Cybersecurity challenges in blockchain technology: A scoping review

S Mahmood, M Chadhar… - Human Behavior and …, 2022 - Wiley Online Library
Blockchain technology (BCT) is an emerging technology. Cybersecurity challenges in BCT
are being explored to add greater value to business processes and reshape business …

[HTML][HTML] Models used to characterise blockchain features. A systematic literature review and bibliometric analysis

JJ Rico-Pena, R Arguedas-Sanz, C Lopez-Martin - Technovation, 2023 - Elsevier
Blockchain has emerged as an innovative technology with potential to transform business
management, through operational efficiency improvements. Nevertheless, several …

Cybersecurity risk management framework for blockchain identity management systems in health IoT

B Alamri, K Crowley, I Richardson - Sensors, 2022 - mdpi.com
Blockchain (BC) has recently paved the way for developing Decentralized Identity
Management (IdM) systems for different information systems. Researchers widely use it to …

A mechanism to detect and prevent Ethereum blockchain smart contract reentrancy attacks

A Alkhalifah, A Ng, PA Watters… - Frontiers in Computer …, 2021 - frontiersin.org
In Ethereum blockchain, smart contracts are immutable, public, and distributed. However,
they are subject to many vulnerabilities stemming from coding errors made by developers …

[PDF][PDF] Systematic review of ethereum smart contract security vulnerabilities, analysis methods and tools

H Rameder - PhD thesis, 2021 - academia.edu
Smart contracts deployed to the Ethereum blockchain hold billions of dollars worth of assets.
Ethereum currently represents the most widely used smart contract platform. It is the second …

[HTML][HTML] The cybersecurity mesh: A comprehensive survey of involved artificial intelligence methods, cryptographic protocols and challenges for future research

B Ramos-Cruz, J Andreu-Perez, L Martínez - Neurocomputing, 2024 - Elsevier
In today's world, it is vital to have strong cybersecurity measures in place. To combat the
ever-evolving threats, adopting advanced models like cybersecurity mesh is necessary to …

Security comparison of blockchain and cloud-based identity management: considering the scalability problem

E Qaqish, A Aranki, QA Al-Haija… - … Conference on Inventive …, 2023 - ieeexplore.ieee.org
Identity management (IdM) is used in every facet of our electronic society. The need for IdM
and the problems these systems face grow as our electronic identities grow and become …

Cyber-physical blockchain based secure platforms for data and energy trading in multi-level electricity markets

H Chabok, A Moeini, I Kamwa - 2022 IEEE Canadian …, 2022 - ieeexplore.ieee.org
Despite all potential advantages of incorporating intelligence into power systems and
electricity market, there is growing opposition towards the idea of smart grids following the …

Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports

MR Rahman, SK Basak, RM Hezaveh… - arXiv preprint arXiv …, 2024 - arxiv.org
Context: Cybersecurity vendors often publish cyber threat intelligence (CTI) reports, referring
to the written artifacts on technical and forensic analysis of the techniques used by the …

A Tree-Mapped Taxonomy of Blockchain Attacks

E Lubes, JM Pelletier - 2023 7th Cyber Security in Networking …, 2023 - ieeexplore.ieee.org
Blockchains provide decentralized data storage and have gained popularity over the past
decade. Their popularity has led to a multitude of attacks in research and practice. We …