With the growing popularity of cryptocurrencies, which are an important part of day-to-day transactions over the Internet, the interest in being part of the so-called cryptomining service has attracted the attention of investors who wish to quickly earn profits by computing powerful transactional records towards the blockchain network. Since most users cannot afford the cost of specialized or standardized hardware for mining purposes, new techniques have been developed to make the latter easier, minimizing the computational cost required. Developers of large cryptocurrency houses have made available executable binaries and mainly browser-side scripts in order to authoritatively tap into users’ collective resources and effectively complete t...
© 2020 Elsevier B.V. In recent years, cryptocurrency trades have increased dramatically, and this tr...
Cryptojacking, a phenomenon also known as drive-by cryptomining, involves stealing computing power f...
The possibility of applying machine learning for the classification of malicious requests to aWeb ap...
With the growing popularity of cryptocurrencies, which are an important part of day-to-day transacti...
Cryptojacking or illegal mining is a form of malware that hides in the victim’s computer and takes t...
Cryptojacking is a type of computer piracy in which a hacker uses a victim’s computer resources, wit...
Nowadays, malware has become an epidemic problem. Among the attacks exploiting the computer resource...
Nowadays, malware has become an epidemic problem. Among the attacks exploiting the computer resource...
The metadata aspect of Domain Names (DNs) enables us to perform a behavioral study of DNs and detect...
Cybercriminals have been exploiting cryptocurrencies to commit various unique financial frauds. Cove...
A wave of alternative coins that can be effectively mined without specialized hardware, and a surge ...
Currently cryptocurrencies play an important role in our society. Their popularity has increased hug...
Cryptojacking is an act of using a victim\u27s computation power without his/her consent. Unauthoriz...
Since the release of a browser-based cryptominer by Coinhive in 2017, the easy use of these miners h...
The usage of anonymous proxies and virtual private network has increased due to the privacy and Inte...
© 2020 Elsevier B.V. In recent years, cryptocurrency trades have increased dramatically, and this tr...
Cryptojacking, a phenomenon also known as drive-by cryptomining, involves stealing computing power f...
The possibility of applying machine learning for the classification of malicious requests to aWeb ap...
With the growing popularity of cryptocurrencies, which are an important part of day-to-day transacti...
Cryptojacking or illegal mining is a form of malware that hides in the victim’s computer and takes t...
Cryptojacking is a type of computer piracy in which a hacker uses a victim’s computer resources, wit...
Nowadays, malware has become an epidemic problem. Among the attacks exploiting the computer resource...
Nowadays, malware has become an epidemic problem. Among the attacks exploiting the computer resource...
The metadata aspect of Domain Names (DNs) enables us to perform a behavioral study of DNs and detect...
Cybercriminals have been exploiting cryptocurrencies to commit various unique financial frauds. Cove...
A wave of alternative coins that can be effectively mined without specialized hardware, and a surge ...
Currently cryptocurrencies play an important role in our society. Their popularity has increased hug...
Cryptojacking is an act of using a victim\u27s computation power without his/her consent. Unauthoriz...
Since the release of a browser-based cryptominer by Coinhive in 2017, the easy use of these miners h...
The usage of anonymous proxies and virtual private network has increased due to the privacy and Inte...
© 2020 Elsevier B.V. In recent years, cryptocurrency trades have increased dramatically, and this tr...
Cryptojacking, a phenomenon also known as drive-by cryptomining, involves stealing computing power f...
The possibility of applying machine learning for the classification of malicious requests to aWeb ap...