The adoption of decentralized, tamper-proof ledger systems is paving the...
Several blockchain consensus protocols proposed to use of Directed Acycl...
In this paper, we review the undercutting attacks in the
transaction-fee...
This work focuses on the problem of detection and prevention of stolen a...
Decentralized electronic voting solutions represent a promising advancem...
In response to the bottleneck of processing throughput inherent to singl...
Elections are commonly repeated over longer and fixed intervals of time,...
Voting is a means to agree on a collective decision based on available
c...
A crucial technical challenge for cybercriminals is to keep control over...
Cryptocurrencies have become very popular in recent years. Thousands of ...
Distributed ledger systems (i.e., blockchains) have received a lot of
at...
In this paper, we present three datasets that have been built from netwo...
Due to their specific features, such as decentralization and immutabilit...
Since it takes time and effort to put a new product or service on the ma...
Mouse dynamics is a potential means of authenticating users. Typically, ...
Bitcoin is the most successful cryptocurrency so far. This is mainly due...
Internet of Things (IoT) devices have become ubiquitous and are spread a...
Due to their interesting features, blockchains have become popular in re...
With the recent rise of cryptocurrencies, the security and management of...
Machine-learning based intrusion detection classifiers are able to detec...
Insider threats are one of today's most challenging cybersecurity issues...