Block hunter: Federated learning for cyber threat hunting in blockchain-based iiot networks
Nowadays, blockchain-based technologies are being developed in various industries to
improve data security. In the context of the Industrial Internet of Things (IIoT), a chain-based …
improve data security. In the context of the Industrial Internet of Things (IIoT), a chain-based …
Applicability of intrusion detection system on Ethereum attacks: a comprehensive review
For many reasons, Ethereum attracts more investors, researchers, and even scammers; this
is the first platform that enables the new Decentralized Applications (DApps) to run on top of …
is the first platform that enables the new Decentralized Applications (DApps) to run on top of …
Abnormal transactions detection in the ethereum network using semi-supervised generative adversarial networks
Numerous abnormal transactions have been exposed as a result of targeted attacks on
Ethereum, such as the Ethereum Decentralized Autonomous Organization attack. Exploiting …
Ethereum, such as the Ethereum Decentralized Autonomous Organization attack. Exploiting …
The Proof of Authority Consensus Algorithm for IIoT Security
Blockchain-based technologies have been created across a range of businesses for
improving data security and integrity. A network chain is the most remarkable blockchain …
improving data security and integrity. A network chain is the most remarkable blockchain …
[PDF][PDF] Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review
S MANICKAM, TA AL-AMIEDY, PB CRUSPE - researchgate.net
For many reasons, Ethereum attracts more investors, researchers, and even scammers; this
is the first platform that enables the new Decentralized Applications (DApps) to run on top of …
is the first platform that enables the new Decentralized Applications (DApps) to run on top of …
Block Hunter Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks
A NAGARAJU, PC TEJA - International Journal of Information Technology …, 2024 - ijitce.org
Nowadays, blockchain-based technologies are being developed in various industries to
improve data security. In the context of the Industrial Internet of Things (IIoT), a chain-based …
improve data security. In the context of the Industrial Internet of Things (IIoT), a chain-based …
[PDF][PDF] BLOCK HUNTER FEDERATED LEARNING FOR CYBER THREAT HUNTING IN BLOCKCHAIN-BASED IIOT NETWORKS
MK Manjula, M Shruthi, B Srujana, B Anurvini… - International Journal of …, 2023 - ijerst.org
Nowadays, blockchain-based technologies are being developed in various industries to
improve data security. In the context of the Industrial Internet of Things (IIoT), a chain-based …
improve data security. In the context of the Industrial Internet of Things (IIoT), a chain-based …
[PDF][PDF] CYBER THREAD PREDICTION IN SMART FACTORIES
A Satyanarayana - ijte.uk
Nowadays, blockchain-based technologies are being developed in various industries to
improve data security. In the context of the Industrial Internet of Things (IIoT), a chain-based …
improve data security. In the context of the Industrial Internet of Things (IIoT), a chain-based …
[PDF][PDF] Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks
GJD Sri, KR Rajeswari - ijarst.in
Nowadays, blockchain-based technologies are being developed in various industries to
improve data security. In the context of the Industrial Internet of Things (IoT), a chain-based …
improve data security. In the context of the Industrial Internet of Things (IoT), a chain-based …