Cybersecurity challenges in blockchain technology: A sco** review

S Mahmood, M Chadhar… - Human Behavior and …, 2022 - Wiley Online Library
Blockchain technology (BCT) is an emerging technology. Cybersecurity challenges in BCT
are being explored to add greater value to business processes and reshape business …

[HTML][HTML] Models used to characterise blockchain features. A systematic literature review and bibliometric analysis

JJ Rico-Pena, R Arguedas-Sanz, C Lopez-Martin - Technovation, 2023 - Elsevier
Blockchain has emerged as an innovative technology with potential to transform business
management, through operational efficiency improvements. Nevertheless, several …

Cybersecurity risk management framework for blockchain identity management systems in health IoT

B Alamri, K Crowley, I Richardson - Sensors, 2022 - mdpi.com
Blockchain (BC) has recently paved the way for develo** Decentralized Identity
Management (IdM) systems for different information systems. Researchers widely use it to …

A mechanism to detect and prevent Ethereum blockchain smart contract reentrancy attacks

A Alkhalifah, A Ng, PA Watters… - Frontiers in Computer …, 2021 - frontiersin.org
In Ethereum blockchain, smart contracts are immutable, public, and distributed. However,
they are subject to many vulnerabilities stemming from coding errors made by developers …

A taxonomy of endpoint vulnerabilities and affected blockchain architecture layers

MAF Noor, K Mustafa - Concurrency and Computation: Practice …, 2024 - Wiley Online Library
Blockchain technology has gained significant attention and adoption due to its decentralized
nature, and promising secure and immutable transactions. The interpretation of Blockchain's …

[PDF][PDF] Systematic review of ethereum smart contract security vulnerabilities, analysis methods and tools

H Rameder - PhD thesis, 2021 - academia.edu
Smart contracts deployed to the Ethereum blockchain hold billions of dollars worth of assets.
Ethereum currently represents the most widely used smart contract platform. It is the second …

[HTML][HTML] The cybersecurity mesh: A comprehensive survey of involved artificial intelligence methods, cryptographic protocols and challenges for future research

B Ramos-Cruz, J Andreu-Perez, L Martínez - Neurocomputing, 2024 - Elsevier
In today's world, it is vital to have strong cybersecurity measures in place. To combat the
ever-evolving threats, adopting advanced models like cybersecurity mesh is necessary to …

Security comparison of blockchain and cloud-based identity management: considering the scalability problem

E Qaqish, A Aranki, QA Al-Haija… - … Conference on Inventive …, 2023 - ieeexplore.ieee.org
Identity management (IdM) is used in every facet of our electronic society. The need for IdM
and the problems these systems face grow as our electronic identities grow and become …

Transactions Market in Bitcoin: Empirical Analysis of the Demand and Supply Block Space Curves

JJ Rico-Peña, R Arguedas-Sanz… - Computational …, 2024 - Springer
Blockchain transactions market is expected to gain momentum in the coming years, in a
context with gradual transition to fee-regime in many cryptocurrencies, the expansion of …

Cyber-physical blockchain based secure platforms for data and energy trading in multi-level electricity markets

H Chabok, A Moeini, I Kamwa - 2022 IEEE Canadian …, 2022 - ieeexplore.ieee.org
Despite all potential advantages of incorporating intelligence into power systems and
electricity market, there is growing opposition towards the idea of smart grids following the …