Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (188)
- Information Security (66)
- Engineering (49)
- Computer Engineering (38)
- Databases and Information Systems (32)
-
- Business (30)
- Electrical and Computer Engineering (20)
- Social and Behavioral Sciences (14)
- Artificial Intelligence and Robotics (13)
- Software Engineering (12)
- Technology and Innovation (12)
- Data Storage Systems (11)
- Other Computer Sciences (11)
- Medicine and Health Sciences (10)
- Digital Communications and Networking (9)
- Finance and Financial Management (8)
- Systems Science (8)
- Operations Research, Systems Engineering and Industrial Engineering (7)
- Health Information Technology (6)
- E-Commerce (5)
- Law (5)
- Numerical Analysis and Scientific Computing (5)
- Operations and Supply Chain Management (5)
- Computer and Systems Architecture (4)
- Economics (4)
- Management Information Systems (4)
- OS and Networks (4)
- Theory and Algorithms (4)
- Computer Law (3)
- Institution
-
- Singapore Management University (32)
- Old Dominion University (18)
- Edith Cowan University (9)
- TÜBİTAK (9)
- University of Nevada, Las Vegas (9)
-
- University of Texas Rio Grande Valley (9)
- Zayed University (9)
- Boise State University (6)
- Missouri University of Science and Technology (5)
- San Jose State University (5)
- Brigham Young University (4)
- China Simulation Federation (4)
- University for Business and Technology in Kosovo (4)
- University of Texas at Arlington (3)
- University of Windsor (3)
- Air Force Institute of Technology (2)
- Ateneo de Manila University (2)
- City University of New York (CUNY) (2)
- Columbus State University (2)
- Florida International University (2)
- Munster Technological University (2)
- New Jersey Institute of Technology (2)
- Selected Works (2)
- Technological University Dublin (2)
- University of Arkansas, Fayetteville (2)
- University of Nebraska at Omaha (2)
- Walden University (2)
- American University in Cairo (1)
- Augustana College (1)
- Bridgewater State University (1)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (31)
- Computer Science Faculty Publications and Presentations (12)
- All Works (9)
- Turkish Journal of Electrical Engineering and Computer Sciences (9)
- Theses and Dissertations (8)
-
- UNLV Theses, Dissertations, Professional Papers, and Capstones (7)
- VMASC Publications (7)
- Master's Projects (5)
- Research outputs 2014 to 2021 (5)
- Electronic Theses and Dissertations (4)
- Journal of System Simulation (4)
- Boise State University Theses and Dissertations (3)
- Doctoral Dissertations (3)
- Engineering Management & Systems Engineering Faculty Publications (3)
- Research outputs 2022 to 2026 (3)
- Computer Science Faculty Research (2)
- Computer Science Faculty Research & Creative Works (2)
- Computer Science and Engineering Dissertations (2)
- Dissertations (2)
- Electrical & Computer Engineering Faculty Publications (2)
- FIU Electronic Theses and Dissertations (2)
- Information Technology & Decision Sciences Faculty Publications (2)
- Marriott Student Review (2)
- Publications (2)
- UBT International Conference (2)
- Undergraduate Honors Theses (2)
- Walden Dissertations and Doctoral Studies (2)
- All Faculty Scholarship (1)
- Articles (1)
- Articles by Maurer Faculty (1)
- Publication Type
- File Type
Articles 1 - 30 of 196
Full-Text Articles in Physical Sciences and Mathematics
Monero: Powering Anonymous Digital Currency Transactions, Jake Braddy
Monero: Powering Anonymous Digital Currency Transactions, Jake Braddy
Theses/Capstones/Creative Projects
Cryptocurrencies rely on a distributed public ledger (record of transactions) in order to perform their intended functions. However, the public’s ability to audit the network is both its greatest strength and greatest weakness: Anyone can see what address sent currency, and to whom the currency was sent. If cryptocurrency is ever going to take some of the responsibility of fiat currency, then there needs to be a certain level of confidentiality. Thus far, Monero has come out on top as the preferred currency for embodying the ideas of privacy and confidentiality. Through numerous cryptographic procedures, Monero is able to obfuscate …
A Reputation System For Provably-Robust Decision Making In Iot Blockchain Networks, Charles C. Rawlins, Sarangapani Jagannathan, Venkata Sriram Siddhardh Nadendla
A Reputation System For Provably-Robust Decision Making In Iot Blockchain Networks, Charles C. Rawlins, Sarangapani Jagannathan, Venkata Sriram Siddhardh Nadendla
Electrical and Computer Engineering Faculty Research & Creative Works
Blockchain systems have been successful in discerning truthful information from interagent interaction amidst possible attackers or conflicts, which is crucial for the completion of nontrivial tasks in distributed networking. However, the state-of-the-art blockchain protocols are limited to resource-rich applications where reliably connected nodes within the network are equipped with significant computing power to run lottery-based proof-of-work (pow) consensus. The purpose of this work is to address these challenges for implementation in a severely resource-constrained distributed network with internet of things (iot) devices. The contribution of this work is a novel lightweight alternative, called weight-based reputation (wbr) scheme, to classify new …
Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D.
Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D.
Journal of Cybersecurity Education, Research and Practice
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized identity, and smart contracts, and examines the application of secure blockchain across various educational functions such as enrollment management, degree auditing, and award processing. Each facet of the NIST Framework is utilized to explore the integration of blockchain technology and address persistent security concerns. The paper contributes to the literature by defining blockchain technology applications and opportunities within …
The Microverse: A Task-Oriented Edge-Scale Metaverse, Qian Qu, Mohsen Hatami, Ronghua Xu, Deeraj Nagothu, Yu Chen, Xiaohua Li, Erik Blasch, Erika Ardiles-Cruz, Genshe Chen
The Microverse: A Task-Oriented Edge-Scale Metaverse, Qian Qu, Mohsen Hatami, Ronghua Xu, Deeraj Nagothu, Yu Chen, Xiaohua Li, Erik Blasch, Erika Ardiles-Cruz, Genshe Chen
Michigan Tech Publications, Part 2
Over the past decade, there has been a remarkable acceleration in the evolution of smart cities and intelligent spaces, driven by breakthroughs in technologies such as the Internet of Things (IoT), edge–fog–cloud computing, and machine learning (ML)/artificial intelligence (AI). As society begins to harness the full potential of these smart environments, the horizon brightens with the promise of an immersive, interconnected 3D world. The forthcoming paradigm shift in how we live, work, and interact owes much to groundbreaking innovations in augmented reality (AR), virtual reality (VR), extended reality (XR), blockchain, and digital twins (DTs). However, realizing the expansive digital vista …
Blockchain For Computational Integrity And Privacy, Rahul Raj
Blockchain For Computational Integrity And Privacy, Rahul Raj
Theses and Dissertations
This study proposes a blockchain based system that utilizes fully homomorphic encryption to provide security of data in use as well as computational integrity. This is achieved by leveraging the attributes of blockchain which provides availability and data integrity combined with homomorphic encryption that provides confidentiality. The proposed system is designed to perform statistical operations, including mean, median and variance, on encrypted data, thus providing confidentiality of data while in use. The computations are performed on the smart contract, residing on the blockchain which provides computational integrity. The results indicate that it is possible to perform fully homomorphic computations on …
Reliable Emergency Rescue Model Of Uavs Based On Blockchain, Mengyao Du, Kai Xu, Miao Zhang, Xiang Fu, Quanjun Yin
Reliable Emergency Rescue Model Of Uavs Based On Blockchain, Mengyao Du, Kai Xu, Miao Zhang, Xiang Fu, Quanjun Yin
Journal of System Simulation
Abstract: Natural disasters may unpredictably disrupt ground communication infrastructure and transportation systems, and UAVs emergency response can deal with such uncertainties and highly dynamic scenarios. Aiming at the robustness requirements of decentralized rescue systems. UAV emergency rescue chain (UERChain) based on blockchain technology is proposed. By deploying UAV backbone nodes within a layered local network, the smart contracts for managing reputation considering UAV social relationships are designed. The blockchain is employed as a trust mechanism to realize the trustworthy interactions among distributed UAVs. Experimental results show that, UERChain has higher robustness, and within controllable resource constraints, the reputation management and …
Janus: Toward Preventing Counterfeits In Supply Chains Utilizing A Multi-Quorum Blockchain, Vika Crossland, Connor Dellwo, Golam Bashar, Gaby G. Dagher
Janus: Toward Preventing Counterfeits In Supply Chains Utilizing A Multi-Quorum Blockchain, Vika Crossland, Connor Dellwo, Golam Bashar, Gaby G. Dagher
Computer Science Faculty Publications and Presentations
