[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Cryptocurrency: Most Cited Blockchain Forensic Analysis Publications
- Subject: Cryptocurrency: Most Cited Blockchain Forensic Analysis Publications
- From: grarpamp at gmail.com (grarpamp)
- Date: Wed, 23 Jan 2019 19:58:58 -0500
https://blockchainlibrary.org/2017/11/most-cited-blockchain-forensic-analysis-publications/
https://steemit.com/@blockchainlib/
Most Cited Blockchain Forensic Analysis Publications
Last updated November 4th, 2017.
â??Trust among strangers in Internet transactions: Empirical
analysis of eBayâ??s reputation systemâ??. P Resnick, R Zeckhauser. 2002.
emeraldinsight.com The Economics of the Internet and â?¦. 2072 cites.
â??Bitcoin and beyond: A technical survey on decentralized digital
currenciesâ??. F Tschorsch, B Scheuermann. 2016. ieeexplore.ieee.org
IEEE Communications Surveys â?¦. 80 cites.
â??Protocols for secure electronic commerceâ??. MH Sherif. 2016.
books.google.com . 70 cites.
â??Cutting the gordian knot: A look under the hood of ransomware
attacksâ??. A Kharraz, W Robertson, D Balzarotti, L Bilgeâ?¦. 2015.
Springer â?¦ on Detection of â?¦. 57 cites.
â??Bitiodine: Extracting intelligence from the bitcoin networkâ??. M
Spagnuolo, F Maggi, S Zanero. 2014. Springer International Conference
on Financial â?¦. 52 cites.
â??Virtual currencies; Bitcoin & what now after Liberty Reserve,
Silk Road, and Mt. Gox?â??. LJ Trautman. 2014. papers.ssrn.com . 49
cites.
â??Mobile security technologyâ??. US Patent 9,014,661. 2015. Google
Patents. 48 cites.
â??Beyond Bitcoin: Issues in Regulating Blockchain Tranactionsâ??. TI
Kiviat. 2015. HeinOnline Duke LJ. 41 cites.
â??A learned representation for artistic styleâ??. V Dumoulin, J
Shlens, M Kudlur, A Behboodiâ?¦. 2016. arxiv.org arXiv preprint arXiv â?¦.
40 cites.
â??Corporate governance and blockchainsâ??. D Yermack. 2017.
academic.oup.com Review of Finance. 40 cites.
â??Information management systems on construction projects: case
reviewsâ??. N Craig, J Sommerville. 2006. emeraldinsight.com Records
Management Journal. 37 cites.
â??What will be the next records management orthodoxy?â??. J Lappin.
2010. emeraldinsight.com Records Management Journal. 37 cites.
â??Bitcoin: under the hoodâ??. A Zohar. 2015. dl.acm.org
Communications of the ACM. 28 cites.
â??Keeping authoritiesâ?? honest or bustâ?? with decentralized witness
cosigningâ??. E Syta, I Tamas, D Visher, DI Wolinskyâ?¦. 2016.
ieeexplore.ieee.org Security and Privacy â?¦. 26 cites.
â??Recordkeeping informatics: re-figuring a discipline in crisis
with a single minded approachâ??. F Upward, B Reed, G Oliverâ?¦. 2013.
emeraldinsight.com Records Management â?¦. 25 cites.
â??Medrec: Using blockchain for medical data access and permission
managementâ??. A Azaria, A Ekblaw, T Vieiraâ?¦. 2016. ieeexplore.ieee.org
Open and Big Data (OBD â?¦. 24 cites.
â??Near zero Bitcoin transaction fees cannot last foreverâ??. K
Kaskaloglu. 2014. sdiwc.net â?¦ Conference on Digital Security and
Forensics â?¦. 23 cites.
â??Trends, tips, tolls: A longitudinal study of Bitcoin transaction
feesâ??. M Möser, R Böhme. 2015. Springer â?¦ Conference on Financial
Cryptography and Data â?¦. 23 cites.
â??Daemonâ??. D Suarez. 2017. books.google.com . 16 cites.
â??Development of RMJ: A mirror of the development of the profession
and discipline of records managementâ??. J McLeod, C Hare. 2010.
emeraldinsight.com Records Management Journal. 16 cites.
â??Security protocols and evidence: Where many payment systems
failâ??. SJ Murdoch, R Anderson. 2014. Springer â?¦ on Financial
Cryptography and Data Security. 16 cites.
â??A survey of P2P Network securityâ??. L Washbourne. 2015. arxiv.org
arXiv preprint arXiv:1504.01358. 15 cites.
â??Blockchains and Bitcoin: Regulatory responses to
cryptocurrenciesâ??. A Guadamuz, C Marsden. 2015. papers.ssrn.com . 15
cites.
â??New Private Monies: A Bit-Part Player?â??. K Dowd. 2014.
papers.ssrn.com . 14 cites.
â??Identity-based remote data integrity checking with perfect data
privacy preserving for cloud storageâ??. Y Yu, MH Au, G Ateniese, X
Huangâ?¦. 2017. ieeexplore.ieee.org â?¦ Forensics and â?¦. 13 cites.
â??Security and privacy in decentralized energy trading through
multi-signatures, blockchain and anonymous messaging streamsâ??. NZ
Aitzhan, D Svetinovic. 2016. ieeexplore.ieee.org IEEE Transactions on
Dependable â?¦. 13 cites.
â??On the security of key extraction from measuring physical
quantitiesâ??. M Edman, A Kiayias, Q Tangâ?¦. 2016. ieeexplore.ieee.org â?¦
on Information Forensics â?¦. 12 cites.
â??Diplomatics of born digital documentsâ??considering documentary
form in a digital environmentâ??. C Rogers. 2015. emeraldinsight.com
Records Management Journal. 11 cites.
â??Listening to whispers of ripple: Linking wallets and
deanonymizing transactions in the ripple networkâ??. P Moreno-Sanchez,
MB Zafar, A Kate. 2016. degruyter.com Proceedings on Privacy â?¦. 11
cites.
â??On the properties of non-media digital watermarking: a review of
state of the art techniquesâ??. AS Panah, R Van Schyndel, T Sellis, E
Bertino. 2016. ieeexplore.ieee.org IEEE Access. 11 cites.
â??Reverse Engineering and Security Evaluation of Commercial Tags
for RFID-Based IoT Applicationsâ??. TM Fernández-Caramés, P
Fraga-Lamasâ?¦. 2016. mdpi.com Sensors. 11 cites.
â??A trustless privacy-preserving reputation systemâ??. A Schaub, R
Bazin, O Hasan, L Brunie. 2016. Springer IFIP International
Information â?¦. 10 cites.
â??Cyberspace and cybersecurityâ??. G Kostopoulos. 2017.
books.google.com . 10 cites.
â??Electronic Currency: The Potential Risks to National Security and
Methods to Minimize Themâ??. GN Vovchenko, NE Tishchenko, VT Epifanovaâ?¦.
2017. ersj.eu European Research â?¦. 9 cites.
â??Tackling the wicked problem of ERM: using the Cynefin framework
as a lensâ??. S Childs, J McLeod. 2013. emeraldinsight.com Records
Management Journal. 9 cites.
â??Virtual Currencies: Bitcoin & What Now after Liberty Reserve,
Silk Road, and Mt. Goxâ??. L Trautman. 2013. HeinOnline Rich. JL &
Tech.. 9 cites.
â??Bitcoin and the uniform commercial codeâ??. JL Schroeder. 2015.
HeinOnline U. Miami Bus. L. Rev.. 8 cites.
â??BitIodine: extracting intelligence from the Bitcoin networkâ??. M
Spagnuolo. 2013. politesi.polimi.it . 8 cites.
â??Cryptocurrency-Based Lawâ??. M Abramaowicz. 2016. HeinOnline Ariz.
L. Rev.. 8 cites.
â??P2P Mixing and Unlinkable Bitcoin Transactions.â??. T Ruffing, P
Moreno-Sanchezâ?¦. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint
â?¦. 8 cites.
â??Sovereign money: Beyond reserve bankingâ??. J Huber. 2016.
books.google.com . 8 cites.
â??A Case Study for Blockchain in Healthcare:â??MedRecâ?? prototype for
electronic health records and medical research dataâ??. A Ekblaw, A
Azaria, JD Halamkaâ?¦. 2016. healthit.gov â?¦ of IEEE Open & Big Data â?¦. 7
cites.
â??A dangerous trend of cybercrime: ransomware growing challengeâ??.
DPB Pathak, YM Nanded. 2016. ijarcet.org â?¦ Journal of Advanced
Research in Computer â?¦. 7 cites.
â??A Novel Multi-Focus Image Fusion Method Based on Stochastic
Coordinate Coding and Local Density Peaks Clusteringâ??. Z Zhu, G Qi, Y
Chai, Y Chen. 2016. mdpi.com Future Internet. 7 cites.
â??A Wearable Revolution: Is the smartwatch the next small big
thing?â??. M Kracheel, W Bronzi, H Kazemi. 2014. publications.uni.lu IT
ONE Magazine 2014. 7 cites.
â??Cryptocurrencies: The Next Generation of Terrorist Financing?â??.
AE Brill, L Keene. 2014. papers.ssrn.com . 7 cites.
â??The Unreasonable Effectiveness of Address Clusteringâ??. M
Harrigan, C Fretter. 2016. ieeexplore.ieee.org â?¦ Cloud and Big Data
Computing, Internet â?¦. 7 cites.
â??An Empirical Analysis of Linkability in the Monero Blockchainâ??. A
Miller, M Möser, K Lee, A Narayanan. 2017. arxiv.org arXiv preprint
arXiv:1704.04299. 6 cites.
â??Apple Pay, Bitcoin, and Consumers: The ABCs of Future Public
Payments Lawâ??. ME Burge. 2015. papers.ssrn.com . 6 cites.
â??Behind closed doors: measurement and analysis of CryptoLocker
ransoms in Bitcoinâ??. K Liao, Z Zhao, A Doupé, GJ Ahn. 2016.
ieeexplore.ieee.org Electronic Crime Research â?¦. 6 cites.
â??Blockchain-Based Database to Ensure Data Integrity in Cloud
Computing Environments.â??. E Gaetani, L Aniello, R Baldoni, F
Lombardiâ?¦. 2017. ceur-ws.org ITASEC. 6 cites.
â??Cryptocurrencies and business ethicsâ??. C Dierksmeier, P Seele.
2016. Springer Journal of Business Ethics. 6 cites.
â??Cryptocurrency: how bitcoin and digital money are challenging the
global economic orderâ??. P Vigna, MJ Casey. 2015. Random House . 6
cites.
â??International accounting standards and accounting quality in
code-law countries: The case of Egyptâ??. IES Ebaid. 2016.
emeraldinsight.com Journal of Financial Regulation and Compliance. 6
cites.
â??Privacy preserving Internet of Things: From privacy techniques to
a blueprint architecture and efficient implementationâ??. PP Jayaraman,
X Yang, A Yavariâ?¦. 2017. Elsevier Future Generation â?¦. 6 cites.
â??Bitcoin block withholding attack: Analysis and mitigationâ??. S
Bag, S Ruj, K Sakurai. 2017. ieeexplore.ieee.org â?¦ on Information
Forensics and â?¦. 5 cites.
â??Bitcoin-based fair payments for outsourcing computations of fog
devicesâ??. H Huang, X Chen, Q Wu, X Huang, J Shen. 2018. Elsevier
Future Generation Computer â?¦. 5 cites.
â??Entering the matrix: the challenge of regulating Radical Leveling
Technologiesâ??. JJ Snow. 2015. calhoun.nps.edu . 5 cites.
â??Music on the blockchainâ??. M Oâ??Dair, Z Beaven, D Neilson, R
Osborne, P Pacifico. 2016. eprints.mdx.ac.uk . 5 cites.
â??Provchain: A blockchain-based data provenance architecture in
cloud environment with enhanced privacy and availabilityâ??. X Liang, S
Shetty, D Tosh, C Kamhouaâ?¦. 2017. dl.acm.org Proceedings of the 17th
â?¦. 5 cites.
â??The implications of economic cybercrime for policingâ??. M Levi, A
Doig, R Gundur, D Wall, ML Williams. 2016. orca.cf.ac.uk . 5 cites.
â??Tomorrowâ??s Inheritance: The Frontiers of Estate Planning
Formalismâ??. D Horton. 2017. HeinOnline BCL Rev.. 5 cites.
â??â??Justice delayed is justice deniedâ?? Records management and the
travesty of justice in South Africaâ??. M Ngoepe, S Makhubela. 2015.
emeraldinsight.com Records Management Journal. 4 cites.
â??A New Framework for a Novel Lattice: 3D Printers, DNA
Fabricators, and the Perils in Regulating the Raw Materials of the
Next Era of Revolution, Renaissance, and â?¦â??. P Jensen-Haxel. 2015.
HeinOnline Wake Forest JL & Polâ??y. 4 cites.
â??Optimizing Governed Blockchains for Financial Process
Authenticationsâ??. LN Lundbaek, AC Dâ??Iddio, M Huth. 2016. arxiv.org
arXiv preprint arXiv:1612.00407. 4 cites.
â??Security of Electronic Payment Systems: A Comprehensive Surveyâ??.
S Solat. 2017. arxiv.org arXiv preprint arXiv:1701.04556. 4 cites.
â??The Decision to Produce Altcoins: Minersâ?? Arbitrage in
Cryptocurrency Marketsâ??. A Hayes. 2015. papers.ssrn.com Browser
Download This Paper. 4 cites.
â??Towards automated threat intelligence fusionâ??. A Modi, Z Sun, A
Panwar, T Khairnarâ?¦. 2016. ieeexplore.ieee.org â?¦ (CIC), 2016 IEEE â?¦. 4
cites.
â??A review of existing and emerging digital technologies to combat
the global trade in fake medicinesâ??. TK Mackey, G Nayyar. 2017. Taylor
& Francis Expert Opinion on Drug Safety. 3 cites.
â??A Survey on Security and Privacy Issues of Bitcoinâ??. M Conti, C
Lal, S Ruj. 2017. arxiv.org arXiv preprint arXiv:1706.00916. 3 cites.
â??A Traceability Analysis of Moneroâ??s Blockchain.â??. A Kumar, C
Fischer, S Tople, P Saxena. 2017. eprint.iacr.org IACR Cryptology
ePrint â?¦. 3 cites.
â??Decentralizing authorities into scalable strongest-link
cothoritiesâ??. E Syta, I Tamas, D Visherâ?¦. 2015.
pdfs.semanticscholar.org CoRR, abs â?¦. 3 cites.
â??Electronic Voting Service Using Block-Chainâ??. K Lee, JI James, TG
Ejetaâ?¦. 2016. search.proquest.com â?¦ Journal of Digital Forensics â?¦. 3
cites.
â??Investment funds, shadow banking and systemic riskâ??. E Bengtsson.
2016. emeraldinsight.com Journal of Financial Regulation and
Compliance. 3 cites.
â??Moneyâ??. J Huber. 2017. Springer Sovereign Money. 3 cites.
â??Radical Technologies: The Design of Everyday Lifeâ??. A Greenfield.
2017. books.google.com . 3 cites.
â??Security implications of blockchain cloud with analysis of block
withholding attackâ??. DK Tosh, S Shetty, X Liang, CA Kamhouaâ?¦. 2017.
dl.acm.org Proceedings of the 17th â?¦. 3 cites.
â??The Boardâ??s Responsibility for Crisis Governanceâ??. LJ Trautman.
2016. HeinOnline Hastings Bus. LJ. 3 cites.
â??The Scandal of Money: Why Wall Street Recovers But the Economy
Never Doesâ??. G Gilder. 2016. books.google.com . 3 cites.
â??The use of crypto-currencies in funding violent jihadâ??. ASM
Irwin, ASM Irwin, G Miladâ?¦. 2016. emeraldinsight.com Journal of Money
â?¦. 3 cites.
â??The WPA-Lancet Psychiatry Commission on the Future of
psychiatryâ??. D Bhugra, A Tasman, S Pathare, S Priebe, S Smithâ?¦. 2017.
Elsevier The Lancet â?¦. 3 cites.
â??Using crime data in academic research: issues of comparability
and integrityâ??. A Ludwig, M Marshall. 2015. emeraldinsight.com Records
Management Journal. 3 cites.
â??Why Wonâ??t Johnny Encrypt?â??. H Orman. 2015. ieeexplore.ieee.org
IEEE Internet Computing. 3 cites.
â??A Decentralized Anonymity-Preserving Reputation System with
Constant-time Score Retrieval.â??. R Bazin, A Schaub, O Hasanâ?¦. 2016.
pdfs.semanticscholar.org IACR Cryptology ePrint â?¦. 2 cites.
â??A Probabilistic Nanopayment Scheme for Golemâ??. P Bylica, L Glen,
P Janiuk, A Skrzypcaz, A Zawlocki. 2015. golemproject.net . 2 cites.
â??Analysis of the Cryptocurrency Marketplaceâ??. A Heid. 2013.
hackmiami.org Retrieved February. 2 cites.
â??BBDS: Blockchain-Based Data Sharing for Electronic Medical
Records in Cloud Environmentsâ??. Q Xia, EB Sifah, A Smahi, S Amofa, X
Zhang. 2017. mdpi.com Information. 2 cites.
â??Cyber Guerillaâ??. J Van Haaster, R Gevers, M Sprengers. 2016.
books.google.com . 2 cites.
â??Cybersecurity problems in a typical hospital (and probably in all
of them)â??. H Thimbleby. 2017. cronfa.swan.ac.uk . 2 cites.
â??Developing a comprehensive information security framework for
mHealth: a detailed analysisâ??. N Vithanwattana, G Mapp, C George.
2017. Springer Journal of Reliable Intelligent â?¦. 2 cites.
â??Digital Forensics: Threatscape and Best Practicesâ??. J Sammons.
2015. books.google.com . 2 cites.
â??Knowledge discovery from within: An examination of records
management and electronic records management syllabiâ??. DC Force, DC
Force, J Zhangâ?¦. 2016. emeraldinsight.com Records Management â?¦. 2
cites.
â??Peer-to-peer law, built on Bitcoinâ??. MB Abramowicz. 2015.
scholarship.law.gwu.edu . 2 cites.
â??Publics and counterpublics on the front page of the internet: The
cultural practices, technological affordances, hybrid economics and
politics of redditâ??s public â?¦â??. NJ Springer. 2015. search.proquest.com
. 2 cites.
â??Real-time digital signatures for time-critical networksâ??. AA
Yavuz, A Mudgerikar, A Singlaâ?¦. 2017. ieeexplore.ieee.org â?¦ Forensics
and â?¦. 2 cites.
â??Research Ideas for Artificial Intelligence in Auditing: The
Formalization of Audit and Workforce Supplementationâ??. H Issa, T Sun,
MA Vasarhelyi. 2016. aaajournals.org Journal of Emerging Technologies
â?¦. 2 cites.
â??Rich Credentials for Remote Identity Proofingâ??. K Lewison, F
Corella. 2016. pomcor.com . 2 cites.
â??Scaling SPADE to â??Big Provenanceâ??â??. A Gehani, H Kazmi, H Irshad.
2016. usenix.org â?¦ of the 8th USENIX Conference on Theory â?¦. 2 cites.
â??Scoping: Exploring a collective R&D process for entrepreneurs,
microenterprises, and SMEsâ??. S COULSON, M WOODS. 2016.
discovery.dundee.ac.uk the Proceedings of the 20th DMI â?¦. 2 cites.
â??Silicon to syringe: Cryptomarkets and disruptive innovation in
opioid supply chainsâ??. M Gilbert, N Dasgupta. 2017. Elsevier
International Journal of Drug Policy. 2 cites.
â??Social Palimpsestsâ??Clouding the Lens of the Personal Panopticonâ??.
N SHADBOLT. 2014. books.google.com â?¦ Yearbook 2014: Social Networks
and Social â?¦. 2 cites.
â??Strong Federations: An Interoperable Blockchain Solution to
Centralized Third Party Risksâ??. J Dilley, A Poelstra, J Wilkins, M
Piekarskaâ?¦. 2016. arxiv.org arXiv preprint arXiv â?¦. 2 cites.
â??Sustainability of bitcoin and blockchainsâ??. H Vranken. 2017.
Elsevier Current Opinion in Environmental Sustainability. 2 cites.
â??Systems and methods for executing cryptographically secure
transactions using voice and natural language processingâ??. MS Meadows.
2015. Google Patents US Patent App. 14/668,882. 2 cites.
â??The Alpha Engine: Designing an Automated Trading Algorithmâ??. A
Golub, J Glattfelder, RB Olsen. 2017. papers.ssrn.com . 2 cites.
â??The Anthropocene, resilience and post-colonial computationâ??. D
McQuillan. 2017. Taylor & Francis Resilience. 2 cites.
â??the Deep Webâ??. V Ciancaglini, M Balduzzi, R McArdle, M Rösler.
2015. trendmicro.nl Trend Micro. 2 cites.
â??The economics of crypto-democracyâ??. DWE Allen, C Berg, AM Lane, J
Potts. 2017. papers.ssrn.com . 2 cites.
â??Towards self-sovereign identity using blockchain technologyâ??. DS
Baars. 2016. essay.utwente.nl . 2 cites.
â??Trust Implications of DDoS Protection in Online Electionsâ??. C
Culnane, M Eldridge, A Essex, V Teague. 2017. Springer â?¦ Joint
Conference on â?¦. 2 cites.
â??Virtual currencies and the implications for US anti-money
laundering regulationsâ??. BA Pamplin. 2014. search.proquest.com . 2
cites.
â??What happened to global banking after the crisis?â??. D
Schoenmaker, D Schoenmaker. 2017. emeraldinsight.com Journal of
Financial â?¦. 2 cites.
â??A forensic look at Bitcoin cryptocurrencyâ??. MD Doran. 2014.
search.proquest.com . 1 cites.
â??An Analysis of Attacks on Blockchain Consensusâ??. G Bissias, BN
Levine, AP Ozisikâ?¦. 2016. arxiv.org arXiv preprint arXiv â?¦. 1 cites.
â??An Efficient E2E Verifiable E-voting System without Setup
Assumptionsâ??. A Kiayias, T Zacharias, B Zhang. 2017.
ieeexplore.ieee.org IEEE Security & Privacy. 1 cites.
â??An Introduction to the Blockchain and Its Implications for
Libraries and Medicineâ??. MB Hoy. 2017. Taylor & Francis Medical
Reference Services Quarterly. 1 cites.
â??Anonymity Properties of the Bitcoin P2P Networkâ??. G Fanti, P
Viswanath. 2017. arxiv.org arXiv preprint arXiv:1703.08761. 1 cites.
â??As technology goes democratic, nations lose military controlâ??. B
FitzGerald, J Parziale. 2017. Taylor & Francis Bulletin of the Atomic
Scientists. 1 cites.
â??Automatically Inferring Malware Signatures for Anti-Virus
Assisted Attacksâ??. C Wressnegger, K Freeman, F Yamaguchiâ?¦. 2017.
dl.acm.org â?¦ of the 2017 ACM on Asia â?¦. 1 cites.
â??Autonomous Weapon Systems and Strategic Stabilityâ??. J Altmann, F
Sauer. 2017. iiss.tandfonline.com Survival. 1 cites.
â??BITCOIN COMO ALTERNATIVA TRANSVERSAL DE INTERCAMBIO MONETARIO EN
LA ECONOMÃ?A DIGITALâ??. ZJP Cárdenas, MAV Avellanedaâ?¦. 2015.
revistas.udistrital.edu.co Redes de â?¦. 1 cites.
â??Bitcoin, the Law and Emerging Public Policy: Towards a 21st
Century Regulatory Schemeâ??. GM Karch. 2014. HeinOnline Fla. A & M UL
Rev.. 1 cites.
â??Bitcoin: Perils of an Unregulated Global P2P Currency (Transcript
of Discussion)â??. ST Ali. 2015. Springer Cambridge International
Workshop on Security â?¦. 1 cites.
â??BitIodine: Extracting Intelligence from the Bitcoin Networkâ??. F
Maggi, S Zanero, M Spagnuolo. 2014. . 1 cites.
â??Cloud as a Service: Understanding the Service Innovation
Ecosystemâ??. E Castro-Leon, R Harmon. 2016. books.google.com . 1 cites.
â??Conflict of Laws Cross to Public International Laws: The
Conflicting Models in the Conceptualisation of Disability Rights Under
International Humanitarian Law and â?¦â??. I Mugabi. 2015. papers.ssrn.com
. 1 cites.
â??Cyberinsurance Value Generator or Cost Burden?â??. SK Ishaq, C
CISA. 2016. isaca.org . 1 cites.
â??Data Analytics and Big Data: Opportunity or Threat for the
Accounting Profession?â??. G Richins, A Stapleton, TC Stratopoulos, C
Wong. 2016. papers.ssrn.com . 1 cites.
â??Dealer, Hacker, Lawyer, Spy. Modern Techniques and Legal
Boundaries of Counter-cybercrime Operationsâ??. K Bojarski. 2015.
academia.edu The European Review of Organised Crime. 1 cites.
â??Digital diplomatics and forensics: going forward on a global
basisâ??. FB Cohen. 2015. emeraldinsight.com Records Management Journal.
1 cites.
â??Digital diplomatics and measurement of electronic public data
qualities: What lessons should be learned?â??. B Makhlouf Shabou. 2015.
emeraldinsight.com Records Management Journal. 1 cites.
â??Digital Preservation: From Possible to Practicalâ??. G Dingwall.
2017. books.google.com Currents of Archival Thinking. 1 cites.
â??Disrupting Agents, Distributing Agencyâ??. CHP Zuckerman. 2017.
books.google.com Distributed Agency. 1 cites.
â??How companies achieve balance between technology enabled
innovation and cyber-securityâ??. NNN Nelson. 2016. dspace.mit.edu . 1
cites.
â??Incentivizing blockchain forks via whale transactionsâ??. K Liao, J
Katz. 2017. cs.umd.edu Bitcoin Workshop. 1 cites.
â??Information Security and Privacyâ??. JK Liu, R Steinfeld. 2007.
Springer . 1 cites.
â??Macroprudential policyâ??closing the financial stability gapâ??. S
Fahr, S Fahr, J Fell, J Fell. 2017. emeraldinsight.com Journal of
Financial Regulation â?¦. 1 cites.
â??MeDShare: Trust-Less Medical Data Sharing Among Cloud Service
Providers via Blockchainâ??. Q Xia, EB Sifah, KO Asamoah, J Gao, X Duâ?¦.
2017. ieeexplore.ieee.org IEEE â?¦. 1 cites.
â??MOBILE SECURITY TECHNOLOGYâ??. C Decharms. 2016.
freepatentsonline.com US Patent 20,160,192,166. 1 cites.
â??NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data
Sharing with Group Usersâ??. A Fu, S Yu, Y Zhang, H Wangâ?¦. 2017.
ieeexplore.ieee.org IEEE Transactions on Big â?¦. 1 cites.
â??Object-oriented diplomatics: Using archival diplomatics in
software application development to support authenticity of digital
recordsâ??. A Jansen. 2015. emeraldinsight.com Records Management
Journal. 1 cites.
â??P2P Mixing and Unlinkable P2P Transactionsâ??. P Moreno-Sanchez, T
Ruffing, A Kate. 2016. pdfs.semanticscholar.org Draft, June. 1 cites.
â??Personal Archive Service System using Blockchain Technology: Case
Study, Promising and Challengingâ??. Z Chen, Y Zhu. 2017.
ieeexplore.ieee.org AI & Mobile Services (AIMS), 2017 IEEE â?¦. 1 cites.
â??Preserving the Archival Bond in Distributed Ledgers: A Data Model
and Syntaxâ??. VL Lemieux, M Sporny. 2017. dl.acm.org â?¦ of the 26th
International Conference on World â?¦. 1 cites.
â??Privacy-preserving smart grid tariff decisions with
blockchain-based smart contractsâ??. F Knirsch, A Unterweger, G Eibl, D
Engel. 2018. Springer Sustainable Cloud and Energy â?¦. 1 cites.
â??Proof of Stake Blockchain: Performance and Scalability for
Groupware Communicationsâ??. J Spasovski, P Eklund. 2017.
researchgate.net Proceedings of the International â?¦. 1 cites.
â??Revisiting the effect of regulation, supervision and risk on
banking performance: Evidence from European banks based on PSTR
modelâ??. H Rachdi, F Ben Bouheni. 2016. emeraldinsight.com Journal of
Financial Regulation and â?¦. 1 cites.
â??Securing Claim Data via Block-Chains for a Peer to Peer
Platformâ??. W Slavin. 2016. Google Patents US Patent App. 15/004,702. 1
cites.
â??Security for 4G and 5G cellular networks: A survey of existing
authentication and privacy-preserving schemesâ??. MA Ferrag, L Maglaras,
A Argyriouâ?¦. 2017. arxiv.org arXiv preprint arXiv â?¦. 1 cites.
â??Short selling and the development of anti-shorting laws in the
UKâ??. A Mohamad. 2016. emeraldinsight.com Journal of Financial
Regulation and Compliance. 1 cites.
â??Software independence revisitedâ??. RL Rivest, M Virza. 2017.
people.csail.mit.edu â?¦ -World Electronic Voting: Design, Analysis â?¦. 1
cites.
â??Solving Modern Crime in Financial Markets: Analytics and Case
Studiesâ??. MC Frunza. 2015. books.google.com . 1 cites.
â??System and method for data management structure using auditable
delta records in a distributed environmentâ??. S Grefen, A Jaehde, D
Mackie. 2016. Google Patents US Patent App. 15/367,873. 1 cites.
â??The 21st Century Case for Gold: A New Information Theory of
Moneyâ??. G Gilder. 2016. thescienceexperience.org . 1 cites.
â??The Adoption Process of Cryptocurrencies-Identifying factors that
influence the adoption of cryptocurrencies from a multiple stakeholder
perspectiveâ??. HF Spenkelink. 2014. essay.utwente.nl . 1 cites.
â??The Challenge of Bitcoin Pseudo-Anonymity to Computer Forensicsâ??.
EJ Imwinkelried, J Luu. 2015. papers.ssrn.com . 1 cites.
â??The crowdjury, a crowdsourced justice system for the
collaboration eraâ??. F Ast, A Sewrjugin. 2015. weusecoins.com . 1
cites.
â??The measurement and regulation of shadow banking in Irelandâ??. J
Stewart, J Stewart, C Doyleâ?¦. 2017. emeraldinsight.com Journal of
Financial â?¦. 1 cites.
â??The New Market Manipulationâ??. TCW Lin. 2016. HeinOnline Emory LJ. 1 cites.
â??The Tao of open source intelligenceâ??. S Bertram. 2015.
books.google.com . 1 cites.
â??Time intervals as a Behavioral Biometricâ??. JV Monaco. 2015.
researchgate.net . 1 cites.
â??Towards an internet of trust: issues and solutions for
identification and authentication in the internet of thingsâ??. M
Signorini. 2015. tdx.cat . 1 cites.
â??Tracking digital footprints: anonymity within the bitcoin
systemâ??. P Reynolds, P Reynolds, ASM Irwinâ?¦. 2017. emeraldinsight.com
Journal of Money â?¦. 1 cites.
â??Uncoupling the relationship between corruption and money
laundering crimesâ??. N Mugarura. 2016. emeraldinsight.com Journal of
Financial Regulation and Compliance. 1 cites.
â??Virtual Currencies and Fundamental Rightsâ??. C Rueckert. 2016.
papers.ssrn.com Browser Download This Paper. 1 cites.
â??Visualization and Data Provenance Trends in Decision Support for
Cybersecurityâ??. J Garae, RKL Ko. 2017. Springer Data Analytics and
Decision Support for Cybersecurity. 1 cites.
â??When the cookie meets the blockchain: Privacy risks of web
payments via cryptocurrenciesâ??. S Goldfeder, H Kalodner, D Reismanâ?¦.
2017. arxiv.org arXiv preprint arXiv â?¦. 1 cites.
â??ТоÑ?ки Ñ?кономиÑ?еÑ?кого и инноваÑ?ионного Ñ?оÑ?Ñ?а: моделÑ? оÑ?ганизаÑ?ии
Ñ?Ñ?Ñ?екÑ?ивного Ñ?Ñ?нкÑ?иониÑ?ованиÑ? Ñ?егионаâ??. Ð?Ð? Ð?Ñ?Ñ?калÑ?Ñ?ева. 2017.
cyberleninka.ru Ð?Ð?Ð (Ð?одеÑ?низаÑ?иÑ?. Ð?нноваÑ?ии. РазвиÑ?ие). 1 cites.
â??â??SMARTâ?? CONTRACT MARKETS: TRADING DERIVATIVES CONTRACTS ON THE
BLOCKCHAINâ??. TI KIVIAT. 2015. pdfs.semanticscholar.org . 0 cites.
â??11th USENIX Symposium on Networked Systems Design and
Implementationâ??. S IX. 2016. enigma.usenix.org . 0 cites.
â??12 Social mediaâ??s impact on intellectual property rightsâ??. D
Collopy. 2017. books.google.com Handbook of Research on Counterfeiting
and Illicit â?¦. 0 cites.
â??3TH1CS: A reinvention of ethics in the digital age?â??. P Otto, E
Gräf. 2017. iRights Media . 0 cites.
â??4.25 Chromatic index/edge coloringâ??. M Lewenstein, S Pettieâ?¦.
2017. vesta.informatik.rwth-aachen.de â?¦ and Hardness in â?¦. 0 cites.
â??4-D COMMON OPERATIONAL PICTURE (COP) FOR MISSION ASSURANCE (4D
COP) Task Order 0001: Air Force Research Laboratory (AFRL) Autonomy
â?¦â??. PH Jones, KM Dye. 2016. dtic.mil . 0 cites.
â??4-D printing (four-dimensional printing)â??. A Rajey. 0.
tngconsultores.com. 0 cites.
â??A Bibliography of Oâ??Reilly & Associates and Oâ??Reilly Media. Inc.
Publishersâ??. NHF Beebe. 2017. 155.101.98.136 . 0 cites.
â??A blockchain future to Internet of Things security: A position
paperâ??. M Banerjee, J Lee, KKR Choo. 2017. Elsevier Digital
Communications and Networks. 0 cites.
â??A Block-Chain Implemented Voting Systemâ??. F Caiazzo, M Chow.
2016. cs.tufts.edu . 0 cites.
â??A Comprehensive Insight towards Research Direction in Information
Propagationâ??. N Kayarvizhy. 0. researchgate.net. 0 cites.
â??A conceptual framework for the Basel accords-based regulationâ??. J
Mohammed Ahmed. 2016. emeraldinsight.com Journal of Financial
Regulation and â?¦. 0 cites.
â??A Cross-Sectional Overview of Cryptoasset Governance and
Implications for Investorsâ??. N Carter. 0. coinmetrics.io. 0 cites.
â??A Distributed Public Key Infrastructure for the Web Backed by a
Blockchainâ??. B Fredriksson. 2017. diva-portal.org . 0 cites.
â??A Distributed X. 509 Public Key Infrastructure Backed by a
Blockchainâ??. B Fredriksson. 2017. helix.stormhub.org . 0 cites.
â??A GRAPH-BASED INVESTIGATION OF BITCOIN TRANSACTIONSâ??. C Zhao, Y
Guan. 2015. Springer IFIP International Conference on Digital
Forensics. 0 cites.
â??A novel method to authenticate in website using CAPTCHAâ??based
validationâ??. SK Krishnamoorthyâ?¦. 2016. Wiley Online Library Security
and â?¦. 0 cites.
â??A platform for end-to-end mobile application infrastructure
analytics using system log correlationâ??. V Ramakrishna, N Rajputâ?¦.
2017. ieeexplore.ieee.org IBM Journal of â?¦. 0 cites.
â??A proposal to improve the authentication process in m-health
environmentsâ??. FD Guillén-Gámez, I GarcÃa-Magariñoâ?¦. 2017.
ieeexplore.ieee.org IEEE â?¦. 0 cites.
â??A restful e-health interoperability platform: case of Nairobi
County health facilitiesâ??. DK Rono. 2016. su-plus.strathmore.edu . 0
cites.
â??A Scalable and Lightweight Grouping Proof Protocol for Internet
of Things Applicationsâ??. S Rostampour, N Bagheri, M Hosseinzadehâ?¦.
2017. Springer The Journal of â?¦. 0 cites.
â??A study of Bitcoin as a currency for email-based
micro-transactionsâ??. B Eriksson. 2016. diva-portal.org . 0 cites.
â??A Survey on FinTechâ??. K Gai, M Qiu, X Sun. 2017. Elsevier Journal
of Network and Computer Applications. 0 cites.
â??A Text-Independent Speaker Authentication System for Mobile
Devicesâ??. F Thullier, B Bouchard, BAJ Menelas. 2017. mdpi.com
Cryptography. 0 cites.
â??Adaptation 12 strategies of cybercriminals to interventions from
public and private sectorsâ??. F Jansen, J van Lenthe. 2016.
books.google.com Cybercrime Through an Interdisciplinary â?¦. 0 cites.
â??Advance Programâ??. P MobiApps, E SNAMS, ABA SITA. 2016.
ficloud.org . 0 cites.
â??Advances in Digital Forensics XIII: 13th IFIP WG 11.9
International Conference, Orlando, FL, USA, January 30-February 1,
2017, Revised Selected Papersâ??. G Peterson, S Shenoi. 2017.
books.google.com . 0 cites.
â??Advances in Internetworking, Data & Web Technologies: The 5th
International Conference on Emerging Internetworking, Data & Web
Technologies (EIDWT â?¦â??. L Barolli, M Zhang, XA Wang. 2017.
books.google.com . 0 cites.
â??Algorithmic governance: Developing a research agenda through the
power of collective intelligenceâ??. J Danaher, MJ Hogan, C Nooneâ?¦.
2017. journals.sagepub.com Big Data & â?¦. 0 cites.
â??Alumni USâ??. JP Mitrovic. 2010. alumnius.net The Center for
Leadership Studies Network at the â?¦. 0 cites.
â??Amazon Cloud Journalâ??. PR Newswire. 0. amazon.ulitzer.com. 0 cites.
â??American Kingpin: The Epic Hunt for the Criminal Mastermind
Behind the Silk Roadâ??. N Bilton. 2017. books.google.com . 0 cites.
â??American Kingpin: The Epic Hunt for the Criminal Mastermind
behind the Silk Road Drugs Empireâ??. N Bilton. 2017. Random House . 0
cites.
â??An Analysis of Energy and Hardware Impacts on the Bitcoin Mining
Networkâ??. J LEE, Y KIM. 0. jakehlee.com. 0 cites.
â??An approach for initiating interventions for bank recoveryâ??. CAE
Goodhart, CAE Goodhartâ?¦. 2017. emeraldinsight.com Journal of Financial
â?¦. 0 cites.
â??An Exploratory Analysis of the Security Risks of the Internet of
Things in Financeâ??. K Markantonakis. 2017. books.google.com Trust,
Privacy and Security in Digital Business â?¦. 0 cites.
â??An Exploratory Analysis of the Security Risks of the Internet of
Things in Financeâ??. C Shepherd, FAP Petitcolas, RN Akramâ?¦. 2017.
Springer â?¦ Conference on Trust â?¦. 0 cites.
â??An Innovative Merger of Academe and Corporation: A Non-Thesis
Distance Computing Mastersâ?? Degree with IBM Open Badging
Technologiesâ??. RF Roggio, K Shaik. 2017. search.proquest.com
International Conference on Computer â?¦. 0 cites.
â??Analysis of Bitcoin Transaction Flows to Reveal Usage and
Geographic Patternsâ??. SP Bissessar. 2013. nicolascourtois.com The New
York Times. 0 cites.
â??Analysis of Present Day Election Processes Vis-Ã?-Vis Elections
Through Blockchain Technologyâ??. K Hegadekatti. 2017. papers.ssrn.com .
0 cites.
â??Analysis of the impact of technological advances on financial
institutionsâ??. MJ Michalow. 2016. search.proquest.com . 0 cites.
â??and the Chair of the Applied Economics Department at the Sapir
Academic College. His main areas of interest are innovation and
high-tech policy, economic growth â?¦â??. R Bar-El. 2017.
emeraldinsight.com Human Capital and Assets in the Networked World. 0
cites.
â??Arbitrage and International Trade and Financeâ??. K Doshi. 2017.
qrius.com Science. 0 cites.
â??Artificial Intelligence and Blockchains in financial services.
Potential applications, challenges, and risksâ??. A Shet Shirodkar.
2017. content.grin.com . 0 cites.
â??Artificial Intelligenceâ??Fact or Fictionâ??. KVN Rajesh, KVN Ramesh.
2012. csi-india.org Computing NaNo. 0 cites.
â??Authenticated Data Redaction with Fine-Grained Controlâ??. J Ma, J
Liu, X Huang, Y Xiangâ?¦. 2017. ieeexplore.ieee.org IEEE Transactions on
â?¦. 0 cites.
â??Authorization by Documentsâ??. H Sato. 2017. jstage.jst.go.jp
Journal of Information Processing. 0 cites.
â??Automated Workflow Scheduling in Self-Adaptive Clouds: Concepts,
Algorithms and Methodsâ??. G Kousalya, P Balakrishnan, CP Raj. 2017.
Springer . 0 cites.
â??Automating the accounts payable processâ??. M Heusser. 0.
tngconsultores.com. 0 cites.
â??Automating the accounts payable processâ??. M Heusser. 0.
tngconsultores.com. 0 cites.
â??Backchanneling Quantum Bit (Qubit)â??Shufflingâ??: Quantum Bit
(Qubit)â??Shufflingâ??as Added Security by Slipstreaming Q-Morseâ??. J
Ronczka. 2016. ieeexplore.ieee.org Computer Science and Engineering
(APWC on â?¦. 0 cites.
â??Bare Feet Pat The Earth: Hardships, Future And Legislations For
The Salt Pan Workers In Kutchâ??. K Doshi. 2017. qrius.com Science. 0
cites.
â??Big Data Analytics: Opportunity or Threat for the Accounting
Profession?â??. G Richins, A Stapleton, TC Stratopoulosâ?¦. 2017.
aaajournals.org Journal of Information â?¦. 0 cites.
â??Big Data on Ulitzerâ??. M Walker, K Irwin. 0. bigdata.ulitzer.com. 0 cites.
â??Big Data Orchestration as a Service Networkâ??. C Esposito, A
Castiglioneâ?¦. 2017. ieeexplore.ieee.org IEEE Communications â?¦. 0
cites.
â??Bioengineering and biocrimeâ??. V Sutton. 2017. books.google.com
The Routledge Handbook of Technology, Crime and â?¦. 0 cites.
â??Bitcoin as an investment asset: The added value of bitcoin in a
global market portfolioâ??. S Klabbers. 2017. theses.ubn.ru.nl . 0
cites.
â??Bitcoin forensics: a tutorialâ??. D Neilson, S Hara, I Mitchell.
2017. Springer â?¦ Conference on Global Security, Safety, and â?¦. 0
cites.
â??Bitcoin regulations and investigations: A proposal for US
policiesâ??. JP Fawcett. 2017. search.proquest.com . 0 cites.
â??Bitcoin: Between Digital Currency and Financial Commodityâ??. ML
Perugini, C Maioli. 2014. papers.ssrn.com . 0 cites.
â??Bitcoin: Pyramid-scheme Wildfire, New Online Payment Medium, or
Future Alternative Currency?â??. H Vozak. 0. dspace.cuni.cz. 0 cites.
â??BITCOIN-BANKING AND TECHNOLOGICAL CHALLENGESâ??. G KunjadiÄ?. 0. . 0 cites.
â??BitIodine: Extracting Intelligence from the Bitcoin Networkâ??. D
NECSTLab. 2014. books.google.com Financial Cryptography and Data
Security: 18th â?¦. 0 cites.
â??BLOCK CHAIN BASED DATA LOGGING AND INTEGRITY MANAGEMENT SYSTEM
FOR CLOUD FORENSICSâ??. JH Park, JY Park, EN Huh. 0.
pdfs.semanticscholar.org. 0 cites.
â??Blockchain and Distributed Ledgers as Trusted Recordkeeping
Systemsâ??. VL Lemieux. 0. researchgate.net. 0 cites.
â??Blockchain as an Audit-Able Communication Channelâ??. S Suzuki, J
Murai. 2017. ieeexplore.ieee.org Computer Software and Applications â?¦.
0 cites.
â??Blockchain as an enabler for public mHealth solutions in South
Africaâ??. M WEISS, A BOTHA, M HERSELMAN, G LOOTS. 0. researchgate.net.
0 cites.
â??Blockchain entrepreneurship opportunity in the practices of the
unbankedâ??. GJ Larios-Hernández. 2017. Elsevier Business Horizons. 0
cites.
â??Blockchain Explorer: An Analytical Process and Investigation
Environment for Bitcoinâ??. H Kuzuno, C Karam. 0. ieeexplore.ieee.org. 0
cites.
â??Blockchain for smart grid resilience: Exchanging distributed
energy at speed, scale and securityâ??. M Mylrea, SNG Gourisetti. 2017.
ieeexplore.ieee.org Resilience Week (RWS), 2017. 0 cites.
