Blockchain technology in the healthcare sector: overview and security analysis

N El Madhoun, B Hammi - 2024 IEEE 14th annual computing …, 2024 - ieeexplore.ieee.org
Today, the healthcare sector is suffering from multiple security vulnerabilities that make it
vulnerable to various types of cyberattacks. Therefore, robust security solutions need to be …

A Blockchain Framework for Efficient Resource Allocation in Edge Computing

G Baranwal, D Kumar, A Biswas… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Edge computing provides low-latency computing services. Since Edge computing Service
Providers (ESPs) are competitors, mutual distrust and distrust towards the platform may exist …

Security Challenges and Countermeasures in Blockchain's Peer-to-Peer Architecture

H Kazem, N El Madhoun, S Bouzefrane… - … on Information Security …, 2024 - Springer
This paper addresses the issue of security in blockchain systems, with a focus on attacks
targeting the peer-to-peer architecture. The peer-to-peer nature of blockchain is fundamental …

NestedChain:“Blockchain-inside-a-Blockchain” new generation prototype

D Maldonado-Ruiz, A Pulval-Dady, Y Shi… - Annals of …, 2024 - Springer
New developments of blockchain designs, for both research and commercial environments,
focus on improving security and energy consumption. Indeed, these implementations are …

Addressing Security Challenges in Copyright Management Applications: The Blockchain Perspective

N El Madhoun, B Hammi, S El Jaouhari… - International Conference …, 2024 - Springer
Today, the field of copyright management faces several security vulnerabilities, making it a
target for various types of rights violations, including piracy and unauthorized use of creative …

ANALISIS PENYERANGAN BRUTEFORCE TERHADAP SECURE SHELL (SSH) MENGGUNAKAN METODE PENETRATION TESTING

RA Febrian, Y Muhyidin, D Singasatia - Scientica: Jurnal Ilmiah …, 2024 - jurnal.kolibi.org
Penelitian ini bertujuan untuk menganalisis serangan bruteforce terhadap Secure Shell
(SSH) menggunakan alat Hydra. Serangan bruteforce merupakan ancaman serius bagi …