A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
MANiC: Multi-step Assessment for Crypto-miners
2019
2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)
Archive Poster, a popular Chrome extension, was running a crypto-miner on an unknown portion of their user base for several days, allegedly due to the credentials of a developer being stolen [11] . ...
Since keyword-based detection is vulnerable to obfuscation techniques, MineSweeper also checks for other indicators related to crypto-mining. ...
doi:10.1109/cybersecpods.2019.8885003
dblp:conf/cybersecpods/BurgessCOS19
fatcat:3d2s3cbmzfftbktkvubdxvmngm
Abstracts from the 2020 OAS Annual Meeting
2020
The Ohio journal of science
Cryptojacking is the unauthorized use of computers to mine cryptocurrency using malicious scripts. It emerged after 2017. ...
Board No. 61 -STRIP MINING HISTORY OF THE WILDS BASED ON NDVI ANALYSIS OF LANDSAT DATA. ...
doi:10.18061/ojs.v120i1.7574
fatcat:r3h6kaarevfmjkkg4k2zd35wk4
Blockchain Oracle Design Patterns
[article]
2021
arXiv
pre-print
We classify the blockchain oracle techniques into two major groups such as voting-based strategies and reputation-based ones. ...
Posters post the data on the chain, and this responsibility is shared among many Posters. ...
(e.g., sBTC), inverse cryptocurrencies, and cryptocurrency indexes [42] . ...
arXiv:2106.09349v1
fatcat:jcobgywz2zfgvfragre5qpolc4