â??Blockchain for the people: Blockchain technology as the basis for
a secure and reliable e-voting systemâ??. M Kovic. 2017. osf.io . 0
cites.
â??Blockchain or not blockchain, that is the question of the
insurance and other sectorsâ??. F Lamberti, V Gatteschi, C Demartiniâ?¦.
2017. ieeexplore.ieee.org IT â?¦. 0 cites.
â??Blockchain Security in Cloud Computing: Use Cases, Challenges,
and Solutionsâ??. JH Park, JH Park. 2017. mdpi.com Symmetry. 0 cites.
â??Blockchain: Emergent Industry Adoption and Implications for
Accountingâ??. J Kokina, R Manchaâ?¦. 2017. aaajournals.org Journal of
Emerging â?¦. 0 cites.
â??Blockchain: Vision and Challengesâ??. G Caglar, YS Hanay. 2016.
internetinitiative.ieee.org Newsletter. 0 cites.
â??Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and
Their Consensus Mechanismsâ??. A Judmayer, N Stifter, K Krombholzâ?¦.
2017. morganclaypool.com Synthesis Lectures on â?¦. 0 cites.
â??BlockSci: Design and applications of a blockchain analysis
platformâ??. H Kalodner, S Goldfeder, A Chator, M Möserâ?¦. 2017.
arxiv.org arXiv preprint arXiv â?¦. 0 cites.
â??Bobbies on the net: a police workforce for the digital ageâ??. A
Hitchcock, R Holmes, E Sundorph. 2017. reform.uk . 0 cites.
â??Breaking Data as a Service Newsâ??. PR Newswire. 0.
daas.ulitzer.com. 0 cites.
â??Breaking van Gogh: Saint-Rémy, Forgery, and the $95 Million Fake
at the Metâ??. JO Grundvig. 2016. books.google.com . 0 cites.
â??Buying Votes in the 21st Century: The Potential Use of Bitcoins
and Blockchain Technology in Electronic Voting Reformâ??. B Bogucki.
2017. HeinOnline Asper Rev. Intâ??l Bus. & Trade L.. 0 cites.
â??by System Administrator-Wednesday, 10 July 2013, 7: 26 PMâ??. H o
Milestones. 0. tngconsultores.com. 0 cites.
â??by System Administrator-Wednesday, 10 July 2013, 7: 26 PMâ??. H o
Milestones. 0. tngconsultores.com. 0 cites.
â??Call for Participantsâ??. JPY Regular, FT Student. 0.
jstage.jst.go.jp. 0 cites.
â??Career Summaryâ??. BM David. 0. bmdavid.com. 0 cites.
â??CEOs in Technologyâ??. FDA First. 0. ceo.ulitzer.com. 0 cites.
â??CHANGE HISTORYâ??. S MartÃn. 0. truessec.eu. 0 cites.
â??Changing the Practice of Law Leadershipâ??. K Grady. 0.
seytlines.com. 0 cites.
â??Changing the rules of the game: How can law enforcement deter
criminals by increasing the risks of conducting cybercrime?â??. P Amann,
A Klayn, G Mounier. 2017. ingentaconnect.com Cyber Security: A Peer â?¦.
0 cites.
â??Characterization of Counterfeit and Substandard Medicines Using
Capillary Electrophoresisâ??. JSS Rudaz. 2016. chromatographyonline.com
. 0 cites.
â??Child abuse materials as digital goods: Why we should fear new
commercial formsâ??. KV Acar. 2017. econstor.eu . 0 cites.
â??Chuncan Deng, Cheng Yang, Fangyong Xiao, Dajie Suolang and
Wenshan She. Accurate Recognition and Extraction of Massive Device
Monitoring Signals Based â?¦â??. AR Arban Uka, O Tahan, R Hawchar, F
Matar. 0. ieeexplore.ieee.org Algorithms. 0 cites.
â??Cloud as a Serviceâ??. E Castro-Leon, R Harmon. 0. Springer. 0 cites.
â??Cloud Computing as a Serviceâ??. E Castro-Leon, R Harmon. 2016.
Springer Cloud as a Service. 0 cites.
â??Cloud Storage: Background and Related Workâ??. J Reardon. 2016.
Springer Secure Data Deletion. 0 cites.
â??Command Disaggregation Attack and Mitigation in Industrial
Internet of Thingsâ??. P Xun, PD Zhu, YF Hu, PS Cui, Y Zhang. 2017.
mdpi.com Sensors. 0 cites.
â??Cómo funciona blockchain: Una explicación infográficaâ??. E
McLaughlin. 0. tngconsultores.com. 0 cites.
â??Computer Securityâ??ESORICS 2017: 22nd European Symposium on
Research in Computer Security, Oslo, Norway, September 11-15, 2017,
Proceedingsâ??. SN Foley, D Gollmann, E Snekkenes. 2017.
books.google.com . 0 cites.
â??CONNECTING MULTIPLE DEVICES WITH BLOCKCHAIN IN THE INTERNET OF
THINGSâ??. JJ Karst, G Brodar. 0. courses.cs.ut.ee. 0 cites.
â??Conspiracy Theories and Their Investigator (s), Matthew RX
Dentithâ??. MRX Dentith. 0. social-epistemology.com. 0 cites.
â??Constructing Narrative in the Contemporary Music Industriesâ??. K
Barr. 2017. joebennett.net Presented at IASPM. 0 cites.
â??Contemplating human-centred security & privacy research:
Suggesting future directionsâ??. K Renaud, S Flowerday. 2017. Elsevier
Journal of Information Security and Applications. 0 cites.
â??Contributions to Content Placement, Load-balancing and Caching:
System Design and Securityâ??. C Neumann. 2016. hal.inria.fr . 0 cites.
â??Controlling Cyberspaceâ??. D Lewis. 2017. qrius.com History. 0 cites.
â??Critical analysis and comparison of data protection techniques
for genomics data setsâ??. D Naro. 2016. upcommons.upc.edu . 0 cites.
â??CrowdBC: A Blockchain-based Decentralized Framework for
Crowdsourcingâ??. M Li, J Weng, A Yang, W Lu, Y Zhang, L Hou, J Liu. 0.
eprint.iacr.org. 0 cites.
â??Cryptocurrency the new money laundering problem for banking, law
enforcement, and the legal systemâ??. T Jacquez. 2016.
search.proquest.com . 0 cites.
â??Cryptographic Key Management in Delay Tolerant Networks: A
Surveyâ??. SA Menesidou, V Katos, G Kambourakis. 2017. mdpi.com Future
Internet. 0 cites.
â??Cryptographyâ??. B Buchanan. 2017. books.google.com . 0 cites.
â??Current State Survey and Future Opportunities for Trust and
Security in Green Cloud Computingâ??. A Haouari, Z Mostapha, S Yassir.
2018. igi-global.com Cloud Computing Technologies for â?¦. 0 cites.
â??Cyberspace Safety and Security: 9th International Symposium, CSS
2017, Xiâ??an China, October 23â??25, 2017, Proceedingsâ??. S Wen, W Wu, A
Castiglione. 2017. books.google.com . 0 cites.
â??Cyber-und Computerkriminalität: Prüfung doloser Handlungenâ??. A
Sowa. 2017. Springer Management der Informationssicherheit. 0 cites.
â??Cyrilic encryption based image Steganography algorithmâ??. V Shah.
2017. irjet.net . 0 cites.
â??D4. 1 Findings on economic modelling of malware as business
modelâ??. D Hurley-Smith. 0. . 0 cites.
â??Damon Liwanu McCoyâ??. CAD Grunwald, D Sicker. 0.
pdfs.semanticscholar.org. 0 cites.
â??Darknet Forensicsâ??. D Rathod. 0. ijettcs.org future. 0 cites.
â??Data and the Cityâ??. R Kitchin, TP Lauriault, G McArdle. 2017.
books.google.com . 0 cites.
â??Data provenance assurance in the cloud using blockchainâ??. S
Shetty, V Red, C Kamhoua, K Kwiatâ?¦. 2017. spiedigitallibrary.org â?¦ in
Sensors and â?¦. 0 cites.
â??Decentralized enforcement of document lifecycle constraintsâ??. S
Hallé, R Khoury, Q Betti, A El-Hokayem, Y Falcone. 2017. Elsevier
Information Systems. 0 cites.
â??DECIPHERING CRYPTOCURRENCY: SHINING A LIGHT ON THE DEEP DARK
WEBâ??. C DiPiero. 2017. litigation-essentials.lexisnexis.com U. Ill. L.
Rev.. 0 cites.
â??Deep web: Challenges of catching the cyber criminalâ??. N
Williamson. 2014. search.proquest.com . 0 cites.
â??Defence Against Terrorism Review-DATRâ??. A Richards. 0.
researchgate.net. 0 cites.
â??Defining cybercrime based on roles of data processing systemsâ??. X
Li. 2016. search.informit.com.au Pandoraâ??s Box. 0 cites.
â??Deliverable D5. 2.1-Conception Exploitation planâ??. P Meyer, M
Weinrich, S Custic, D Tofan, W Tremmelâ?¦. 0. acdc-project.eu. 0 cites.
â??De-SAG: On the De-anonymization of Structure-Attribute Graph
Dataâ??. S Ji, T Wang, J Chen, W Li, P Mittalâ?¦. 2017.
ieeexplore.ieee.org IEEE Transactions on â?¦. 0 cites.
â??Developing an adaptive Risk-based access control model for the
Internet of Thingsâ??. HF Atlam, A Alenezi, RJ Walters, GB Wills, J
Daniel. 2017. researchgate.net . 0 cites.
â??Development of Secure and Reliable Techniques for Data
Communicationâ??. A Mileva, P RM Inácio, S Bouyuklieva, N Stojkovicâ?¦.
2017. eprints.ugd.edu.mk . 0 cites.
â??Deviating From the Cybercriminal Script: Exploring Tools of
Anonymity (Mis) Used by Carders on Cryptomarketsâ??. GJ van Hardeveld, C
Webberâ?¦. 2017. journals.sagepub.com American Behavioral â?¦. 0 cites.
â??Digital Currencies: Unlocking the Secrets of Crypto-Currenciesâ??.
D Peterson. 2017. books.google.com . 0 cites.
â??Digital Currency: Risks, Rewards and Investigative Techniquesâ??. P
Kraus. 2017. search.proquest.com . 0 cites.
â??Digital Forensic Implications of Collusion Attacks on the
Lightning Networkâ??. D Piatkivskyi, S Axelsson, M Nowostawski. 2017.
Springer â?¦ on Digital Forensics. 0 cites.
â??Digital forensics: The smart personâ??s guideâ??. D Patterson. 0.
tngconsultores.com. 0 cites.
â??Digital forensics: The smart personâ??s guideâ??. D Patterson. 0.
tngconsultores.com. 0 cites.
â??Digital image integrityâ??a survey of protection and verification
techniquesâ??. P Korus. 2017. Elsevier Digital Signal Processing. 0
cites.
â??Digital Watermarking of Non-media data stream (applications)â??. A
Soltani Panah. 2017. researchbank.rmit.edu.au . 0 cites.
â??Digital Witness and Privacy in IoT: Anonymous Witnessing
Approachâ??. A Nieto, R Rios, J Lopez. 2017. ieeexplore.ieee.org
Trustcom/BigDataSE/ICESS, 2017 â?¦. 0 cites.
