Academic literature on the topic 'Cryptomining'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cryptomining.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cryptomining"
Maulana, Mochammad Ichsan, Asep Dede Kurnia, and Ayi Nurbaeti. "Studi Kajian Bisnis Tambang Uang Digital (Cryptomining) Dalam Konteks Ijarah." EKSISBANK: Ekonomi Syariah dan Bisnis Perbankan 5, no. 1 (June 27, 2021): 35–56. http://dx.doi.org/10.37726/ee.v5i1.158.
Full textGangwal, Ankit, and Mauro Conti. "Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining Using Magnetic Side-Channel." IEEE Transactions on Information Forensics and Security 15 (2020): 1630–39. http://dx.doi.org/10.1109/tifs.2019.2945171.
Full textCaprolu, Maurantonio, Simone Raponi, Gabriele Oligeri, and Roberto Di Pietro. "Cryptomining makes noise: Detecting cryptojacking via Machine Learning." Computer Communications 171 (April 2021): 126–39. http://dx.doi.org/10.1016/j.comcom.2021.02.016.
Full textPastor, Antonio, Alberto Mozo, Stanislav Vakaruk, Daniele Canavese, Diego R. Lopez, Leonardo Regano, Sandra Gomez-Canaval, and Antonio Lioy. "Detection of Encrypted Cryptomining Malware Connections With Machine and Deep Learning." IEEE Access 8 (2020): 158036–55. http://dx.doi.org/10.1109/access.2020.3019658.
Full textMalik, Asad Waqar, and Zahid Anwar. "Do Charging Stations Benefit from Cryptojacking? A Novel Framework for Its Financial Impact Analysis on Electric Vehicles." Energies 15, no. 16 (August 9, 2022): 5773. http://dx.doi.org/10.3390/en15165773.
Full textKarn, Rupesh Raj, Prabhakar Kudva, Hai Huang, Sahil Suneja, and Ibrahim M. Elfadel. "Cryptomining Detection in Container Clouds Using System Calls and Explainable Machine Learning." IEEE Transactions on Parallel and Distributed Systems 32, no. 3 (March 1, 2021): 674–91. http://dx.doi.org/10.1109/tpds.2020.3029088.
Full textDarabian, Hamid, Sajad Homayounoot, Ali Dehghantanha, Sattar Hashemi, Hadis Karimipour, Reza M. Parizi, and Kim-Kwang Raymond Choo. "Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis." Journal of Grid Computing 18, no. 2 (January 21, 2020): 293–303. http://dx.doi.org/10.1007/s10723-020-09510-6.
Full textLian, Wenjuan, Guoqing Nie, Yanyan Kang, Bin Jia, and Yang Zhang. "Cryptomining malware detection based on edge computing-oriented multi-modal features deep learning." China Communications 19, no. 2 (February 2022): 174–85. http://dx.doi.org/10.23919/jcc.2022.02.014.
Full textHernandez-Suarez, Aldo, Gabriel Sanchez-Perez, Linda K. Toscano-Medina, Jesus Olivares-Mercado, Jose Portillo-Portilo, Juan-Gerardo Avalos, and Luis Javier García Villalba. "Detecting Cryptojacking Web Threats: An Approach with Autoencoders and Deep Dense Neural Networks." Applied Sciences 12, no. 7 (March 22, 2022): 3234. http://dx.doi.org/10.3390/app12073234.
Full textMozo, Alberto, Antonio Pastor, Amit Karamchandani, Luis de la Cal, Diego Rivera, and Jose Ignacio Moreno. "Integration of Machine Learning-Based Attack Detectors into Defensive Exercises of a 5G Cyber Range." Applied Sciences 12, no. 20 (October 14, 2022): 10349. http://dx.doi.org/10.3390/app122010349.
Full textBooks on the topic "Cryptomining"
Eliet, jean, and gaudin alexandre. Cryptominig: Comment Se Créer des Sources de Revenues Passifs en Minant de la Crypto-Monnaie. Independently Published, 2022.
Find full textBook chapters on the topic "Cryptomining"
Gangwal, Ankit, Samuele Giuliano Piazzetta, Gianluca Lain, and Mauro Conti. "Detecting Covert Cryptomining Using HPC." In Cryptology and Network Security, 344–64. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65411-5_17.
Full textJougleux, Philippe. "Legal Aspects of Malicious Cryptomining in the EU." In EU Internet Law in the Digital Single Market, 339–54. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69583-5_14.
Full textConference papers on the topic "Cryptomining"
Carlin, Domhnall, Philip OrKane, Sakir Sezer, and Jonah Burgess. "Detecting Cryptomining Using Dynamic Analysis." In 2018 16th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2018. http://dx.doi.org/10.1109/pst.2018.8514167.
Full textTekiner, Ege, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, and Ali Aydin Selcuk. "In-Browser Cryptomining for Good: An Untold Story." In 2021 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS). IEEE, 2021. http://dx.doi.org/10.1109/dapps52256.2021.00008.
Full textWang, Peiran, Yuqiang Sun, Cheng Huang, Yutong Du, Genpei Liang, and Gang Long. "MineDetector: JavaScript Browser-side Cryptomining Detection using Static Methods." In 2021 IEEE 24th International Conference on Computational Science and Engineering (CSE). IEEE, 2021. http://dx.doi.org/10.1109/cse53436.2021.00022.
Full textKelton, Conor, Aruna Balasubramanian, Ramya Raghavendra, and Mudhakar Srivatsa. "Browser-Based Deep Behavioral Detection of Web Cryptomining with CoinSpy." In Workshop on Measurements, Attacks, and Defenses for the Web. Reston, VA: Internet Society, 2020. http://dx.doi.org/10.14722/madweb.2020.23002.
Full textMani, Ganapathy, Vikram Pasumarti, Bharat Bhargava, Faisal Tariq Vora, James MacDonald, Justin King, and Jason Kobes. "DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters." In 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems (ACSOS). IEEE, 2020. http://dx.doi.org/10.1109/acsos49614.2020.00032.
Full textZhang, Shize, Zhiliang Wang, Jiahai Yang, Xin Cheng, XiaoQian Ma, Hui Zhang, Bo Wang, Zimu Li, and Jianping Wu. "MineHunter: A Practical Cryptomining Traffic Detection Algorithm Based on Time Series Tracking." In ACSAC '21: Annual Computer Security Applications Conference. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3485832.3485835.
Full textLi, Zhi, Weijie Liu, Hongbo Chen, XiaoFeng Wang, Xiaojing Liao, Luyi Xing, Mingming Zha, Hai Jin, and Deqing Zou. "Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms." In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 2022. http://dx.doi.org/10.1109/sp46214.2022.9833803.
Full textLew, Roger, Ronald Boring, and Thomas Ulrich. "Envisioning 21st Century Mixed-Initiative Operations for Energy Systems." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002137.
Full text