Author of the publication

A Large-scale Empirical Analysis of Ransomware Activities in Bitcoin.

, , , , , , and . ACM Trans. Web, 16 (2): 7:1-7:29 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Understanding the fairness of differentially private margin classifiers, , , and . World Wide Web, (2022)Security of e-systems., , and . Secur. Commun. Networks, 7 (2): 322-324 (2014)A Bitcoin Transaction Analyzing and Tracking Mechanism in Specified Network Zone., , , , and . J. Inf. Sci. Eng., 40 (2): 375-396 (March 2024)A Large-scale Empirical Analysis of Ransomware Activities in Bitcoin., , , , , , and . ACM Trans. Web, 16 (2): 7:1-7:29 (2022)TransPCFG: Transferring the Grammars From Short Passwords to Guess Long Passwords Effectively., , , , , and . IEEE Trans. Inf. Forensics Secur., (2021)Permission based Android security: Issues and countermeasures., , and . Comput. Secur., (2014)#Segments: A Dominant Factor of Password Security to Resist against Data-driven Guessing., , , , and . Comput. Secur., (2022)A trusted decentralized access control framework for the client/server architecture., , , and . J. Netw. Comput. Appl., 33 (2): 76-83 (2010)senDroid: Auditing Sensor Access in Android System-Wide., , , , , , and . IEEE Trans. Dependable Secur. Comput., 17 (2): 407-421 (2020)FETMS: Fast and Efficient Trust Management Scheme for Information-Centric Networking in Internet of Things., , , , , and . IEEE Access, (2019)