Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (19)
  • Open Access

    ARTICLE

    Phishing Scam Detection on Ethereum via Mining Trading Information

    Yanyu Chen1, Zhangjie Fu1,2,*

    Journal of Cyber Security, Vol.4, No.3, pp. 189-200, 2022, DOI:10.32604/jcs.2022.038401

    Abstract As a typical representative of web 2.0, Ethereum has significantly boosted the development of blockchain finance. However, due to the anonymity and financial attributes of Ethereum, the number of phishing scams is increasing rapidly and causing massive losses, which poses a serious threat to blockchain financial security. Phishing scam address identification enables to detect phishing scam addresses and alerts users to reduce losses. However, there are three primary challenges in phishing scam address recognition task: 1) the lack of publicly available large datasets of phishing scam address transactions; 2) the use of multi-order transaction information requires a large number of… More >

  • Open Access

    ARTICLE

    Blockchain Merkle-Tree Ethereum Approach in Enterprise Multitenant Cloud Environment

    Pooja Dhiman1, Santosh Kumar Henge1, Sartaj Singh1, Avinash Kaur2, Parminder Singh2,3, Mustapha Hadabou3,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3297-3313, 2023, DOI:10.32604/cmc.2023.030558

    Abstract This research paper puts emphasis on using cloud computing with Blockchain (BC) to improve the security and privacy in a cloud. The security of data is not guaranteed as there is always a risk of leakage of users’ data. Blockchain can be used in a multi-tenant cloud environment (MTCE) to improve the security of data, as it is a decentralized approach. Data is saved in unaltered form. Also, Blockchain is not owned by a single organization. The encryption process can be done using a Homomorphic encryption (HE) algorithm along with hashing technique, hereby allowing computations on encrypted data without the… More >

  • Open Access

    ARTICLE

    Analyzing Ethereum Smart Contract Vulnerabilities at Scale Based on Inter-Contract Dependency

    Qiuyun Lyu1, Chenhao Ma1, Yanzhao Shen2, Shaopeng Jiao3, Yipeng Sun1, Liqin Hu1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.2, pp. 1625-1647, 2023, DOI:10.32604/cmes.2022.021562

    Abstract Smart contracts running on public blockchains are permissionless and decentralized, attracting both developers and malicious participants. Ethereum, the world’s largest decentralized application platform on which more than 40 million smart contracts are running, is frequently challenged by smart contract vulnerabilities. What’s worse, since the homogeneity of a wide range of smart contracts and the increase in inter-contract dependencies, a vulnerability in a certain smart contract could affect a large number of other contracts in Ethereum. However, little is known about how vulnerable contracts affect other on-chain contracts and which contracts can be affected. Thus, we first present the contract dependency… More >

  • Open Access

    ARTICLE

    Deep Learning Based Autonomous Transport System for Secure Vehicle and Cargo Matching

    T. Shanthi1,*, M. Ramprasath2, A. Kavitha3, T. Muruganantham4

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 957-969, 2023, DOI:10.32604/iasc.2023.027775

    Abstract The latest 6G improvements secured autonomous driving's realism in Intelligent Autonomous Transport Systems (IATS). Despite the IATS's benefits, security remains a significant challenge. Blockchain technology has grown in popularity as a means of implementing safe, dependable, and decentralised independent IATS systems, allowing for more utilisation of legacy IATS infrastructures and resources, which is especially advantageous for crowdsourcing technologies. Blockchain technology can be used to address security concerns in the IATS and to aid in logistics development. In light of the inadequacy of reliance and inattention to rights created by centralised and conventional logistics systems, this paper discusses the creation of… More >

  • Open Access

    ARTICLE

    Cost Efficient Scheduling Using Smart Contract Cognizant Ethereum for IoMT

    G. Ravikumar1, K. Venkatachalam2, Mehedi Masud3, Mohamed Abouhawwash4,5,*

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 865-877, 2022, DOI:10.32604/iasc.2022.024278