â??Digitaler Tatort, Sicherung und Verfolgung digitaler Spurenâ??. D
Pawlaszczyk. 2017. Springer Forensik in der digitalen Welt: Moderne
Methoden der â?¦. 0 cites.
â??Distributed Configuration, Authorization and Management in the
Cloud-Based Internet of Thingsâ??. M Henze, B Wolters, R Matzuttâ?¦. 2017.
ieeexplore.ieee.org â?¦ /ICESS, 2017 IEEE. 0 cites.
â??Do vouchers make a difference? A study of vouchers for improving
organizational capabilities in firmsâ??. E Magro. 2016. delegia.com
EU-SPRI CONFERENCE LUND 2016. 0 cites.
â??Donâ??t Dirty Green!â??. R Suryaprakash. 2017. qrius.com Science. 0 cites.
â??ED TECH TRENDS TO WATCHâ??. HOWABR LED. 0. pdf.101com.com. 0 cites.
â??Efficient private subset computationâ??. J Dou, L Gong, S Li, L Ma.
2016. Wiley Online Library Security and Communication â?¦. 0 cites.
â??Electronic financeâ??recent developmentsâ??. K Dandapani, K
Dandapani. 2017. emeraldinsight.com Managerial Finance. 0 cites.
â??Emergence of Fintech and cybersecurity in a global financial
centre: Strategic approach by a regulatorâ??. AW Ng, AW Ng, BKB Kwokâ?¦.
2017. emeraldinsight.com Journal of Financial â?¦. 0 cites.
â??Encyclopedia of Cyber Warfareâ??. PJ Springer. 2017.
books.google.com . 0 cites.
â??Energy-Efficient Distance-Bounding with Residual Charge
Computationâ??. Y Zhuang, A Yang, GP Hanckeâ?¦. 2017. ieeexplore.ieee.org
IEEE Transactions on â?¦. 0 cites.
â??Enhancing Breeder Document Long-Term Security Using Blockchain
Technologyâ??. N Buchmann, C Rathgeb, H Baierâ?¦. 2017.
ieeexplore.ieee.org â?¦ ), 2017 IEEE 41st â?¦. 0 cites.
â??Enhancing National Cybersecurity: The Current and Future States
of Cybersecurity in the Digital Economyâ??. T Patterson, E Liebig, R
Sapp, B Searcy, D Desaiâ?¦. 0. nist.gov. 0 cites.
â??Establishing Governance for Hybrid Cloud and the Internet of
Thingsâ??. M Wolfe. 2016. books.google.com Handbook of Research on
End-to-End Cloud â?¦. 0 cites.
â??Europe and MENA Cooperation Advances in Information and
Communication Technologiesâ??. Ã? Rocha, M Serrhini, C Felgueiras. 2017.
Springer . 0 cites.
â??Evolution of bitcoin and security risk in bitcoin walletsâ??. PK
Kaushal, A Bagga, R Sobti. 2017. ieeexplore.ieee.org â?¦ and Electronics
(Comptelix) â?¦. 0 cites.
â??Examining the forensic artifacts produced by use of bitcoin
currencyâ??. LD Jones. 2014. search.proquest.com . 0 cites.
â??Exploring the Essence of Records Management, Engaging with
Experts: Proceedingsâ??. R Barry. 2007. emeraldinsight.com Records
Management Journal. 0 cites.
â??FBI DIRECTOR COMEY NOT QUALIFIED TO DECIDE ON HILLARY
EMAILGATE-REWROTE LAWâ??. U CONFLICT, HISM CLINTON. 0. fbcoverup.com. 0
cites.
â??FDA Newsâ??. PR Newswire. 0. fda.ulitzer.com. 0 cites.
â??Financial Stability Governance Today: A Job Half Doneâ??. A Large.
0. group30.org. 0 cites.
â??Forenznà analýza sÃtÄ? Bitcoinâ??. PBT DROZDA, V VESELÃ?. 2016.
itspy.cz . 0 cites.
â??Four tips for effective software testingâ??. RF Goldsmith. 0.
tngconsultores.com. 0 cites.
â??From show on blog pageâ??. S Milan, E Treré. 0. data-activism.net. 0 cites.
â??From SMOG to Fog: A security perspectiveâ??. R Rios, R Roman, JA
Onievaâ?¦. 2017. ieeexplore.ieee.org Fog and Mobile Edge â?¦. 0 cites.
â??GI-Dagstuhl Seminar 16353 on Aware Machine to Machine
Communicationâ??. M Arumaithurai, S Sigg, X Wang. 0. dagstuhl.de. 0
cites.
â??Governing eMoney: On Bitcoin & Global Governanceâ??. DAL Pope, R
Marlin-Bennett. 2016. academia.edu . 0 cites.
â??Government Activities to Detect, Deter and Disrupt Threats
Enumerating from the Dark Webâ??. NV Denic. 2017. dtic.mil . 0 cites.
â??Government Newsâ??. A This. 0. gov.ulitzer.com. 0 cites.
â??Graph Analytics for Real-Time Scoring of Cross-Channel
Transactional Fraudâ??. I Molloy, S Chari, U Finkler, M Wiggermanâ?¦.
2016. Springer â?¦ Conference on Financial â?¦. 0 cites.
â??Graph Analytics for Real-Time Scoring of Cross-Channel
Transactional Fraudâ??. C Jonker, T Habeck, Y Park, F Jordensâ?¦. 0.
books.google.com â?¦ Cryptography and Data â?¦. 0 cites.
â??Graph-based forensic investigation of Bitcoin transactionsâ??. C
Zhao. 2014. lib.dr.iastate.edu . 0 cites.
â??Heritage. exe. The current state and future of Norwegian software
preservation-mapping the challenges of preserving locally executable
digital artifacts and the â?¦â??. TB Madsen. 2016. dspace.uib.no . 0
cites.
â??Himachal Pradesh, growing to prosperâ??. PS Vyas. 2017. qrius.com
Science. 0 cites.
â??Hitching Healthcare to the Chain: An Introduction to Blockchain
Technology in the Healthcare Sectorâ??. MA Engelhardt. 2017.
timreview.ca Technology Innovation Management Review. 0 cites.
â??How Sensitive Is Genetic Data?â??. M Sariyar, S Suhr, I Schlünder.
2017. online.liebertpub.com Biopreservation and â?¦. 0 cites.
â??HPCC-SmartCity-DSS 2016â??. X Ling, J Yang, D Wang, J Chen, L Li.
0. ieeexplore.ieee.org. 0 cites.
â??Human Capital and Assets in the Networked Worldâ??. M Russ. 2017.
emeraldinsight.com . 0 cites.
â??ICIOT 2017â??. M Hossain, R Hasan. 0. ieeexplore.ieee.org. 0 cites.
â??Identifying and analyzing digital payment flows regarding illegal
purposes on the Internet: I samarbete med CGI och Finanskoalitionenâ??.
C Berggren, J Asplund. 2016. diva-portal.org . 0 cites.
â??IEEE CCEM 2016 Program Detailsâ??. P Chelliah, A Mangalvedkar. 0.
ieeexplore.ieee.org. 0 cites.
â??II. Cyber-OC in the Netherlandsâ??. G Odinot, MA Verhoeven, RLD
Poolâ?¦. 0. researchgate.net Cyber-OCâ??Scope and â?¦. 0 cites.
â??Impact of Technology Innovation: A Study on Cloud Risk
Mitigationâ??. N Suresh, M Gupta. 2017. books.google.com Information
Technology Risk Management â?¦. 0 cites.
â??Incentive Compatibility of Pay Per Last N Shares in Bitcoin
Mining Poolsâ??. Y Zolotavkin, J GarcÃa, C Rudolph. 2017. Springer â?¦ on
Decision and Game Theory for â?¦. 0 cites.
â??Indian export competitiveness and performance: A long storyâ??. A
Kulkarni. 2017. qrius.com Science. 0 cites.
â??Indiana Journal of Law and Social Equalityâ??. M Selmi. 2014.
scholarship.law.gwu.edu . 0 cites.
â??Information Security and Privacy: 21st Australasian Conference,
ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedingsâ??.
JK Liu, R Steinfeld. 2016. books.google.com . 0 cites.
â??Infrastructure 2.0 Journalâ??. M Kim, DS Meliksetian, C Malone. 0.
infrastructure20.ulitzer.com. 0 cites.
â??Intellectual Property in Silicon Valleyâ??. PR Newswire. 0.
ip.ulitzer.com. 0 cites.
â??Internet Voting Using Zcashâ??. P Tarasov, H Tewari. 0.
allquantor.at. 0 cites.
â??Introduzione Agli Smart Contract (Introduction to Smart
Contract)â??. ML Perugini, P Dal Checco. 2015. papers.ssrn.com . 0
cites.
â??Investigation of Cryptocurrency Wallets on iOS and Android Mobile
Devices for Potential Forensic Artifactsâ??. A Montanez. 2014.
marshall.edu . 0 cites.
â??IoT based smart home: Security challenges, security requirements
and solutionsâ??. W Ali, G Dustgeer, M Awaisâ?¦. 2017. ieeexplore.ieee.org
â?¦ and Computing (ICAC) â?¦. 0 cites.
â??iPad on Ulitzerâ??. PR Newswire. 0. ipad.ulitzer.com. 0 cites.
â??Islamic State of Iraq and Syria Revenue Sources and
Countermeasures With a Specific Look at Cryptocurrency Useâ??. DM
Haines. 2017. search.proquest.com . 0 cites.
â??Itâ??s the Cyber Crime and Its Sponsors (Not My Cyber-Security),
Stupidâ??. D Lawrence, F Townsend, T Murphy, D Garrieâ?¦. 2016. HeinOnline
JL & Cyber â?¦. 0 cites.
â??JOnline: Dealing With Computer Fraudâ??. C Filip Van Hallewijn, A
CISM. 0. m.isaca.org. 0 cites.
â??JOURNAL OF LAW AND CYBER WARFAREâ??. S Comment. 0. jlcw.org. 0 cites.
â??Juridische beroepen in de toekomstâ??. MJ ter Voert, M Beenakkers.
0. researchgate.net. 0 cites.
â??Komparace právnÃch podmÃnek užità kryptomÄ?n ve Å výcarsku,
Spojených státech amerických a Japonskuâ??. A Yakimenka. 2017.
dspace.cuni.cz . 0 cites.
â??LAWNEWSâ??. J Ting-Edwards. 0. c-justice.com. 0 cites.
â??LE TRAFIC ILLICITE DE TABAC SUR LES CRYPTOMARCHÃ?Sâ??. D
Décary-Hétu, V Mousseau, I Rguioui. 2017. daviddhetu.openum.ca . 0
cites.
â??Learning Python for Forensicsâ??. P Miller, C Bryce. 2016.
books.google.com . 0 cites.
â??Legal Risks of Owning Cryptocurrenciesâ??. K Low, EGS Teo. 2016.
papers.ssrn.com . 0 cites.
â??LegalTech on the Rise: Technology Changes Legal Work Behaviours,
But Does Not Replace Its Professionâ??. MM Bues, E Matthaei. 2017.
Springer Liquid Legal. 0 cites.
â??Long term data storage using peer-to-peer technologyâ??. PN
Meessen, A de Vries. 2017. ru.nl . 0 cites.
â??Managing electronic records across organizational boundaries: The
experience of the Belgian federal government in automating
investigation processesâ??. L Maroye, L Maroye, S van Hoolandâ?¦. 2017.
emeraldinsight.com Records â?¦. 0 cites.
â??Matrix Accounting Illustrated: Contribution Marginâ??. M Hughes.