The modern pharmaceutical supply chain lacks transparency and traceability, resulting in alarming rates of counterfeit products entering the market. These illegitimate products cause harm to end users and wreak havoc on the supply chain itself, costing billions of dollars in profit loss. In this paper, in response to the Drug Supply Chain Security Act (DSCSA), we introduce Janus, a novel pharmaceutical track-and-trace system that utilizes blockchain and cloning-resistant hologram tags to prevent counterfeits from entering the pharmaceutical supply chain. We design a multi-quorum consensus protocol that achieves load balancing across the network. We perform a security analysis to show robustness …
Bitcoin's Technical Foundation And Its Potential For A Decentralized And Environmentally Friendly Future, Iqtiar Md Siddique
Bitcoin's Technical Foundation And Its Potential For A Decentralized And Environmentally Friendly Future, Iqtiar Md Siddique
Open Access Theses & Dissertations
This research examines a systematic analysis of Bitcoin, employing a Coefficient of Variation (CV) approach to gauge its degree of decentralization. Bitcoin, an innovative decentralized digital currency, has received much attention for its potential to revolutionize traditional financial systems. This study employs the Coefficient of Variation (CV) to acquire insights into the wealth distribution and concentration among Bitcoin users. This research demonstrates how decentralized the network of Bitcoin is. The methodology uses real data on Bitcoin addresses and their holdings to compute the Coefficient of Variation (CV). This approach provides valuable insights into the ongoing discourse surrounding Bitcoin's decentralization, offering …
Healthaichain: Improving Security And Safety Using Blockchain Technology Applications In Ai-Based Healthcare Systems, Naresh Kshetri, James Hutson, Revathy G
Healthaichain: Improving Security And Safety Using Blockchain Technology Applications In Ai-Based Healthcare Systems, Naresh Kshetri, James Hutson, Revathy G
Faculty Scholarship
Blockchain as a digital ledger for keeping records of digital transactions and other information, it is secure and decentralized technology. The globally growing number of digital population every day possesses a significant threat to online data including the medical and patients’ data. After bitcoin, blockchain technology has emerged into a general-purpose technology with applications in medical industries and healthcare. Blockchain can promote highly configurable openness while retaining the highest security standards for critical data of medical patients. Referred to as distributed record keeping for healthcare systems which makes digital assets unalterable and transparent via a cryptographic hash and decentralized network. …
Metaverse Key Requirements And Platforms Survey, Akbobek Abilkaiyrkyzy, Ahmed Elhagry, Fedwa Laamarti, Abdulmotaleb El Saddik
Metaverse Key Requirements And Platforms Survey, Akbobek Abilkaiyrkyzy, Ahmed Elhagry, Fedwa Laamarti, Abdulmotaleb El Saddik
Computer Vision Faculty Publications
The growing interest in the metaverse has led to an abundance of platforms, each with its own unique features and limitations. This paper's objective is two-fold. First, we aim at providing an objective analysis of requirements that need to be fulfilled by metaverse platforms. We survey a broad set of criteria including interoperability, immersiveness, persistence, multimodal and social interaction, scalability, level of openness, configurability, market access, security, and blockchain integration, among others. Second, we review a wide range of existing metaverse platforms, and we critically evaluate their ability to meet the requirements listed. We identify their limitations, which must be …
Application Of Blockchain Technology In Aquaculture Management, Yu-Jen Pan, Hsin-Pei Shieh
Application Of Blockchain Technology In Aquaculture Management, Yu-Jen Pan, Hsin-Pei Shieh
Journal of Marine Science and Technology
In recent years, food safety has become a growing concern in Taiwanese society. To ensure efficient management of the supply chain within the L Aquatic Products company, it is imperative to employ reliable technical support in establishing an effective traceability management system. The traceability of products can provide managers with valuable insight into the intricacies of the supply chain. By establishing a dependable food traceability system, brand trust can be strengthened, and consumers can inquire about the movement of aquatic products within the supply chain. Blockchain technology offers features such as traceability, accountability, transparency, reliability, trust, privacy, and security, making …