    Abstract Recently internet of medical things (IoMT) act as a smart doctor using sensor wearable’s device in human body. This smart doctor device senses necessary medical data from human and transfer via network immediately to physician. It is important to transfer sensitive data very securely. Blockchain becomes trending technology to provide high security to both end users in the network. Traditionally security structure is relying on cryptographic techniques which is very expensive and takes more time in securely transmitting data. To overcome this issue, this paper builds a cost effective, blockchain with IoMT using fog-cloud computing. The aim of research is… More >

  • Open Access

    ARTICLE

    ISmart: Protecting Smart Contract Against Integer Bugs

    Xingyu Zeng1, Hua Zhang1,*, Chaosong Yan2, Liu Zhao1, Qiaoyan Wen1

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 997-1008, 2022, DOI:10.32604/iasc.2022.022801

    Abstract Blockchain technology is known as a decentralized, distributed ledger that records digital asset. It has been applied in numbers of aspects of society, including finance, judiciary and commerce. Ethereum is referred to as the next generation decentralized application platform. It is one of the most popular blockchain platforms that supports smart contracts. Smart contract is a set of codes that sored on blockchain and can be called and created as turing-complete programs running on the blockchain. Developers use smart contracts to build decentralized applications (Dapp) which has widely used cryptocurrency related project. As smart contracts become more popular and more… More >

  • Open Access

    ARTICLE

    A Novel Cryptocurrency Prediction Method Using Optimum CNN

    Syed H. Hasan1, Syeda Huyam Hasan2, Mohammed Salih Ahmed3, Syed Hamid Hasan4,*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1051-1063, 2022, DOI:10.32604/cmc.2022.020823

    Abstract In recent years, cryptocurrency has become gradually more significant in economic regions worldwide. In cryptocurrencies, records are stored using a cryptographic algorithm. The main aim of this research was to develop an optimal solution for predicting the price of cryptocurrencies based on user opinions from social media. Twitter is used as a marketing tool for cryptoanalysis owing to the unrestricted conversations on cryptocurrencies that take place on social media channels. Therefore, this work focuses on extracting Tweets and gathering data from different sources to classify them into positive, negative, and neutral categories, and further examining the correlations between cryptocurrency movements… More >

  • Open Access

    ARTICLE

    An Adversarial Smart Contract Honeypot in Ethereum

    Yu Han1, Tiantian Ji1, Zhongru Wang1,2,*, Hao Liu3,*, Hai Jiang4, Wendi Wang1, Xiang Cui5

    CMES-Computer Modeling in Engineering & Sciences, Vol.128, No.1, pp. 247-267, 2021, DOI:10.32604/cmes.2021.015809

    Abstract A smart contract honeypot is a special type of smart contract. This type of contract seems to have obvious vulnerabilities in contract design. If a user transfers a certain amount of funds to the contract, then the user can withdraw the funds in the contract. However, once users try to take advantage of this seemingly obvious vulnerability, they will fall into a real trap. Consequently, the user’s investment in the contract cannot be retrieved. The honeypot induces other accounts to launch funds, which seriously threatens the security of property on the blockchain. Detection methods for honeypots are available. However, studying… More >

  • Open Access

    ARTICLE

    Computational Intelligence Approach for Municipal Council Elections Using Blockchain

    Fatmah Baothman*, Kawther Saeedi, Khulood Aljuhani, Safaa Alkatheri, Mashael Almeatani, Nourah Alothman

    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 625-639, 2021, DOI:10.32604/iasc.2021.014827

    Abstract Blockchain is an innovative technology that disrupts different industries and offers decentralized, secure, and immutable platforms. Its first appearance is connected with monetary cryptocurrency transactions, followed by adaptation in several domains. We believe that blockchain can provide a reliable environment by utilizing its unique characteristics to offer a more secure, costless, and robust mechanism suitable for a voting application. Although the technology has captured the interest of governments worldwide, blockchain as a service is still limited due to lack of application development experience, technology complexity, and absence of standardized design, architecture, and best practices. Therefore, this study aims to build… More >

Displaying 11-20 on page 2 of 19. Per Page