2016. Wiley Online Library Journal of Corporate Accounting & Finance.
0 cites.
â??MedRec: blockchain for medical data access, permission management
and trend analysisâ??. AC Ekblaw. 2017. dspace.mit.edu . 0 cites.
â??Memory Forensics and Bitcoin mining malwareâ??. P Dimotikalis.
2016. repository.ihu.edu.gr . 0 cites.
â??Mentoring in Cyber Education: Capture-the-Flag Exercises to
Promote Good Cyber Hygiene in Disadvantaged Populationsâ??. R Thomson.
0. westpoint.edu. 0 cites.
â??Method and apparatus for protecting digital photos from
alterationâ??. N Powers, TM Fortuna, P Kocsis. 2016. Google Patents US
Patent App. 15/260,074. 0 cites.
â??MMTC Communications-Frontiersâ??. A Costanzo, V Loscrì, S Costanzo.
0. mmc.committees.comsoc.org. 0 cites.
â??Mobile security technologyâ??. US Patent App. 14/476,629. 2014.
Google Patents. 0 cites.
â??Mobile security technologyâ??. US Patent App. 14/686,069. 2015.
Google Patents. 0 cites.
â??Money for Nothing and Bits for Free: The Geographies of Bitcoinâ??.
A Pel. 2015. tspace.library.utoronto.ca . 0 cites.
â??Má»?T Sá»? GIẢI PHÃ?P Vá»? PHÃ?T TRIá»?N NGUá»?N NHÃ?N Lá»°C CÃ?NG NGHá»? THÃ?NG TIN
TẠI VIá»?T NAM.â??. G Trần Thu. 2017. data.uet.vnu.edu.vn . 0 cites.
â??Moving One Step Ahead of the 90â??s Job Optionsâ??. RN Ahsan, A
Chatterjee. 2017. qrius.com Science. 0 cites.
â??Neuerwerbungen im Dezember 2016â??. A von Fürstenberg, CP Müllerâ?¦.
2016. ub.uni-heidelberg.de Ann Arbor: University of â?¦. 0 cites.
â??NIZKCTF: A Non-Interactive Zero-Knowledge Capture the Flag
Platformâ??. P Matias, P Barbosa, T Cardoso, D Marianoâ?¦. 2017. arxiv.org
arXiv preprint arXiv â?¦. 0 cites.
â??NUS Hackersâ??. IHA Git. 0. nushackers.org. 0 cites.
â??O novo eo atual na ArquivÃstica internacional: a
desmaterialização, a interoperabilidade, a organização eo uso da
informação em evidência (2011-2016)â??. MC Freitas, CG Silva. 2016.
bad.pt Actas do Encontro Nacional de Arquivos Municipais. 0 cites.
â??Online Anonymization Relating to Cyber Attacksâ??. J Cornwell.
2017. search.proquest.com . 0 cites.
â??Organised Cybercrime in the Netherlandsâ??. G Odinot, MA Verhoeven,
RLD Pool, CJ de Poot. 0. wodc.nl. 0 cites.
â??OSC Staff Notice 33-748-Annual Summary Report for Dealers,
Advisers and Investment Fund Managersâ??. Ontario Securities Commission.
2017. osc.gov.on.ca Update. 0 cites.
â??Overview and Comparison of P2P File Synchronization and Storage
Solutionsâ??. J Fröhlich, S Ruesch. 2015. csg.uzh.ch Communication
Systems VIII. 0 cites.
â??Peer-to-Peer Location-Based Services based on Blockchain and Web
Technologiesâ??. G Brambilla. 2017. dspace-unipr.cineca.it . 0 cites.
â??Periyar Journal of Research in Business and Development Studiesâ??.
S Chhabra, N Gangwar, AB Singhal, F Fatimaâ?¦. 0. pmccdelhi.com. 0
cites.
â??Periyar Journal of Research in Business and Development Studiesâ??.
S Singh. 0. pmccdelhi.com. 0 cites.
â??Personal control of privacy and data: Estonian experienceâ??. J
Priisalu, R Ottis. 2017. Springer Health and Technology. 0 cites.
â??Pharmaceutical News on Ulitzerâ??. PR Newswire. 0.
pharmaceuticals.ulitzer.com. 0 cites.
â??Pluralism and Economics Today: Understanding the ISIPE
Rebellionâ??. A Baksy. 2017. qrius.com Science. 0 cites.
â??Policing af kryptomarkederâ??. J Demant, R Munksgaard. 2017.
justitsministeriet.dk . 0 cites.
â??Predictive Computing and Information Securityâ??. PK Gupta, V
Tyagi, SK Singh. 2017. Springer . 0 cites.
â??Predictive Computing and Information Security: A Technical
Reviewâ??. PK Gupta, V Tyagi, SK Singh. 2017. Springer Predictive
Computing and Information â?¦. 0 cites.
â??Privacy in the Smart Cityâ??Applications, Technologies, Challenges
and Solutionsâ??. D Eckhoff, I Wagner. 2017. ieeexplore.ieee.org IEEE
Communications Surveys & â?¦. 0 cites.
â??Privacy Verification Chains for IoTâ??. N Foukia, D Billard, E
Solana. 2017. Springer International Conference on Network and â?¦. 0
cites.
â??Privacyâ??preserving smart data storage for financial industry in
cloud computingâ??. M Qiu, K Gai, H Zhao, M Liu. 0. Wiley Online Library
Concurrency and Computation: Practice â?¦. 0 cites.
â??Process memory investigation of the Bitcoin Clients Electrum and
Bitcoin Coreâ??. L van der Horst, KKR Choo, NA Le-Khac. 2017.
ieeexplore.ieee.org IEEE Access. 0 cites.
â??Prof J Maiti Head, I&SEâ??. PP Chakrabarti, IIT Director. 0.
iem.iitkgp.ernet.in. 0 cites.
â??Protecting Data Privacy in the Presence of Data Provenanceâ??. P
Kianmajd. 2017. search.proquest.com . 0 cites.
â??Provenance threat modelingâ??. O Hambolu, L Yu, J Oakley, RR
Brooksâ?¦. 2016. ieeexplore.ieee.org Privacy, Security and â?¦. 0 cites.
â??Public Evidence from Secret Ballotsâ??. J Benaloh, M Bernhard, JA
Haldermanâ?¦. 2017. arxiv.org arXiv preprint arXiv â?¦. 0 cites.
â??Quick Startâ??. MTWT Friday. 2016. wp.df.uba.ar . 0 cites.
â??Ransomware 7 and cryptocurrencyâ??. GJ Ahn, A Doupe, Z Zhao, K
Liao. 2016. books.google.com Cybercrime Through an â?¦. 0 cites.
â??Rarity trading legacy protection and digital convergence
platformâ??. MM Saigh, X Zhang. 2016. Google Patents US Patent App.
15/072,911. 0 cites.
â??Rational mining on bitcoinâ??. S Pachal. 2017. library.isical.ac.in
. 0 cites.
â??Rational Whistle Blower Prototypes Buch 1 Grundlagen, Ergebnisse
und Literaturâ??. G Förster. 2016. integrity-art.de . 0 cites.
â??Read The Manualâ??. M Faou, JI Boutin. 2017. welivesecurity.com . 0 cites.
â??RECALIBRATING LAW ENFORCEMENT TO KEEP PACE WITH NEW TECHNOLOGIES
AND FORMS OF CRIMEâ??. MM Oberoi. 0. idsa.in SECURING CYBERSPACE. 0
cites.
â??Recent Trends in Information and Communication Technology:
Proceedings of the 2nd International Conference of Reliable
Information and Communication â?¦â??. F Saeed, N Gazem, S Patnaik, ASS
Balaidâ?¦. 2017. books.google.com . 0 cites.
â??Recognition of Traffic Sign Based on Bag-of-Words and Artificial
Neural Networkâ??. KT Islam, RG Raj, G Mujtaba. 2017. mdpi.com Symmetry.
0 cites.
â??Reflections on the REST architectural style and principled design
of the modern web architecture (impact paper award)â??. RT Fielding, RN
Taylor, JR Erenkrantzâ?¦. 2017. dl.acm.org Proceedings of the â?¦. 0
cites.
â??Reflections upon periclitations in privacy: perspectives from
Rwandaâ??s digital transformationâ??. JP Nsengimana. 2017. Springer Health
and Technology. 0 cites.
â??Regulation based switching system for electronic message
routingâ??. J Crabtree, A Sellers, J Uchiyama. 2017. Google Patents US
Patent App. 15/489,716. 0 cites.
â??Report from GI-Dagstuhl Seminar 16394: Software Performance
Engineering in the DevOps Worldâ??. A van Hoorn, P Jamshidi, P Leitner,
I Weber. 2017. arxiv.org arXiv preprint arXiv â?¦. 0 cites.
â??Report of the second expert group meeting on opportunities and
risks associated with the advent of digital currency in the
Caribbeanâ??. NU CEPAL. 2015. repositorio.cepal.org . 0 cites.
â??Requisitos y soluciones de privacidad para la testificacion
digitalâ??. A Nieto, R Rios. 0. nics.uma.es. 0 cites.
â??Research Challenges in Financial Data Modeling and Analysisâ??. L
Alexander, SR Das, Z Ives, HV Jagadishâ?¦. 2017. online.liebertpub.com
Big â?¦. 0 cites.
â??Research Specialtiesâ??. T MOORE. 2016. tylermoore.ens.utulsa.edu
Computing. 0 cites.
â??Retrofit Device And Method Of Retrofitting A Flow Meterâ??. D
Mackie, S Grefen, CJ Boelterâ?¦. 2017. Google Patents US Patent App. 15
â?¦. 0 cites.
â??REXIT: What It Brings to Light About Term Lengthâ??. B Pratap.
2017. qrius.com Science. 0 cites.
â??Schöne neue Verbraucherwelt?â??. C Bala, W Schuldzinski. 0.
projekte.meine-verbraucherzentrale â?¦. 0 cites.
â??Searchain: Blockchain-based private keyword search in
decentralized storageâ??. P Jiang, F Guo, K Liang, J Lai, Q Wen. 2017.
Elsevier Future Generation Computer â?¦. 0 cites.
â??Section 75 and credit cards: misconceived interpretation?â??. J
Mukwiri. 2005. emeraldinsight.com Journal of Financial Regulation and
Compliance. 0 cites.
â??Secure lightweight context-driven data logging for bodyworn
sensing devicesâ??. M Siddiqi, ST All, V Sivaraman. 2017.
ieeexplore.ieee.org â?¦ Forensic and Security (ISDFS) â?¦. 0 cites.
â??Securing Fog Computing for Internet of Things Applications:
Challenges and Solutionsâ??. J Ni, K Zhang, X Lin, X Shen. 2017.
ieeexplore.ieee.org IEEE Communications Surveys & â?¦. 0 cites.
â??Securing the Assets of Decentralized Applications using Financial
Derivatives}}â??. G Bissias, BN Levine, N Kapadia, AP Ozisikâ?¦. 0.
people.cs.umass.edu Elsevier Child Abuse â?¦. 0 cites.
â??Security Enhancement of Digital Watermarkingâ??. MA Nematollahi, C
Vorakulpipat, HG Rosales. 2017. Springer Digital Watermarking. 0
cites.
â??Security Hands-On-Trainingâ??Part 6â??Finalâ??. L Rocha, I Handling. 0.
countuponsecurity.com. 0 cites.