Identity Management Pki System Using Blockchain, Mohamed Abdel Fattah Abdel Baki Awad
Identity Management Pki System Using Blockchain, Mohamed Abdel Fattah Abdel Baki Awad
Theses and Dissertations
Identity management is one of the most important topics in the security field. Public Key Infrastructure (PKI) is the most commonly used approach in legally identity management systems. PKI systems have many centralized services that might affect the availability and trustworthiness of the system. Issues related to certificate verification methods such as Certificate Revocation List (CRL) and Online Certificate Status Protocol (OCSP) can be avoided if blockchain is used. Blockchain is a decentralized trusted system where data can only be appended to a public ledger. Edits are not allowed in blockchain. Blockchain consists of several nodes all of them have …
Threshold Attribute-Based Credentials With Redactable Signature, Rui Shi, Huamin Feng, Yang Yang, Feng Yuan, Yingjiu Li, Hwee Hwa Pang, Robert H. Deng
Threshold Attribute-Based Credentials With Redactable Signature, Rui Shi, Huamin Feng, Yang Yang, Feng Yuan, Yingjiu Li, Hwee Hwa Pang, Robert H. Deng
Research Collection School Of Computing and Information Systems
Threshold attribute-based credentials are suitable for decentralized systems such as blockchains as such systems generally assume that authenticity, confidentiality, and availability can still be guaranteed in the presence of a threshold number of dishonest or faulty nodes. Coconut (NDSS'19) was the first selective disclosure attribute-based credentials scheme supporting threshold issuance. However, it does not support threshold tracing of user identities and threshold revocation of user credentials, which is desired for internal governance such as identity management, data auditing, and accountability. The communication and computation complexities of Coconut for verifying credentials are linear in the number of each user's attributes and …
The Future Of Cryptocurrency And Blockchain Technology In Finance, Wanyi Wong, Alan @ Ali Madjelisi Megargel
The Future Of Cryptocurrency And Blockchain Technology In Finance, Wanyi Wong, Alan @ Ali Madjelisi Megargel
Research Collection School Of Computing and Information Systems
Cryptocurrencies have been all the rage in recent years, with many being drawn to their appeal as speculative investment assets. Its proponents also champion the secure and decentralised nature of the technology it is based on, called the blockchain. Given the secure nature of blockchain technology, the idea of adopting cryptocurrencies as legal tender currency has also been mooted and experimented with – with the most famous example being the Central American nation of El Salvador’s bold move to adopting the cryptocurrency Bitcoin as legal tender in September 2021. In theory, this would provide a solution to the high transaction …
Reinforcing Digital Trust For Cloud Manufacturing Through Data Provenance Using Ethereum Smart Contracts, Trupti Narayan Rane
Reinforcing Digital Trust For Cloud Manufacturing Through Data Provenance Using Ethereum Smart Contracts, Trupti Narayan Rane
Engineering Management & Systems Engineering Theses & Dissertations
Cloud Manufacturing(CMfg) is an advanced manufacturing model that caters to fast-paced agile requirements (Putnik, 2012). For manufacturing complex products that require extensive resources, manufacturers explore advanced manufacturing techniques like CMfg as it becomes infeasible to achieve high standards through complete ownership of manufacturing artifacts (Kuan et al., 2011). CMfg, with other names such as Manufacturing as a Service (MaaS) and Cyber Manufacturing (NSF, 2020), addresses the shortcoming of traditional manufacturing by building a virtual cyber enterprise of geographically distributed entities that manufacture custom products through collaboration.
