V. V. Nosov, O. V. Manzhai & V. O. Kovtun. (2023) Technical, forensic and organisational aspects of work with Monero cryptocurrency. Law and Safety 90:3, pages 102-125.
Crossref
Ajithakumari Vijayappan Nair Biju & Ann Susan Thomas. (2023) Uncertainties and ambivalence in the crypto market: an urgent need for a regional crypto regulation. SN Business & Economics 3:8.
Crossref
Silvino Santos, Paulo Costa & Agostinho Rocha. (2023) IT/OT Convergence in Industry 4.0 : Risks and Analisy of the Problems. IT/OT Convergence in Industry 4.0 : Risks and Analisy of the Problems.
Alper Yayla, Ersin Dincelli & Srikanth Parameswaran. (2023) A Mining Town in a Digital Land: Browser-Based Cryptocurrency Mining as an Alternative to Online Advertising. Information Systems Frontiers.
Crossref
Priyank Patel, Ashwini Dalvi & Irfan Sidddavatam. (2022) Exploiting Honeypot for Cryptojacking: The other side of the story of honeypot deployment. Exploiting Honeypot for Cryptojacking: The other side of the story of honeypot deployment.
Rui Zheng, Qiuyun Wang, Jia He, Jianming Fu, Guga Suri & Zhengwei Jiang. (2022) Cryptocurrency Mining Malware Detection Based on Behavior Pattern and Graph Neural Network. Security and Communication Networks 2022, pages 1-8.
Crossref
Suraj Gangwar & Vinayak Narang. 2022. Research Anthology on Combating Cyber-Aggression and Online Negativity. Research Anthology on Combating Cyber-Aggression and Online Negativity
1583
1595
.
Aleksandr Chernigovskiy & Maksim Krivov. (2022) THE PROBLEM OF MINING IN THE BUSINESS ENVIRONMENT. Bulletin of the Angarsk State Technical University 1:15, pages 122-126.
Crossref
Ahmad Moawad, Ahmed Ismail Ebada & Aya M. Al-Zoghby. (2022) A Survey on Visualization-Based Malware Detection. Journal of Cyber Security 4:3, pages 169-184.
Crossref
Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda & Ali Aydin Selcuk. (2021) SoK: Cryptojacking Malware. SoK: Cryptojacking Malware.
Rupesh Raj Karn, Prabhakar Kudva, Hai Huang, Sahil Suneja & Ibrahim M. Elfadel. (2021) Cryptomining Detection in Container Clouds Using System Calls and Explainable Machine Learning. IEEE Transactions on Parallel and Distributed Systems 32:3, pages 674-691.
Crossref
Philippe Jougleux. 2021. EU Internet Law in the Digital Single Market. EU Internet Law in the Digital Single Market
339
354
.
Halyna Klym & Ivanna Vasylchyshyn. (2020) Biometric System of Access to Information Resources. Biometric System of Access to Information Resources.
Ganapathy Mani, Vikram Pasumarti, Bharat Bhargava, Faisal Tariq Vora, James MacDonald, Justin King & Jason Kobes. (2020) DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters. DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters.
Hamid Darabian, Sajad Homayounoot, Ali Dehghantanha, Sattar Hashemi, Hadis Karimipour, Reza M. Parizi & Kim-Kwang Raymond Choo. (2020) Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis. Journal of Grid Computing 18:2, pages 293-303.
Crossref
Suraj Gangwar & Vinayak Narang. 2020. Encyclopedia of Criminal Activities and the Deep Web. Encyclopedia of Criminal Activities and the Deep Web
23
35
.
Carmel Eliash, Isaac Lazar & Nir Nissim. (2020) SEC-C-U: The Security of Intensive Care Unit Medical Devices and Their Ecosystems. IEEE Access 8, pages 64193-64224.
Crossref