â??SEEKING PAPERS ON COMPUTATIONAL SOCIAL SYSTEMSâ??. SD Computing, S
Computing. 0. ieeexplore.ieee.org. 0 cites.
â??Self-reported Verifiable Reputation with Rater Privacyâ??. R Bazin,
A Schaub, O Hasan, L Brunie. 2017. Springer IFIP International
Conference on â?¦. 0 cites.
â??Share and Share Alike: The challenges from social media for
Intellectual Property Rightsâ??. D Collopy. 2017. uhra.herts.ac.uk . 0
cites.
â??Small scale denial of service attacksâ??. V BukaÄ?. 0. is.muni.cz. 0 cites.
â??Smart Contracts: A Preliminary Evaluationâ??. ML Perugini, P Dal
Checco. 2015. papers.ssrn.com . 0 cites.
â??Snap forensics: a tradeoff between ephemeral intelligence and
persistent evidence collectionâ??. Y Yu, T Tun. 2017. oro.open.ac.uk . 0
cites.
â??Social, Cultural, and Behavioral Modelingâ??. D Lee, YR Lin, N
Osgood, R Thomson. 0. Springer. 0 cites.
â??Social, Cultural, and Behavioral Modeling: 10th International
Conference, SBP-BRiMS 2017, Washington, DC, USA, July 5-8, 2017,
Proceedingsâ??. D Lee, N Osgood, YR Lin, R Thomson. 2017.
books.google.com . 0 cites.
â??Sparse Encoded Matrix based Steganography algorithmâ??. V Shah.
2017. irjet.net . 0 cites.
â??Sticky policies approach within cloud computingâ??. G Spyra, WJ
Buchanan, E Ekonomou. 2017. Elsevier Computers & Security. 0 cites.
â??Students Link Brains to Fire Video Game Cannonâ??. J DORRIER. 0.
losnuevosguerreros.org. 0 cites.
â??Studi atas Pemanfaatan Blockchain bagi Internet of Things (IoT)â??.
L Arief, TA Sundara. 2017. jurnal.iaii.or.id Jurnal RESTI (Rekayasa
Sistem dan Teknologi â?¦. 0 cites.
â??Supporting users to take informed decisions on privacy settings
of personal devicesâ??. I Torre, OR Sanchez, F Koceva, G Adorni. 2017.
Springer Personal and Ubiquitous â?¦. 0 cites.
â??Systemic banking crises: completing the enhanced policy
responsesâ??. O Frecaut, O Frecaut. 2017. emeraldinsight.com Journal of
Financial Regulation and â?¦. 0 cites.
â??Tails Linux Operating System: Remaining Anonymous with the
Assistance of an Incognito System in Times of High Surveillanceâ??. M
Dawson, JA Cárdenas-Haro. 2017. igi-global.com � and the Internet of
Things (IJHIoT). 0 cites.
â??Tamper-Resistant Mobile Health Using Blockchain Technologyâ??. D
Ichikawa, M Kashiyama, T Ueno. 2017. ncbi.nlm.nih.gov JMIR mHealth and
uHealth. 0 cites.
â??TCCN Newsletterâ??. M Yannuzzi, R Milito, R Serral-Gracià , D
Monteroâ?¦. 0. cn.committees.comsoc.org. 0 cites.
â??Technologien, Forschungsfragen und Anwendungenâ??. J Schütte, G
Fridgen, W Prinz, T Rose, NU FITâ?¦. 0. aisec.fraunhofer.de. 0 cites.
â??TERRORIST USE OF VIRTUAL CURRENCIESâ??. ZK Goldman, E Maruyama, E
Rosenberg, E Saravalleâ?¦. 2017. caict.ac.cn . 0 cites.
â??The Bitcoin Guidebook: How to Obtain, Invest, and Spend the
Worldâ??s First Decentralized Cryptocurrencyâ??. I DeMartino. 2016.
books.google.com . 0 cites.
â??The Cyber Triadâ??. B Thijssen. 2016. researchgate.net . 0 cites.
â??The Establishment of Bitcoinâ??. P Hesch. 2017.
dspace.allegheny.edu . 0 cites.
â??The Evolving Cloudâ??. J Weinman. 2017. ieeexplore.ieee.org IEEE
Cloud Computing. 0 cites.
â??The global village and itâ??s back-breaking terrainâ??. JD Ostry.
2017. qrius.com Science. 0 cites.
â??The illicit drug trade on the dark net: Analysing the need for a
new EU Frameworkâ??. Y Hassan. 2017. openaccess.leidenuniv.nl . 0 cites.
â??The impact of Self-Generated Images in online pornographyâ??. A
Monaghan. 2017. eprints.mdx.ac.uk . 0 cites.
â??The Missing Account of Progressive Corporate Criminal Lawâ??. WS
Laufer. 2017. papers.ssrn.com . 0 cites.
â??The New Bio-Citizen: How the Democratization of Genomics Will
Transform Our Lives from Epidemics Management to the Internet of
Living Thingsâ??. E Pauwels. 0. wilsoncenter.org. 0 cites.
â??The Nuts and Bolts of Micropayments: A Surveyâ??. ST Ali, D Clarke,
P McCorry. 2017. arxiv.org arXiv preprint arXiv:1710.02964. 0 cites.
â??The Programmable Economy: Envisaging an Entire Planned Economic
System as a Single Computer Through Blockchain Networksâ??. K
Hegadekatti, Y SG. 2017. papers.ssrn.com . 0 cites.
â??The Tor browser: A forensic investigation studyâ??. K Keller. 2016.
search.proquest.com . 0 cites.
â??Threshold Single Password Authenticationâ??. D İÅ?ler, A Küpçü.
2017. Springer â?¦ Management, Cryptocurrencies and Blockchain â?¦. 0
cites.
â??Towards a leaner, smarter public-sector workforce.â??. A Hitchcock,
K Laycock, E Sundorph. 2017. reform.uk . 0 cites.
â??Towards an accountable software-defined networking architectureâ??.
BE Ujcich, A Miller, A Batesâ?¦. 2017. ieeexplore.ieee.org â?¦ (NetSoft),
2017 IEEE â?¦. 0 cites.
â??Towards Efficient and Secure Encrypted Databases: Extending
Message-Locked Encryption in Three-Party Modelâ??. Y Ishihara, T
Fujiwara. 2017. books.google.com â?¦ Blockchain Technology: ESORICS 2017
â?¦. 0 cites.
â??Towards Efficient and Secure Encrypted Databases: Extending
Message-Locked Encryption in Three-Party Modelâ??. Y Furuta, N Yanai, M
Karasaki, K Eguchiâ?¦. 2017. Springer â?¦ and Blockchain â?¦. 0 cites.
â??TOWARDS ENHANCING SECURITY IN CLOUD STORAGE ENVIRONMENTSâ??. D
Wilson. 2016. jscholarship.library.jhu.edu . 0 cites.
â??Trifling and Gambling with Virtual Moneyâ??. JT Holden. 2017.
papers.ssrn.com . 0 cites.
â??Trumpeting in the New Era of a Lean Technology-Driven Financial
Systemâ??. V Rule. 0. financialintergroup.com. 0 cites.
â??Trust Management in Fog Computingâ??. TS Dybedokken. 2017.
brage.bibsys.no . 0 cites.
â??Turkish Riviera, the Turquoise Coastâ??. PR Newswire. 0.
turkishriviera.ulitzer.com. 0 cites.
â??Typologies in Canadian Securities Fraud: An Impact Assessment on
Investor Protection, Money Laundering and the Financing of Terrorism
(AML/CFT), and Risk â?¦â??. R Ranjan. 2015. papers.ssrn.com . 0 cites.
â??Understanding Digital Crime, Trust, and Control in Blockchain
Technologiesâ??. JB Walton, G Dhillon. 2017. aisel.aisnet.org . 0 cites.
â??Unlocking Innovations and Competitive Advantage of State Bank of
Indiaâ??. B Jha, A Gulati, S Goyal, S Vig. 2017.
strategiesinemergingmarkets.com . 0 cites.
â??Use of Bitcoin in Online Travel Product Shopping: The European
Perspectiveâ??. D Leung, A Dickinger. 2017. Springer â?¦ and Communication
Technologies in Tourism 2017. 0 cites.
â??Using Blockchain for Research Transparencyâ??. K Opoku-Agyemang.
2017. osf.io . 0 cites.
â??Using blockchain for scientific transparencyâ??. KA Opoku-Agyemang.
2017. papers.ssrn.com . 0 cites.
â??Using Markov Models and Statistics to Learn, Extract, Fuse, and
Detect Patterns in Raw Dataâ??. RR Brooks, L Yu, Y Fu, G Cordone, J
Oakleyâ?¦. 2017. arxiv.org arXiv preprint arXiv â?¦. 0 cites.
â??Using the Blockchain to Secure Provenance Meta-Data (A CCoE
Webinar Presentation)â??. RR Brooks, A Skjellum. 2017.
scholarworks.iu.edu . 0 cites.
â??Using Tor in cybersecurity investigationsâ??. J Flanagan. 2015.
search.proquest.com . 0 cites.
â??Vers la sécurité mobile: caractérisation des attaques et
contremesuresâ??. Y Le Traon, JY Marion, F Massacci, S Limetâ?¦. 0.
tel.archives-ouvertes.fr. 0 cites.
â??Vers la sécurité mobile: caractérisation des attaques et
contremesuresâ??. JF Lalande. 2016.
hal-univ-orleans.archives-ouvertes.fr . 0 cites.
â??Video Integrity through Blockchain Technologyâ??. A Hemlin
Billström, F Huss. 2017. diva-portal.org . 0 cites.
â??Welcome Messageâ??. M Koscina, D Caragata, N Abdoun, S El Assadyâ?¦.
0. ieeexplore.ieee.org. 0 cites.
â??What Are They Really Up To? Activist Social Scientists Backpedal
on Conspiracy Theory Agenda, Kurtis Hagenâ??. L Basham. 0.
social-epistemology.com. 0 cites.
â??WHAT MAKES A CURRENCY?â??THE BITCOIN PHENOMENONâ??. EE LEWIS. 0.
researchgate.net. 0 cites.
â??Why Fintech Could Lead to More Financial Crimeâ??. C Harrington.
2017. CFA Institute CFA Institute Magazine. 0 cites.
â??Will Donald trump Hillaryâ??s Climb to the Top of the Everest?â??. A
Kulkarni. 2017. qrius.com Science. 0 cites.
â??Will Organizations Emerge as â??Hybrid Intelligencesâ?? from the
Digital Transformation?â??. W Leodolter. 2017. Springer â?¦ Transformation
Shaping the Subconscious Minds of â?¦. 0 cites.
â??Words to go: Data center design standards bodiesâ??. W Enterprises.
0. tngconsultores.com. 0 cites.
â??Zeng Chong, Huang Song, Yang Yongmingâ??. X Yang, D Ogawa, N Dai,
TTG Hoang, X Wang, X Zhouâ?¦. 0. ieeexplore.ieee.org. 0 cites.
â??Zwischen Online-Streife und Online-(Raster-) Fahndungâ??Ein Beitrag
zur Verarbeitung öffentlich zugänglicher Daten im
Ermittlungsverfahrenâ??. C Rückert. 2017. degruyter.com Zeitschrift für
die gesamte Strafrechtswissenschaft. 0 cites.
â??æ¯?ç?¹å¸?ä¸?æ³?å®?æ?°å?è´§å¸?â??. 秦波. 2017. jcr.cacrnet.org.cn å¯?ç ?妿?¥. 0 cites.