Filters








70 Hits in 2.6 sec

Digging into Browser-based Crypto Mining [article]

Jan Rüth and Torsten Zimmermann and Konrad Wolsing and Oliver Hohlfeld
2018 arXiv   pre-print
Our work identifies and dissects Coinhive as the major browser-mining stakeholder.  ...  Mining is the foundation of blockchain-based cryptocurrencies such as Bitcoin rewarding the miner for finding blocks for new transactions.  ...  This monetary reward has rendered crypto mining a business-browser-based mining extends this business to monetize the web. Not all cryptocurrencies are equally suited for browser-based mining.  ... 
arXiv:1808.00811v1 fatcat:acrqgl44zrejnong5goona2qfi

SENTIMENT & PATTERN ANALYSIS FOR IDENTIFYING NATURE OF THE CONTENT HOSTED IN THE DARK WEB

Murty Ch A S, Parag H Rughani
2021 Indian Journal of Computer Science and Engineering  
Sentiment's analysis attempts to identify emotions and opinions based on the transactions and text communications.  ...  The Data Set Contains around 1932 Entries of URLs and their hosted text data, which fall into Categories Like ["ADULT"." CRYPTO"," COUNTERFEIT"," DRUG"," MARKET"," SERVICE"," WEAPON"].  ...  URL Mining: Dark Web is an unindexed web, and the format of the Dark web URL is very complex, which uses a stronger crypto algorithm V3 URLs with 56 bytes long.  ... 
doi:10.21817/indjcse/2021/v12i6/211206142 fatcat:q6i4s2porrdonjdg2ozfmo3soy

Blockchain - The Revolution of Community-based Decentralized Open Ledger Technologies

Markus Schindler
2019 International Journal of Business and Social Science  
Cryptocurrencies as applications on the Blockchain and community based decentralized open ledger technologies have been very controversial issues ever since they have come into existence.  ...  Mining Miners act as auditors on currencies such as Bitcoin and Ethereum.  ...  In a Blockchain explorer, all of these accounts and transactions are clickable links, so it's easy to see in the browser who sent what and when. Noticeable is the first transaction of each block.  ... 
doi:10.30845/ijbss.v10n2p2 fatcat:ar32ejevm5ekzmaqzsjkga7ea4

AN INSIGHT TO CYBER THREATS, ATTACKS AND CHALLENGES

P. SRIPRIYA, MALATHI S, S. POONGUZHALI, P. SUJATHA
2020 INTERNATIONAL JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY  
It examines online communication among the browsers and servers to irritate with user's data. Crypto Currency Attacks Bitcoin is used to protect financial Jenkins Miner transaction.  ...  Big Data It replaces traditional data processing software and brings out novel way to investigate and systematically mining data.  ... 
doi:10.34218/ijeet.11.5.2020.010 fatcat:swtl4wuhsbcu3eepjdc6i6mgly

B.Y.O.C (1,342 times and counting)

Poul-Henning Kamp
2011 Communications of the ACM  
based cookies stored in a MySQL database ap13-mod_access_identd-1.2.0 --Apache module to supply access control based on ident reply ap13-mod_access_referer-1.0.2_1 --Provides access control based on Referer  ...  competing implementations to inspire improvement; in fact, there seems to be a distinct lack of improvement where a single implementation becomes too "golden." a2png-0.1.5_4 --Converts plain ASCII text into  ...  We can apply data mining methods to program source code, allowing us to investigate such questions.  ... 
doi:10.1145/1897852.1897870 fatcat:2elva4fgp5cdnn5b5lgmlp5shi

Optimization of the Marketing Management System Based on Cloud Computing and Big Data

Lin Zhang
2021 Complexity  
Data-mining-based marketing system information solutions consist of several parts, such as requirement analysis, design, implementation, and testing. is paper introduces data mining technology to the marketing  ...  marketing system based on data mining technology. e system passes the actual test and the deployment and the operation of this system are confirmed. e system, which can improve marketing activity, is  ...  In the analysis, the first step is that the training set pulls cryptos based on the training set generation tool. e second step is to continuously update the current training set and form the training  ... 
doi:10.1155/2021/9924302 dblp:journals/complexity/Zhang21f fatcat:p263psszrvalvbnb2ziry5if3i

Real-time monitoring as a supplementary security component of vigilantism in modern network environments

Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan
2020 International Journal of Information Technology  
Hackers use crypto-jacking to steal computing resources from their victims' devices to compete against sophisticated crypto mining operations without the costly overhead.  ...  browser.  ... 
doi:10.1007/s41870-020-00585-8 fatcat:knubaljkv5cffprrahyatj56jy

Real-time monitoring as a supplementary security component of vigilantism in modern network environments [article]

Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan
2020 arXiv   pre-print
Hackers use crypto-jacking to steal computing resources from their victims' devices to compete against sophisticated crypto mining operations without the costly overhead.  ...  browser.  ... 
arXiv:2012.03622v1 fatcat:azjvycjdafdwlbxsughadsbfxi

