A survey on ethereum pseudonymity: Techniques, challenges, and future directions

S Jamwal, J Cano, GM Lee, NH Tran… - Journal of Network and …, 2024 - Elsevier
Blockchain technology has emerged as a transformative force in various sectors, including
finance, healthcare, supply chains, and intellectual property management. Beyond Bitcoin's …

Enhancing smart-contract security through machine learning: A survey of approaches and techniques

F Jiang, K Chao, J Xiao, Q Liu, K Gu, J Wu, Y Cao - Electronics, 2023 - mdpi.com
As blockchain technology continues to advance, smart contracts, a core component, have
increasingly garnered widespread attention. Nevertheless, security concerns associated …

Eth-PSD: A machine learning-based phishing scam detection approach in ethereum

AHH Kabla, M Anbar, S Manickam, S Karupayah - IEEE Access, 2022 - ieeexplore.ieee.org
Recently, the rapid flourish of blockchain technology in the financial field has attracted many
cybercriminals' attention to launching blockchain-based attacks such as ponzi schemes …

Abnormal transactions detection in the ethereum network using semi-supervised generative adversarial networks

YK Sanjalawe, SR Al-E'mari - IEEE Access, 2023 - ieeexplore.ieee.org
Numerous abnormal transactions have been exposed as a result of targeted attacks on
Ethereum, such as the Ethereum Decentralized Autonomous Organization attack. Exploiting …

Peerambush: Multi-layer perceptron to detect peer-to-peer botnet

AHH Kabla, AH Thamrin, M Anbar, S Manickam… - Symmetry, 2022 - mdpi.com
Due to emerging internet technologies that mostly depend on the decentralization concept,
such as cryptocurrencies, cyber attackers also use the decentralization concept to develop …

Transaction latency within permissionless blockchains: analysis, improvement, and security considerations

M Alharby - Journal of Network and Systems Management, 2023 - Springer
Permissionless blockchains such as Ethereum offer decentralization and security. However,
their performance is low compared to permissioned and traditional centralized systems …

Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection

AHH Kabla, AH Thamrin, M Anbar, S Manickam… - EURASIP Journal on …, 2024 - Springer
The orientation of emerging technologies on the Internet is moving toward decentralisation.
Botnets have always been one of the biggest threats to Internet security, and botmasters …

Blockchain security enhancement through cybersecurity: A response to attacks with countermeasures

C Mulambia, S Varshney, A Suman - Ensuring Security and End-to …, 2024 - igi-global.com
Defending blockchain technology from cyber dangers is essential in today's age of
advances in technology and also increase in usage of Blockchain Technology. Due to the …

[PDF][PDF] Feature Selection and 1DCNN-based DDOS Detection in Software-Defined Networking.

N Almi'ani, M Anbar, S Karuppayah… - Engineering …, 2024 - engineeringletters.com
Software-defined networking (SDN) revolutionizes network management by offering
centralized control over complex infrastructures, but it also introduces significant security …

[图书][B] Anomaly detection in cryptocurrency networks and beyond

FR Poursafaei - 2022 - search.proquest.com
Cryptocurrency networks that provide a new way of securing financial transactions have
gained a surge of interest in recent years. However, recent studies reveal that blockchain …