[HTML][HTML] Microservice security: a systematic literature review

D Berardi, S Giallorenzo, J Mauro, A Melis… - PeerJ Computer …, 2022 - peerj.com
Microservices is an emerging paradigm for developing distributed systems. With their
widespread adoption, more and more work investigated the relation between microservices …

Green-PoW: An energy-efficient blockchain Proof-of-Work consensus algorithm

N Lasla, L Al-Sahan, M Abdallah, M Younis - Computer Networks, 2022 - Elsevier
This paper opts to mitigate the energy-inefficiency of the Blockchain Proof-of-Work (PoW)
consensus algorithm by rationally repurposing the power spent during the mining process …

[图书][B] New dimensions of information warfare

R Di Pietro, S Raponi, M Caprolu, S Cresci, R Di Pietro… - 2021 - Springer
Since the dawn of Humanity, the progress machine tirelessly introduced tools and resources
that facilitated our everyday tasks. Over the years, new technologies have continually …

Analysis of polkadot: Architecture, internals, and contradictions

H Abbas, M Caprolu, R Di Pietro - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Polkadot is a network protocol launched in 2020 with the ambition of unlocking the full
potential of blockchain technologies. Its novel multi-chain protocol allows arbitrary data to be …

[HTML][HTML] Cryptomining makes noise: Detecting cryptojacking via machine learning

M Caprolu, S Raponi, G Oligeri, R Di Pietro - Computer Communications, 2021 - Elsevier
Cryptojacking occurs when an adversary illicitly runs crypto-mining software over the
devices of unaware users. This novel cybersecurity attack, that is emerging in both the …

Bad: blockchain anomaly detection

M Signorini, M Pontecorvi, W Kanoun… - arXiv preprint arXiv …, 2018 - arxiv.org
Anomaly detection tools play a role of paramount importance in protecting networks and
systems from unforeseen attacks, usually by automatically recognizing and filtering out …

BAD: A blockchain anomaly detection solution

M Signorini, M Pontecorvi, W Kanoun… - IEEE Access, 2020 - ieeexplore.ieee.org
Anomaly detection tools play a role of paramount importance in protecting networks and
systems from unforeseen attacks, usually by automatically recognizing and filtering out …

UBIC-A Blockchain-Less Cryptocurrency

M Caprolu, E Bentafat, S Bakiras… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
In this paper we propose UBIC, a novel blockchain-less architecture that preserves the main
advantages of classic cryptocurrencies while avoiding their pitfalls. The proposed …

Pured: a unified framework for resource-hard functions

A Biryukov, M Lombard-Platet - International Conference on Cryptology in …, 2023 - Springer
Algorithm hardness can be described by 5 categories: hardness in computation, in
sequential computation, in memory, in energy consumption (or bandwidth), in code size …

Analysis and patterns of unknown transactions in bitcoin

M Caprolu, M Pontecorvi, M Signorini… - 2021 IEEE …, 2021 - ieeexplore.ieee.org
Bitcoin (BTC) is probably the most transparent payment network in the world, thanks to the
full history of transactions available to the public. Though, Bitcoin is not a fully anonymous …