2021
DOI: 10.3390/electronics10172113
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: The Bitcoin cryptocurrency is a worldwide prevalent virtualized digital currency conceptualized in 2008 as a distributed transactions system. Bitcoin transactions make use of peer-to-peer network nodes without a third-party intermediary, and the transactions can be verified by the node. Although Bitcoin networks have exhibited high efficiency in the financial transaction systems, their payment transactions are vulnerable to several ransomware attacks. For that reason, investigators have been working on develop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
3

Relationship

5
5

Authors

Journals

citations
Cited by 34 publications
(9 citation statements)
references
References 30 publications
0
9
0
Order By: Relevance
“…Shuffling is basically redistributing the data points/records throughout several execution processes (or even through several computing machines). In this research, since we are about to train/test splitting, we performed a uniform shuffle at every epoch, which guarantees that every item has the same chance to occur at any position [32]. The data shuffling applied in this research is performed using the following procedure:…”
Section: Data Shuffling Process (Dsh)mentioning
confidence: 99%
“…Shuffling is basically redistributing the data points/records throughout several execution processes (or even through several computing machines). In this research, since we are about to train/test splitting, we performed a uniform shuffle at every epoch, which guarantees that every item has the same chance to occur at any position [32]. The data shuffling applied in this research is performed using the following procedure:…”
Section: Data Shuffling Process (Dsh)mentioning
confidence: 99%
“…The theory of the CIA triad model, which is the conditionality, integrity, and availability, can be used to measure the security level of a system [10]. Conditionality assures that data won't be accessed by unauthorized users, programs, or procedures.…”
Section: Figure 1 Replay Attack Targeting Keyless Systemmentioning
confidence: 99%
“…Cyberattacks usually are launched against the victim system to violate the major security services, such as confidentiality, integrity, and availability. Currently, cyberattacks are available in different forms such as ransomware, malware, adware, reconnaissance, denial of service, and others [ 47 , 48 ]. In this paper, we develop a cyberattacks detection system making use of efficient machine-learning techniques to provide an accurate, precise, and sensitive prediction process.…”
Section: System Modelingmentioning
confidence: 99%