With manufacturing venturing into cyberspace, Digital Trust issues concerning product quality, data, and intellectual …
Towards Crisp‐Bc: 3tic Specification Framework For Blockchain Use‐Cases, Pouyan Jahanbin, Ravi S. Sharma, Stephen T. Wingreen, Nir Kshetri, Kim‐Kwang Raymond Choo
Towards Crisp‐Bc: 3tic Specification Framework For Blockchain Use‐Cases, Pouyan Jahanbin, Ravi S. Sharma, Stephen T. Wingreen, Nir Kshetri, Kim‐Kwang Raymond Choo
All Works
The application of Blockchain and augmented technologies such as IoT, AI, and Big Data platforms present a feasible approach for resolving the implementation challenges of trusted, decentralized platforms. This article proposes a DevOps framework for the specification of Blockchain use‐cases that enables evaluation, replication, and benchmarking. Specifically, it could be applied to specify the requirements and design characteristics of Blockchain applications in terms of key attributes such as: (i) transparency; (ii) traceability; (iii) tamper‐resistance; (iv) immutability; and (v) compliance. The article first introduces the design characteristics of Blockchain as a Platform and then examines successful use‐cases for its implementation using …
The Internet Of Things (Iot) In Healthcare: Taking Stock And Moving Forward, Abderahman Rejeb, Karim Rejeb, Horst Treiblmaier, Andrea Appolloni, Salem Alghamdi, Yaser Alhasawi, Mohammad Iranmanesh
The Internet Of Things (Iot) In Healthcare: Taking Stock And Moving Forward, Abderahman Rejeb, Karim Rejeb, Horst Treiblmaier, Andrea Appolloni, Salem Alghamdi, Yaser Alhasawi, Mohammad Iranmanesh
Research outputs 2022 to 2026
Recent improvements in the Internet of Things (IoT) have allowed healthcare to evolve rapidly. This article summarizes previous studies on IoT applications in healthcare. A comprehensive review and a bibliometric analysis were performed to objectively summarize the growth of IoT research in healthcare. To begin, 2,990 journal articles were carefully selected for further investigation. These publications were analyzed based on various bibliometric metrics, including publication year, journals, authors, institutions, and countries. Keyword co-occurrence and co-citation networks were generated to unravel significant research hotspots. The findings show that IoT research has received considerable interest from the healthcare community. Based on the …
Optimal Ordering To Maximize Mev Arbitrage, Granton Michael White
Optimal Ordering To Maximize Mev Arbitrage, Granton Michael White
Theses and Dissertations
The rise of cryptocurrencies has brought with it new math problems with new sets of constraints. The MEV problem entails solving for the ordering of pending trades that maximizes a block creator's profit. In decentralized finance, time is a big constraint, so an exhaustive search of all possible orderings is impossible. I propose a solution to the MEV problem that gives a near optimal result that can be solved in a reasonable amount of time. I layout the method and the formulas required for my solution. Additionally, I test my solution on synthesized data to show that it works as …
Research On Collaborative Task Allocation Method Of Multiple Uavs Based On Blockchain, Shuangcheng Niu, Yuqiang Jin, Kunhu Kou
Research On Collaborative Task Allocation Method Of Multiple Uavs Based On Blockchain, Shuangcheng Niu, Yuqiang Jin, Kunhu Kou
Journal of System Simulation
Abstract: The autonomous collaborative control of a multi-unmanned aerial vehicle (UAV) system lacks a unified underlying technology platform and faces single point failure and information security threats. In order to solve these problems, an idea to build collaborative task planning platforms based on blockchain technology is proposed. With thecollaborative task allocation of multiple UAVs as research objects, an online, safe, high-efficiency, and real-time task allocation method is designed. The contract network task allocation algorithm is described as a smart contract, and system consensus is reached based on the blockchain consensus algorithm. In addition, …
An Analysis And Examination Of Consensus Attacks In Blockchain Networks, Thomas R. Clark
An Analysis And Examination Of Consensus Attacks In Blockchain Networks, Thomas R. Clark
Senior Honors Projects, 2020-current
This paper examines consensus attacks as they relate to blockchain networks. Consensus attacks are a significant threat to the security and integrity of blockchain networks, and understanding these attacks is crucial for developers and stakeholders. The primary contribution of the paper is to present blockchain and consensus attacks in a clear and accessible manner, with the aim of making these complex concepts easily understandable for a general audience. Using literature review, the paper identifies various methods to prevent consensus attacks, including multi-chain networks, proof-of-work consensus algorithms, and network auditing and monitoring. An analysis revealed that these methods for preventing consensus …
Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii
Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii
Electronic Theses and Dissertations
This thesis shows that distributed consensus systems based on proof of work are vulnerable to hashrate-based double-spending attacks due to abuse of majority rule. Through building a private fork of Litecoin and executing a double-spending attack this thesis examines the mechanics and principles behind the attack. This thesis also conducts a survey of preventative measures used to deter double-spending attacks, concluding that a decentralized peer-to-peer network using proof of work is best protected by the addition of an observer system whether internal or external.
