Deanonymizing Tor hidden service users through Bitcoin transactions analysis (English)
- New search for: Jawaheri, Husam Al
- Further information on Jawaheri, Husam Al:
- https://orcid.org/0000-0003-2944-4265
- New search for: Sabah, Mashael Al
- New search for: Boshmaf, Yazan
- New search for: Erbad, Aiman
- New search for: Jawaheri, Husam Al
- New search for: Sabah, Mashael Al
- New search for: Boshmaf, Yazan
- New search for: Erbad, Aiman
In:
Computers and Security
;
89
;
2019
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Deanonymizing Tor hidden service users through Bitcoin transactions analysis
-
Contributors:Jawaheri, Husam Al ( author ) / Sabah, Mashael Al ( author ) / Boshmaf, Yazan ( author ) / Erbad, Aiman ( author )
-
Published in:
-
Publisher:
- New search for: Elsevier Ltd
-
Publication date:2019-11-30
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 89
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
-
Deanonymizing Tor hidden service users through Bitcoin transactions analysisJawaheri, Husam Al / Sabah, Mashael Al / Boshmaf, Yazan / Erbad, Aiman et al. | 2019
-
Static detection of real-world buffer overflow induced by loopLuo, Peng / Zou, Deqing / Du, Yajuan / Jin, Hai / Liu, Changming / Shen, Jinan et al. | 2018
-
A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systemsHuang, Linan / Zhu, Quanyan et al. | 2019
-
A real-time alert correlation method based on code-books for intrusion detection systemsMahdavi, Ehsan / Fanian, Ali / Amini, Fatima et al. | 2019
-
Shapeshifter: Intelligence-driven data plane randomization resilient to data-oriented programming attacksWang, Ye / Li, Qingbao / Chen, Zhifeng / Zhang, Ping / Zhang, Guimin et al. | 2019
-
Security of vehicular ad-hoc networks: A comprehensive surveyMalhi, Avleen Kaur / Batra, Shalini / Pannu, Husanbir Singh et al. | 2019
-
PKI4IoT: Towards public key infrastructure for the Internet of ThingsHöglund, Joel / Lindemer, Samuel / Furuhed, Martin / Raza, Shahid et al. | 2019
-
Cybersecurity for industrial control systems: A surveyBhamare, Deval / Zolanvari, Maede / Erbad, Aiman / Jain, Raj / Khan, Khaled / Meskin, Nader et al. | 2019
-
Inner conflict: How smart device components can cause harmShwartz, Omer / Cohen, Amir / Shabtai, Asaf / Oren, Yossi et al. | 2019
-
Model of the intrusion detection system based on the integration of spatial-temporal featuresZhang, Jianwu / Ling, Yu / Fu, Xingbing / Yang, Xiongkun / Xiong, Gang / Zhang, Rui et al. | 2019
-
A novel method for malware detection on ML-based visualization techniqueLiu, Xinbo / Lin, Yaping / Li, He / Zhang, Jiliang et al. | 2019
-
DL-Droid: Deep learning based android malware detection using real devicesAlzaylaee, Mohammed K. / Yerima, Suleiman Y. / Sezer, Sakir et al. | 2019
-
SCADA (Supervisory Control and Data Acquisition) systems: Vulnerability assessment and security recommendationsUpadhyay, Darshana / Sampalli, Srinivas et al. | 2019
-
Security-oriented view of app behaviour using textual descriptions and user-granted permission requestsOlukoya, Oluwafemi / Mackenzie, Lewis / Omoronyia, Inah et al. | 2019
-
A Bayesian network approach for cybersecurity risk assessment implementing and extending the FAIR modelWang, Jiali / Neil, Martin / Fenton, Norman et al. | 2019
-
An improved two-hidden-layer extreme learning machine for malware huntingNamavar Jahromi, Amir / Hashemi, Sattar / Dehghantanha, Ali / Choo, Kim-Kwang Raymond / Karimipour, Hadis / Newton, David Ellis / Parizi, Reza M. et al. | 2019
-
Solving security constraints for 5G slice embedding: A proof-of-conceptBoutigny, François / Betgé-Brezetz, Stéphane / Blanc, Gregory / Lavignotte, Antoine / Debar, Hervé / Jmila, Houda et al. | 2019
-
Computer & security special issue editorialRass, Stefan / Zhu, Quanyan et al. | 2019
-
The impact of excluding common blocks for approximate matchingMoia, Vitor Hugo Galhardo / Breitinger, Frank / Henriques, Marco Aurélio Amaral et al. | 2019
-
LocAuth: A fine-grained indoor location-based authentication system using wireless networks characteristicsAlawami, Mohsen A. / Kim, Hyoungshick et al. | 2019
-
Formal knowledge model for online social network forensicsPhD Arshad, Humaira / PhD Jantan, Aman / PhD Hoon, Gan Keng / PhD Abiodun, Isaac Oludare et al. | 2019
-
Editorial Board| 2019