Blockchain technology as an enabler of consumer trust: A text mining literature analysis

CF da Silva, S Moro - Telematics and Informatics, 2021 - Elsevier
Blockchain (BC) technology is gaining momentum in a variety of application domains,
beyond finance. We present a text mining literature analysis of a body of published articles …

Distributed denial of service (DDoS) mitigation using blockchain—A comprehensive insight

S Wani, M Imthiyas, H Almohamedh, KM Alhamed… - Symmetry, 2021 - mdpi.com
Distributed Denial of Service (DDoS) attack is a major threat impeding service to legitimate
requests on any network. Although the first DDoS attack was reported in 1996, the …

RBT: A distributed reputation system for blockchain-based peer-to-peer energy trading with fairness consideration

T Wang, J Guo, S Ai, J Cao - Applied Energy, 2021 - Elsevier
It has been proved by recent works that reputation can help to improve the efficiency of
blockchain and enhance the fairness of energy trading markets. However, the application of …

Blockchain signaling system (BloSS): cooperative signaling of distributed denial-of-service attacks

B Rodrigues, E Scheid, C Killer, M Franco… - Journal of Network and …, 2020 - Springer
Abstract Distributed Denial-of-Service (DDoS) attacks are one of the major causes of
concerns for communication service providers. When an attack is highly sophisticated and …

Blockchain for securing aerial communications: Potentials, solutions, and research directions

RL Kumar, QV Pham, F Khan, MJ Piran, K Dev - Physical Communication, 2021 - Elsevier
Most natural disasters are consequences of hurricanes, floods, volcano eruptions, and
earthquakes, and can severely disturb traditional communications networks and interrupt …

An efficient and robust committee structure for sharding blockchain

M Zhang, J Li, Z Chen, H Chen… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Nowadays, sharding is deemed a promising way to save traditional blockchain protocols
from their low scalability. However, such a technique also brings several potential risks and …

Cyber threat intelligence sharing for co-operative defense in multi-domain entities

S Purohit, R Neupane, NR Bhamidipati… - … on Dependable and …, 2022 - ieeexplore.ieee.org
Cloud-hosted applications are prone to targeted attacks such as DDoS, advanced persistent
threats, Cryptojacking which threaten service availability. Recently, methods for threat …

Worm computing: A blockchain-based resource sharing and cybersecurity framework

L Shi, X Li, Z Gao, P Duan, N Liu, H Chen - Journal of Network and …, 2021 - Elsevier
Recently, the rapid growth of network resources and the cybersecurity issues become more
and more rigorous due to the rapid progress of Internet of Things (IoTs). How to integrate the …

Defensechain: Consortium blockchain for cyber threat intelligence sharing and defense

S Purohit, P Calyam, S Wang… - … 2nd Conference on …, 2020 - ieeexplore.ieee.org
Cloud-hosted applications are prone to targeted attacks such as DDoS, advanced persistent
threats, cryptojacking which threaten service availability. Recently, methods for threat …

Reputation-based blockchain for spatial crowdsourcing in vehicular networks

W Guo, Z Chang, Y Su, X Guo, T Hämäläinen, J Li… - Applied Sciences, 2022 - mdpi.com
The sharing of high-quality traffic information plays a crucial role in enhancing the driving
experience and safety performance for vehicular networks, especially in the development of …