Добірка наукової літератури з теми "Cryptomining"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Cryptomining".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Cryptomining"
Maulana, Mochammad Ichsan, Asep Dede Kurnia, and Ayi Nurbaeti. "Studi Kajian Bisnis Tambang Uang Digital (Cryptomining) Dalam Konteks Ijarah." EKSISBANK: Ekonomi Syariah dan Bisnis Perbankan 5, no. 1 (June 27, 2021): 35–56. http://dx.doi.org/10.37726/ee.v5i1.158.
Повний текст джерелаGangwal, Ankit, and Mauro Conti. "Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining Using Magnetic Side-Channel." IEEE Transactions on Information Forensics and Security 15 (2020): 1630–39. http://dx.doi.org/10.1109/tifs.2019.2945171.
Повний текст джерелаCaprolu, Maurantonio, Simone Raponi, Gabriele Oligeri, and Roberto Di Pietro. "Cryptomining makes noise: Detecting cryptojacking via Machine Learning." Computer Communications 171 (April 2021): 126–39. http://dx.doi.org/10.1016/j.comcom.2021.02.016.
Повний текст джерелаPastor, Antonio, Alberto Mozo, Stanislav Vakaruk, Daniele Canavese, Diego R. Lopez, Leonardo Regano, Sandra Gomez-Canaval, and Antonio Lioy. "Detection of Encrypted Cryptomining Malware Connections With Machine and Deep Learning." IEEE Access 8 (2020): 158036–55. http://dx.doi.org/10.1109/access.2020.3019658.
Повний текст джерелаMalik, Asad Waqar, and Zahid Anwar. "Do Charging Stations Benefit from Cryptojacking? A Novel Framework for Its Financial Impact Analysis on Electric Vehicles." Energies 15, no. 16 (August 9, 2022): 5773. http://dx.doi.org/10.3390/en15165773.
Повний текст джерелаKarn, Rupesh Raj, Prabhakar Kudva, Hai Huang, Sahil Suneja, and Ibrahim M. Elfadel. "Cryptomining Detection in Container Clouds Using System Calls and Explainable Machine Learning." IEEE Transactions on Parallel and Distributed Systems 32, no. 3 (March 1, 2021): 674–91. http://dx.doi.org/10.1109/tpds.2020.3029088.
Повний текст джерелаDarabian, Hamid, Sajad Homayounoot, Ali Dehghantanha, Sattar Hashemi, Hadis Karimipour, Reza M. Parizi, and Kim-Kwang Raymond Choo. "Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis." Journal of Grid Computing 18, no. 2 (January 21, 2020): 293–303. http://dx.doi.org/10.1007/s10723-020-09510-6.
Повний текст джерелаLian, Wenjuan, Guoqing Nie, Yanyan Kang, Bin Jia, and Yang Zhang. "Cryptomining malware detection based on edge computing-oriented multi-modal features deep learning." China Communications 19, no. 2 (February 2022): 174–85. http://dx.doi.org/10.23919/jcc.2022.02.014.
Повний текст джерелаHernandez-Suarez, Aldo, Gabriel Sanchez-Perez, Linda K. Toscano-Medina, Jesus Olivares-Mercado, Jose Portillo-Portilo, Juan-Gerardo Avalos, and Luis Javier García Villalba. "Detecting Cryptojacking Web Threats: An Approach with Autoencoders and Deep Dense Neural Networks." Applied Sciences 12, no. 7 (March 22, 2022): 3234. http://dx.doi.org/10.3390/app12073234.
Повний текст джерелаMozo, Alberto, Antonio Pastor, Amit Karamchandani, Luis de la Cal, Diego Rivera, and Jose Ignacio Moreno. "Integration of Machine Learning-Based Attack Detectors into Defensive Exercises of a 5G Cyber Range." Applied Sciences 12, no. 20 (October 14, 2022): 10349. http://dx.doi.org/10.3390/app122010349.
Повний текст джерелаКниги з теми "Cryptomining"
Eliet, jean, and gaudin alexandre. Cryptominig: Comment Se Créer des Sources de Revenues Passifs en Minant de la Crypto-Monnaie. Independently Published, 2022.
Знайти повний текст джерелаЧастини книг з теми "Cryptomining"
Gangwal, Ankit, Samuele Giuliano Piazzetta, Gianluca Lain, and Mauro Conti. "Detecting Covert Cryptomining Using HPC." In Cryptology and Network Security, 344–64. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65411-5_17.
Повний текст джерелаJougleux, Philippe. "Legal Aspects of Malicious Cryptomining in the EU." In EU Internet Law in the Digital Single Market, 339–54. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69583-5_14.
Повний текст джерелаТези доповідей конференцій з теми "Cryptomining"
Carlin, Domhnall, Philip OrKane, Sakir Sezer, and Jonah Burgess. "Detecting Cryptomining Using Dynamic Analysis." In 2018 16th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2018. http://dx.doi.org/10.1109/pst.2018.8514167.
Повний текст джерелаTekiner, Ege, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, and Ali Aydin Selcuk. "In-Browser Cryptomining for Good: An Untold Story." In 2021 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS). IEEE, 2021. http://dx.doi.org/10.1109/dapps52256.2021.00008.
Повний текст джерелаWang, Peiran, Yuqiang Sun, Cheng Huang, Yutong Du, Genpei Liang, and Gang Long. "MineDetector: JavaScript Browser-side Cryptomining Detection using Static Methods." In 2021 IEEE 24th International Conference on Computational Science and Engineering (CSE). IEEE, 2021. http://dx.doi.org/10.1109/cse53436.2021.00022.
Повний текст джерелаKelton, Conor, Aruna Balasubramanian, Ramya Raghavendra, and Mudhakar Srivatsa. "Browser-Based Deep Behavioral Detection of Web Cryptomining with CoinSpy." In Workshop on Measurements, Attacks, and Defenses for the Web. Reston, VA: Internet Society, 2020. http://dx.doi.org/10.14722/madweb.2020.23002.
Повний текст джерелаMani, Ganapathy, Vikram Pasumarti, Bharat Bhargava, Faisal Tariq Vora, James MacDonald, Justin King, and Jason Kobes. "DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters." In 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems (ACSOS). IEEE, 2020. http://dx.doi.org/10.1109/acsos49614.2020.00032.
Повний текст джерелаZhang, Shize, Zhiliang Wang, Jiahai Yang, Xin Cheng, XiaoQian Ma, Hui Zhang, Bo Wang, Zimu Li, and Jianping Wu. "MineHunter: A Practical Cryptomining Traffic Detection Algorithm Based on Time Series Tracking." In ACSAC '21: Annual Computer Security Applications Conference. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3485832.3485835.
Повний текст джерелаLi, Zhi, Weijie Liu, Hongbo Chen, XiaoFeng Wang, Xiaojing Liao, Luyi Xing, Mingming Zha, Hai Jin, and Deqing Zou. "Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms." In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 2022. http://dx.doi.org/10.1109/sp46214.2022.9833803.
Повний текст джерелаLew, Roger, Ronald Boring, and Thomas Ulrich. "Envisioning 21st Century Mixed-Initiative Operations for Energy Systems." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002137.
Повний текст джерела