Results 51 to 60 of about 49,196 (298)

Axiomatization of Blockchain Theory

open access: yesMathematics, 2023
The increasing use of artificial intelligence algorithms, smart contracts, the internet of things, cryptocurrencies, and digital money highlights the need for secure and sustainable decentralized solutions.
Sergey Goncharov, Andrey Nechesov
doaj   +1 more source

How Effective are Smart Contract Analysis Tools? Evaluating Smart Contract Static Analysis Tools Using Bug Injection

open access: yes, 2020
Security attacks targeting smart contracts have been on the rise, which have led to financial loss and erosion of trust. Therefore, it is important to enable developers to discover security vulnerabilities in smart contracts before deployment.
Akca Sefa   +9 more
core   +1 more source

An Ethereum-Based Distributed Application for Enhancing Food Supply Chain Traceability

open access: yesFoods, 2023
In today’s era, humanity has been overwhelmed by technological revolutions that have changed and will continue to change how business operations are performed, directly or indirectly.
E. Kechagias   +3 more
semanticscholar   +1 more source

Can the major cryptocurrencies be used as a portfolio diversifier?: Analysis of the relationship between Bitcoin, Ethereum, and global financial asset classes

open access: yesEkonomski Vjesnik
Purpose: It can be stated that in today’s competitive conditions, where portfolio management is very important, it has become necessary to examine the relationship between global financial assets and major cryptocurrencies, such as Bitcoin and Ethereum ...
Kübra Saka Ilgin
doaj   +1 more source

Survey on Ethereum phishing detection technology

open access: yes网络与信息安全学报, 2023
With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high ...
Zhao CAI, Tao JING, Shuang REN
doaj   +1 more source

Predicting Cryptocurrency Fraud Using ChaosNet: The Ethereum Manifestation

open access: yesJournal of Risk and Financial Management, 2023
Cryptocurrencies are in high demand now due to their volatile and untraceable nature. Bitcoin, Ethereum, and Dogecoin are just a few examples. This research seeks to identify deception and probable fraud in Ethereum transactional processes.
Anurag Dutta   +4 more
semanticscholar   +1 more source

Digital Rights Activism in Multilevel Governance

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT Multilevel governance (MLG) without a clear hierarchical structure can create power imbalances among various actors, particularly in settings with overlapping jurisdictions and policy areas. This dynamic is especially pronounced in Internet governance, which faces a complex interplay of domestic laws, state interdependence, and heightened ...
Alison Harcourt
wiley   +1 more source

Adaptive multi-channel Bayesian graph attention network for IoT transaction security

open access: yesDigital Communications and Networks
With the rapid advancement of 5G technology, the Internet of Things (IoT) has entered a new phase of applications and is rapidly becoming a significant force in promoting economic development.
Zhaowei Liu   +3 more
doaj   +1 more source

Practical Limitations of Ethereum’s Layer-2

open access: yesIEEE Access, 2023
Most permissionless blockchains inherently suffer from throughput limitations. Layer-2 systems, such as side-chains or Rollups, have been proposed as a possible strategy to overcome this limitation.
Ray Neiheiser   +5 more
semanticscholar   +1 more source

When the Tail Wags the Dog: A Time‐Varying FCVAR Analysis of Bitcoin Market

open access: yesJournal of Futures Markets, EarlyView.
ABSTRACT This paper examines how the relationship between Bitcoin spot and futures markets has evolved using a time‐varying Fractionally Cointegrated Vector Autoregressive (FCVAR) model. We are the first to apply this methodology dynamically to cryptocurrency markets, allowing us to simultaneously analyze long‐run equilibrium, pricing patterns, market ...
Filippo di Pietro   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy