An anomaly detection on blockchain infrastructure using artificial intelligence techniques: Challenges and future directions–A review

V Chithanuru, M Ramaiah - Concurrency and Computation …, 2023 - Wiley Online Library
Recently, Blockchain cryptographic distributed transaction ledger technology finds its usage
in many applications. The application's ledgers implemented through Blockchain, ensures …

Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology

AS Chandran - International Journal of Information Security and …, 2022 - igi-global.com
A huge amount of data has been generated every day across the world by organizations
with the emergence of the World Wide Web, social networks, along with e-commerce …

[PDF][PDF] Network Performance of Proxy-Enabled Server Using Three Configurations

JLB Wenceslao, RB Wenceslao - Indian Journal …, 2022 - sciresol.s3.us-east-2.amazonaws …
Background: This study aimed to test the mean network performance of the proxy server
from the Out-Of-The-Box (OOTB), caching, filtering, and bandwidth allocation configurations …

Internet Censorship: An Integrative Review of Technologies Employed to Limit Access to the Internet, Monitor User Actions, and their Effects on Culture

J Hyland - 2020 - digitalcommons.liberty.edu
The following conducts an integrative review of the current state of Internet Censorship in
China, Iran, and Russia, highlights common circumvention technologies (CTs), and …

[PDF][PDF] SISTEM KEAMANAN JARINGAN KOMPUTER MENGGUNAKAN PROXY SERVER DENGAN METODE ASSESSMENT & HARDENING

BA Saputra, TD Anggrainy - academia.edu
Banyak jenis gangguan pada sistem keamanan jaringan salah satu contohnya ransomware
yang terkenal pada tahun 2019 lalu. Enkripsi ransomware adalah malware yang …