Dea2uth: A Decentralized Authentication And Authorization Scheme For Secure Private Data Transfer, Phillipe Austria
Dea2uth: A Decentralized Authentication And Authorization Scheme For Secure Private Data Transfer, Phillipe Austria
UNLV Theses, Dissertations, Professional Papers, and Capstones
The sharing of private information is a daunting, multifaceted, and expensive undertaking. Furthermore, identity management is an additional challenge that poses significant technological, operational, and legal obstacles. Present solutions and their accompanying infrastructures rely on centralized models that are susceptible to hacking and can hinder data control by the rightful owner. Consequently, blockchain technology has generated interest in the fields of identity and access control. This technology is viewed as a potential solution due to its ability to offer decentralization, transparency, provenance, security, and privacy benefits. Nevertheless, a completely decentralized and private solution that enables data owners to control their …
Code Will Tell: Visual Identification Of Ponzi Schemes On Ethereum, Xiaolin Wen, Kim Siang Yeo, Yong Wang, Ling Cheng, Feida Zhu, Min Zhu
Code Will Tell: Visual Identification Of Ponzi Schemes On Ethereum, Xiaolin Wen, Kim Siang Yeo, Yong Wang, Ling Cheng, Feida Zhu, Min Zhu
Research Collection School Of Computing and Information Systems
Ethereum has become a popular blockchain with smart contracts for investors nowadays. Due to the decentralization and anonymity of Ethereum, Ponzi schemes have been easily deployed and caused significant losses to investors. However, there are still no explainable and effective methods to help investors easily identify Ponzi schemes and validate whether a smart contract is actually a Ponzi scheme. To fill the research gap, we propose PonziLens, a novel visualization approach to help investors achieve early identification of Ponzi schemes by investigating the operation codes of smart contracts. Specifically, we conduct symbolic execution of opcode and extract the control flow …
Architectural Design Of A Blockchain-Enabled, Federated Learning Platform For Algorithmic Fairness In Predictive Health Care: Design Science Study, Xueping Liang, Juan Zhao, Yan Chen, Eranga Bandara, Sachin Shetty
Architectural Design Of A Blockchain-Enabled, Federated Learning Platform For Algorithmic Fairness In Predictive Health Care: Design Science Study, Xueping Liang, Juan Zhao, Yan Chen, Eranga Bandara, Sachin Shetty
VMASC Publications
Background: Developing effective and generalizable predictive models is critical for disease prediction and clinical decision-making, often requiring diverse samples to mitigate population bias and address algorithmic fairness. However, a major challenge is to retrieve learning models across multiple institutions without bringing in local biases and inequity, while preserving individual patients' privacy at each site.
