Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions

A Singh, BB Gupta - International Journal on Semantic Web and …, 2022 - igi-global.com
The demand for Internet security has escalated in the last two decades because the rapid
proliferation in the number of Internet users has presented attackers with new detrimental …

Attacks and countermeasures on blockchains: A survey from layering perspective

Y Wen, F Lu, Y Liu, X Huang - Computer Networks, 2021 - Elsevier
Blockchain is an emerging technology with the characteristics of decentralization and
transparency and has received extensive attention and in-depth research for the past few …

A Tree-Mapped Taxonomy of Blockchain Attacks

E Lubes, JM Pelletier - 2023 7th Cyber Security in Networking …, 2023 - ieeexplore.ieee.org
Blockchains provide decentralized data storage and have gained popularity over the past
decade. Their popularity has led to a multitude of attacks in research and practice. We …

The Detection of SQL Injection on Blockchain-Based Database

K Sinha, M Verma - … Applications of Blockchain-Enabled Privacy and …, 2021 - igi-global.com
In today's world, the storage of data needs a huge amount of space. Meanwhile, cloud and
distributed environments provide sufficient storage space for the data. One of the …

Automated Detection of SQL Injection Attack on Blockchain-Based Database

K Sinha, AK Keshari - Handbook of Research on Library Response …, 2021 - igi-global.com
In the era of computing, where the data are stored in a cloud or distributed environment, the
privacy of data is one of the challenging tasks. The attacks like denial of service attacks …

BitTrace: A Data-Driven Framework for Traceability of Blockchain Forming in Bitcoin System

J Wu, J Zhang, L Pan - International Journal of Information …, 2024 - igi-global.com
Bitcoin is a digital currency system built on the foundation of fairness. However, some
malicious miners, driven by their own interests, employ unfair tactics such as selfish mining …

A Comprehensive Overview of Security and Privacy in the 6G Era

S Zaman, F Tariq, M Khandaker, RT Khan - 6G Wireless, 2023 - taylorfrancis.com
Cognitive security and privacy management are required to address the vulnerabilities of 6G
networks. This chapter demonstrates a brief discussion of various potential attacks/threats in …

[PDF][PDF] A Hundred Attacks in Distributed Systems

A Vaezi, S Azarnoush, P Mohammadian - 2022 - hal.science
The objective of any security system is the capacity to keep a secret. It is vital to keep the
data secret when it is stored as well as when it is sent over a network. Nowadays, many …

BitTrace: A Data-Driven Framework for Traceability of Blockchain Forming in Bitcoin System

J Zhang, L Pan, J Wu - International Journal of Information …, 2024 - search.proquest.com
Bitcoin is a digital currency system built on the foundation of fairness. However, some
malicious miners, driven by their own interests, employ unfair tactics such as selfish mining …

Decentralized Identity and Password Authentication System based on Block Chain

Z Yun, C Chao, W Haoling, L Tao… - 2022 IEEE 4th …, 2022 - ieeexplore.ieee.org
The most widely used user authentication method on the Internet is abstract password
authentication, That is to say, the user and his name-password to each server established …