1,712
Views
19
CrossRef citations to date
0
Altmetric
Research Article

Crypto Mining Attacks in Information Systems: An Emerging Threat to Cyber Security

ORCID Icon, , &

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (2)

Obi Ogbanufe, Jordan Wolfe & Fallon Baucum. (2023) Towards a Conceptual Typology of Darknet Risks. Journal of Computer Information Systems 0:0, pages 1-12.
Read now
Efpraxia Zamani, Ying He & Matthew Phillips. (2020) On the Security Risks of the Blockchain. Journal of Computer Information Systems 60:6, pages 495-506.
Read now

Articles from other publishers (17)

V. V. Nosov, O. V. Manzhai & V. O. Kovtun. (2023) Technical, forensic and organisational aspects of work with Monero cryptocurrency. Law and Safety 90:3, pages 102-125.
Crossref
Ajithakumari Vijayappan Nair Biju & Ann Susan Thomas. (2023) Uncertainties and ambivalence in the crypto market: an urgent need for a regional crypto regulation. SN Business & Economics 3:8.
Crossref
Silvino Santos, Paulo Costa & Agostinho Rocha. (2023) IT/OT Convergence in Industry 4.0 : Risks and Analisy of the Problems. IT/OT Convergence in Industry 4.0 : Risks and Analisy of the Problems.
Alper Yayla, Ersin Dincelli & Srikanth Parameswaran. (2023) A Mining Town in a Digital Land: Browser-Based Cryptocurrency Mining as an Alternative to Online Advertising. Information Systems Frontiers.
Crossref
Priyank Patel, Ashwini Dalvi & Irfan Sidddavatam. (2022) Exploiting Honeypot for Cryptojacking: The other side of the story of honeypot deployment. Exploiting Honeypot for Cryptojacking: The other side of the story of honeypot deployment.
Rui Zheng, Qiuyun Wang, Jia He, Jianming Fu, Guga Suri & Zhengwei Jiang. (2022) Cryptocurrency Mining Malware Detection Based on Behavior Pattern and Graph Neural Network. Security and Communication Networks 2022, pages 1-8.
Crossref
Suraj Gangwar & Vinayak Narang. 2022. Research Anthology on Combating Cyber-Aggression and Online Negativity. Research Anthology on Combating Cyber-Aggression and Online Negativity 1583 1595 .
Aleksandr Chernigovskiy & Maksim Krivov. (2022) THE PROBLEM OF MINING IN THE BUSINESS ENVIRONMENT. Bulletin of the Angarsk State Technical University 1:15, pages 122-126.
Crossref
Ahmad Moawad, Ahmed Ismail Ebada & Aya M. Al-Zoghby. (2022) A Survey on Visualization-Based Malware Detection. Journal of Cyber Security 4:3, pages 169-184.
Crossref
Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda & Ali Aydin Selcuk. (2021) SoK: Cryptojacking Malware. SoK: Cryptojacking Malware.
Rupesh Raj Karn, Prabhakar Kudva, Hai Huang, Sahil Suneja & Ibrahim M. Elfadel. (2021) Cryptomining Detection in Container Clouds Using System Calls and Explainable Machine Learning. IEEE Transactions on Parallel and Distributed Systems 32:3, pages 674-691.
Crossref
Philippe Jougleux. 2021. EU Internet Law in the Digital Single Market. EU Internet Law in the Digital Single Market 339 354 .
Halyna Klym & Ivanna Vasylchyshyn. (2020) Biometric System of Access to Information Resources. Biometric System of Access to Information Resources.
Ganapathy Mani, Vikram Pasumarti, Bharat Bhargava, Faisal Tariq Vora, James MacDonald, Justin King & Jason Kobes. (2020) DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters. DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters.
Hamid Darabian, Sajad Homayounoot, Ali Dehghantanha, Sattar Hashemi, Hadis Karimipour, Reza M. Parizi & Kim-Kwang Raymond Choo. (2020) Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis. Journal of Grid Computing 18:2, pages 293-303.
Crossref
Suraj Gangwar & Vinayak Narang. 2020. Encyclopedia of Criminal Activities and the Deep Web. Encyclopedia of Criminal Activities and the Deep Web 23 35 .
Carmel Eliash, Isaac Lazar & Nir Nissim. (2020) SEC-C-U: The Security of Intensive Care Unit Medical Devices and Their Ecosystems. IEEE Access 8, pages 64193-64224.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.