Objective: This study aims to understand the issues of bias and fairness in the machine learning process used in the predictive health care domain. We proposed a software architecture that integrates federated learning and blockchain to improve fairness, while maintaining acceptable prediction accuracy and minimizing overhead …
Using Blockchain For Enabling Transparent, Traceable, And Trusted University Ranking Systems, Ammar Battah, Khaled Salah, Raja Jayaraman, Ibrar Yaqoob, Ashraf Khalil
Using Blockchain For Enabling Transparent, Traceable, And Trusted University Ranking Systems, Ammar Battah, Khaled Salah, Raja Jayaraman, Ibrar Yaqoob, Ashraf Khalil
All Works
Ranking systems have proven to improve the quality of education and help build the reputation of academic institutions. Each of the current academic ranking systems is based on different methodologies, criteria, and standards of measurement. Academic and employer reputations are subjective indicators of some rankings determined through surveying that is neither transparent nor traceable. The current academic ranking systems fall short of providing transparency and traceability features for both subjective and objective indicators that are used to calculate the ranking. Also, the ranking systems are managed and controlled in a centralized manner by specific entities. This raises concerns about fairness …
Towards The Development Of A Blockchain System For Philippine Government Processes For Enhanced Transparency And Verifiability, Karlo Angelo F. Cabugwang, Raphael Christen K. Enriquez, Bienvenido E. Villabroza, Christian E. Pulmano
Towards The Development Of A Blockchain System For Philippine Government Processes For Enhanced Transparency And Verifiability, Karlo Angelo F. Cabugwang, Raphael Christen K. Enriquez, Bienvenido E. Villabroza, Christian E. Pulmano
Department of Information Systems & Computer Science Faculty Publications
There are cases of corruption and fraud within the Philippine government that have gone under the radar, often due to a lack of transparency and verifiability. The objective of this study is to prototype a blockchain network that can run a government process as a decentralized application such that it can enhance transparency and verifiability in the public sector. This can be accomplished by identifying a government process that would be converted into a decentralized application. One of these processes would be converted into a decentralized application. Afterwards, a blockchain framework should be identified one which can create a public …
A Systematic Review Of Cryptocurrencies Use In Cybercrimes, Kieran B D Human
A Systematic Review Of Cryptocurrencies Use In Cybercrimes, Kieran B D Human
Graduate Thesis and Dissertation 2023-2024
Cryptocurrencies are one of the most prominent applications of blockchain systems. While cryptocurrencies promise many features and advantages, such as decentralization, anonymity, and ease of access, those very features can be abused. For instance, as documented in various recent works, cryptocurrencies have been frequently abused in many different forms of cybercrime. Despite the plethora of works on measuring and understanding the abuse of cryptocurrencies in the digital space, there has been no work on systemizing this knowledge by comprehensively understanding those contributions, contrasting them based on their merit, and understanding the gap in this research space.
This thesis initiates the …
Bimee: Blockchain Based Incentive Mechanism Considering Endowment Effect, Jayanth Madupalli
Bimee: Blockchain Based Incentive Mechanism Considering Endowment Effect, Jayanth Madupalli
MSU Graduate Theses
Crowdsensing, a paradigm in modern data collection, harnesses the collective power of mobile users equipped with sensory devices to contribute valuable data based on task-specific criteria. The efficacy of crowdsensing relies on sustained engagement from proficient users over extended periods. Incentivizing long-term participation is crucial, and blockchain technology emerges as a promising framework, providing a decentralized and immutable ledger. However, existing blockchain-based incentive mechanisms for crowdsensing encounter challenges. Firstly, they often overlook users' inherent bias towards loss aversion, a psychological phenomenon where individuals prioritize avoiding losses over acquiring equivalent rewards. Secondly, fairness issues arise, especially concerning newly participating users in …
Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu
Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu
Information Technology & Decision Sciences Faculty Publications
Detecting cyber security vulnerabilities in the Internet of Things (IoT) devices before they are exploited is increasingly challenging and is one of the key technologies to protect IoT devices from cyber attacks. This work conducts a comprehensive survey to investigate the methods and tools used in vulnerability detection in IoT environments utilizing machine learning techniques on various datasets, i.e., IoT23. During this study, the common potential vulnerabilities of IoT architectures are analyzed on each layer and the machine learning workflow is described for detecting IoT vulnerabilities. A vulnerability detection and mitigation framework was proposed for machine learning-based vulnerability detection in …
Design Of Robust Blockchain-Envisioned Authenticated Key Management Mechanism For Smart Healthcare Applications, Siddhant Thapiyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty
Design Of Robust Blockchain-Envisioned Authenticated Key Management Mechanism For Smart Healthcare Applications, Siddhant Thapiyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty
VMASC Publications
The healthcare sector is a very crucial and important sector of any society, and with the evolution of the various deployed technologies, like the Internet of Things (IoT), machine learning and blockchain it has numerous advantages. However, in this section, the data is much more vulnerable than others, because the data is strictly private and confidential, and it requires a highly secured framework for the transmission of data between entities. In this article, we aim to design a blockchain-envisioned authentication and key management mechanism for the IoMT-based smart healthcare applications (in short, we call it SBAKM-HS). We compare the various …