Results 51 to 60 of about 49,196 (298)
Axiomatization of Blockchain Theory
The increasing use of artificial intelligence algorithms, smart contracts, the internet of things, cryptocurrencies, and digital money highlights the need for secure and sustainable decentralized solutions.
Sergey Goncharov, Andrey Nechesov
doaj +1 more source
Security attacks targeting smart contracts have been on the rise, which have led to financial loss and erosion of trust. Therefore, it is important to enable developers to discover security vulnerabilities in smart contracts before deployment.
Akca Sefa +9 more
core +1 more source
An Ethereum-Based Distributed Application for Enhancing Food Supply Chain Traceability
In today’s era, humanity has been overwhelmed by technological revolutions that have changed and will continue to change how business operations are performed, directly or indirectly.
E. Kechagias +3 more
semanticscholar +1 more source
Purpose: It can be stated that in today’s competitive conditions, where portfolio management is very important, it has become necessary to examine the relationship between global financial assets and major cryptocurrencies, such as Bitcoin and Ethereum ...
Kübra Saka Ilgin
doaj +1 more source
Survey on Ethereum phishing detection technology
With the widespread application of blockchain technology, phishing scams have become a major threat to blockchain platforms.Due to the irreversibility, anonymity, and tamper-proof nature of blockchain transactions, phishing attacks often have a high ...
Zhao CAI, Tao JING, Shuang REN
doaj +1 more source
Predicting Cryptocurrency Fraud Using ChaosNet: The Ethereum Manifestation
Cryptocurrencies are in high demand now due to their volatile and untraceable nature. Bitcoin, Ethereum, and Dogecoin are just a few examples. This research seeks to identify deception and probable fraud in Ethereum transactional processes.
Anurag Dutta +4 more
semanticscholar +1 more source
Digital Rights Activism in Multilevel Governance
ABSTRACT Multilevel governance (MLG) without a clear hierarchical structure can create power imbalances among various actors, particularly in settings with overlapping jurisdictions and policy areas. This dynamic is especially pronounced in Internet governance, which faces a complex interplay of domestic laws, state interdependence, and heightened ...
Alison Harcourt
wiley +1 more source
Adaptive multi-channel Bayesian graph attention network for IoT transaction security
With the rapid advancement of 5G technology, the Internet of Things (IoT) has entered a new phase of applications and is rapidly becoming a significant force in promoting economic development.
Zhaowei Liu +3 more
doaj +1 more source
Practical Limitations of Ethereum’s Layer-2
Most permissionless blockchains inherently suffer from throughput limitations. Layer-2 systems, such as side-chains or Rollups, have been proposed as a possible strategy to overcome this limitation.
Ray Neiheiser +5 more
semanticscholar +1 more source
When the Tail Wags the Dog: A Time‐Varying FCVAR Analysis of Bitcoin Market
ABSTRACT This paper examines how the relationship between Bitcoin spot and futures markets has evolved using a time‐varying Fractionally Cointegrated Vector Autoregressive (FCVAR) model. We are the first to apply this methodology dynamically to cryptocurrency markets, allowing us to simultaneously analyze long‐run equilibrium, pricing patterns, market ...
Filippo di Pietro +2 more
wiley +1 more source

