A survey on ethereum pseudonymity: Techniques, challenges, and future directions

S Jamwal, J Cano, GM Lee, NH Tran… - Journal of Network and …, 2024 - Elsevier
Blockchain technology has emerged as a transformative force in various sectors, including
finance, healthcare, supply chains, and intellectual property management. Beyond Bitcoin's …

Enhancing smart-contract security through machine learning: A survey of approaches and techniques

F Jiang, K Chao, J **ao, Q Liu, K Gu, J Wu, Y Cao - Electronics, 2023 - mdpi.com
As blockchain technology continues to advance, smart contracts, a core component, have
increasingly garnered widespread attention. Nevertheless, security concerns associated …

Eth-PSD: A machine learning-based phishing scam detection approach in ethereum

AHH Kabla, M Anbar, S Manickam, S Karupayah - Ieee Access, 2022 - ieeexplore.ieee.org
Recently, the rapid flourish of blockchain technology in the financial field has attracted many
cybercriminals' attention to launching blockchain-based attacks such as ponzi schemes …

Abnormal transactions detection in the ethereum network using semi-supervised generative adversarial networks

YK Sanjalawe, SR Al-E'mari - IEEE Access, 2023 - ieeexplore.ieee.org
Numerous abnormal transactions have been exposed as a result of targeted attacks on
Ethereum, such as the Ethereum Decentralized Autonomous Organization attack. Exploiting …

Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection

AHH Kabla, AH Thamrin, M Anbar, S Manickam… - EURASIP Journal on …, 2024 - Springer
The orientation of emerging technologies on the Internet is moving toward decentralisation.
Botnets have always been one of the biggest threats to Internet security, and botmasters …

[HTML][HTML] Peerambush: Multi-layer perceptron to detect peer-to-peer botnet

AHH Kabla, AH Thamrin, M Anbar, S Manickam… - Symmetry, 2022 - mdpi.com
Due to emerging internet technologies that mostly depend on the decentralization concept,
such as cryptocurrencies, cyber attackers also use the decentralization concept to develop …

Transaction latency within permissionless blockchains: analysis, improvement, and security considerations

M Alharby - Journal of Network and Systems Management, 2023 - Springer
Permissionless blockchains such as Ethereum offer decentralization and security. However,
their performance is low compared to permissioned and traditional centralized systems …

Tikuna: An Ethereum blockchain network security monitoring system

A Gomez Ramirez, L Al Sardy… - … Conference on Information …, 2023 - Springer
Blockchain security is becoming increasingly relevant in today's cyberspace as it extends its
influence in many industries. This paper focuses on protecting the lowest level layer in the …

[PDF][PDF] Monitoring Peer-to-Peer Botnets: Requirements, Challenges, and Future Works

AHH Kabla, M Anbar, S Manickam… - CMC-COMPUTERS …, 2023 - researchgate.net
The cyber-criminal compromises end-hosts (bots) to configure a network of bots (botnet).
The cyber-criminals are also looking for an evolved architecture that makes their techniques …

Blockchain security enhancement through cybersecurity: A response to attacks with countermeasures

C Mulambia, S Varshney, A Suman - Ensuring Security and End-to …, 2024 - igi-global.com
Defending blockchain technology from cyber dangers is essential in today's age of
advances in technology and also increase in usage of Blockchain Technology. Due to the …