4 Hits in 2.2 sec

The BitcoinHeist: Classifications of Ransomware Crime Families

Micheline Al Harrack
2021 International Journal of Computer Science & Information Technology (IJCSIT)  
I propose to work on the Bitcoin Heist data set to classify the different malicious transactions.  ...  I limit the study design to known ransomware identified previously and made available under the Bitcoin transaction graph from January 2009 to December 2018.  ...  This dataset has been made public by the original researchers who worked on the Bitcoin Heist for ransomware detection on the Bitcoin Blockchain [8] .  ... 
doi:10.5121/ijcsit.2021.13506 fatcat:zbju7tvxjbgm3mjxfqj2qh7o6i

BitcoinHeist: Topological Data Analysis for Ransomware Prediction on the Bitcoin Blockchain

Cuneyt G. Akcora, Yitao Li, Yulia R. Gel, Murat Kantarcioglu
2020 Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence  
By capitalizing on the recent advances in Topological Data Analysis, we propose a novel efficient and tractable framework to automatically predict new ransomware transactions in a ransomware family, given  ...  Currently, most hackers use Bitcoin for payments, and existing ransomware detection tools depend only on a couple of heuristics and/or tedious data gathering steps.  ...  Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence Special Track on AI for Computational Sustainability and Human Well-being  ... 
doi:10.24963/ijcai.2020/606 dblp:conf/ijcai/SubagdjaTT20 fatcat:zk7vq5fpmja6deotkvntnl3fkm

Blockchain-Empowered Mobile Edge Intelligence, Machine Learning and Secure Data Sharing [chapter]

Yao Du, Shuxiao Miao, Zitian Tong, Victoria Lemieux, Zehua Wang
2021 Blockchain Potential in AI [Working Title]  
With the advent of new decentralized machine learning approaches and mobile edge computing, the IoT on-device data training has now become possible.  ...  To handle these problems, blockchain has been considered as a promising solution. As a distributed smart ledger, blockchain is renowned for high scalability, privacy-preserving, and decentralization.  ...  By applying topological data analysis into the past records of transactions, BitcoinHeist can automate the prediction of new ransomware transactions in an address cluster, and detect new ransomware that  ... 
doi:10.5772/intechopen.96618 fatcat:tjon4elghrcq5e5lfsfmyx2srm

Distributed Computing with Permissioned Blockchains and Databases (Dagstuhl Seminar 19261)

C. Moha, Beng Chin Ooi, Gottfried Vossen, Michael Wagner
2019 Dagstuhl Reports  
As a consequence, a number of players in the IT industry work on a development of the technology, and several consortia have been formed to advance the technology across industries, among them Hyperledger  ...  It brought together a very good mix of people from academia and industry as well as from databases and related areas for which blockchain is a current topic and who are either users or developers in that  ...  Acknowledgements We want to thank the Dagstuhl staff for providing an environment that truly encourages scientific exchange and discussions and that cares for the guests in an unmatched way.  ... 
doi:10.4230/dagrep.9.6.69 dblp:journals/dagstuhl-reports/0001OV19 fatcat:vwtnp5r6cjejtj2m7bnsio5mai