Exploring Web3 From the View of Blockchain [article]

Qin Wang, Rujia Li, Qi Wang, Shiping Chen, Mark Ryan, Thomas Hardjono
2022 arXiv   pre-print
Specifically, we have identified all potential architectural design types and evaluated each of them by employing the scenario-based architecture evaluation method.  ...  We dig into its building process, investigate its usage in existing projects, and deconstruct the protocol into separated components.  ...  We dig into this topic by decoupling existing systems supporting blockchain-based Web3 services into separate core components, and accordingly discussing related features and properties for each potential  ... 
arXiv:2206.08821v1 fatcat:weqq4xm3ybhqfi4wzn7sx7u2ae

A Value-sensitive Design Perspective of Cryptocurrencies: A Research Agenda

Karlene Cousins, Hemang Subramanian, Pouyan Esmaeilzadeh
2019 Communications of the Association for Information Systems  
As our main contribution, we offer a research agenda based on the cryptocurrency stakeholders' underlying value system.  ...  Although we have seen an uptrend in the types of created cryptocurrencies, it has not yet translated into mainstream adoption., In this paper, we use value-sensitive design principles to identify values  ...  The IS research community has used VSD to study privacyenhancing tools in browsers (Xu, Crossler, & Bélanger, 2012) , informed consent in Web-based interactions (Friedman, Howe, & Felte, 2002) , and  ... 
doi:10.17705/1cais.04527 fatcat:mu5tkynyz5ecbdhia5pa6x2a74

Brain leaks and consumer neurotechnology

Marcello Ienca, Pim Haselager, Ezekiel J Emanuel
2018 Nature Biotechnology  
Previously, browser-based threats against Macs have been found, including ransomware targeting Safari through a malicious website.  ...  Security needs to start digging through the data proactively during non-breach response time.  ...  T Browser protection for avoiding obfuscated web-based attacks.  ... 
doi:10.1038/nbt.4240 pmid:30188521 fatcat:dwoyvyborfdifdkklju3p3qek4

Decentralised Autonomous Organisations and the Corporate Form

Nathan Tse
2020 Law review  
Balancing the inevitable improvement in technology against these significant obstacles, this article predicts an incremental integration of DAOs into society through a hybrid approach, involving interim  ...  For one, the concentration of votes into the hands of delegates is a major step away from the decentralised systems which crypto-anarchists strive for.  ...  Dig a little deeper however and it is apparent that the rigidity of these rules may impinge on organisational efficiency.  ... 
doi:10.26686/vuwlr.v51i2.6573 fatcat:h75lvwfwvrhf7psyiieuj3sbkm

Blockchain-Based Token Sales, Initial Coin Offerings, and the Democratization of Public Capital Markets

Jonathan Rohr, Aaron Wright
2017 Social Science Research Network  
In 2017 alone, tech entrepreneurs raised over $6 billion through the sale of blockchain-based digital tokens, with some sales lasting mere seconds before selling out.  ...  For example, consider the token sale of Nimiq-a browser-based blockchain-which sold $10 million in tokens in July 2017.  ...  When it comes to mining, back in 2014 it was possible for a commodity laptop to mine Bitcoin, but today the cost of mining requires specialized hardware, which is costly to acquire.  ... 
doi:10.2139/ssrn.3048104 fatcat:mrtlztfuwrcbloc3au3kuijzem

Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network

Saurabh Singh, A.S.M. Sanwar Hosen, Byungun Yoon
2021 IEEE Access  
They also discussed some of the challenges and issues associated with blockchain-based security services, and provided insight into security services in current applications and techniques.  ...  Attack self-detection software must be built into the system.  ... 
doi:10.1109/access.2021.3051602 fatcat:2psy7mq6zrhhnjzg35d6aaecsq

Implementation of international standards of virtual assets market regulation in Ukraine
Упровадження міжнародних стандартів регулювання ринку віртуальних активів в Україні

Tetyana DMYTRENKO, The Educational and Scientific Institute of the International Economics and Finance of the Interregional Academy of Personnel Management, Oleksandr LYUBICH, SESE "The Academy of Financial Management"
2020 Fìnansi Ukraïni  
The article also considers the current challenges of development and operation of the global crypto market and strategic planning of international cooperation in addressing these issues, as well as the  ...  Ministry of Digital Transformation of Ukraine to reduce threats to the use of virtual assets in the shadow economy, the development of fraud in cyberspace, cybercrime to develop a transparent civilized crypto  ...  Currencies included: BCH, BTC digging in, we see that nearly all of the funds collected by the top ransomware strains from 2013 through 2016 were cashed out at one exchange: russia-based BTC-e, which before  ... 
doi:10.33763/finukr2020.09.065 fatcat:j7koxcg6nnhg5du7xb5ayxtvzq
« Previous Showing results 1 — 15 out of 70 results