT), blockchain can be used to create a decentralized, reliable, and secure environment.  ...  We have surveyed published articles from 2017 to 2021 on blockchain-based solutions for IoT security, taking into consideration different security areas and then, we have organized the available articles  ...  Typical trust and reputation models employ machine learning or anomaly detection techniques to detect malicious nodes in a network [21] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3129697">doi:10.1109/access.2021.3129697</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/l3tj4zelejbobouc2ouw3j3pcy">fatcat:l3tj4zelejbobouc2ouw3j3pcy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211208004324/https://ieeexplore.ieee.org/ielx7/6287639/9312710/09622256.pdf?tp=&amp;arnumber=9622256&amp;isnumber=9312710&amp;ref=" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0a/39/0a39fd2a2eeaeb0b64b0e3f5c15c7ded151a1666.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3129697"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Smart Grid Nontechnical Loss Detection Based on Power Gateway Consortium Blockchain

Xudong He, Jian Wang, Jiqiang Liu, Enze Yuan, Kailun Wang, Zhen Han, Yinghui Zhang
<span title="2021-10-14">2021</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sdme5pnua5auzcsjgqmqefb66m" style="color: black;">Security and Communication Networks</a> </i> &nbsp;
A hierarchical grid gateway blockchain is proposed and designed, and a new decentralized management MDMS system is constructed.  ...  Recently, there are also some NTL detection programs. However, most of the schemes need huge amounts of supporting data and high labor costs. As a result, the NTL problem has not been well solved.  ...  [21] proposed a blockchain-based anomaly detection method (BAD).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2021/9501572">doi:10.1155/2021/9501572</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3ppxmsr4qfbyngxjyyg4lakika">fatcat:3ppxmsr4qfbyngxjyyg4lakika</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211020195437/https://downloads.hindawi.com/journals/scn/2021/9501572.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/77/bc/77bc81e63284effff3bf90b1c867166cc421f7dd.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2021/9501572"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 497 results