Detecting Crypto Currency Mining in Corporate Environments

ثبت نشده
چکیده

After many discussions amongst friends and colleagues about the opportunities of mining crypto currencies, one could start wondering what kind of corporate resources can be utilized in order to do crypto currency mining, and how a company can protect against this kind of threat. Some will say that this is not a real threat for a company; however, some believe differently, which is explained in this paper. This research was performed, because there may be a need to professionally prepare and handle the misuse of corpor...

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Valuation of Crypto-Currency Mining Operations

Traditionally, the Net Present Value method is used to compare diverging investment strategies. However, valuating crypto-projects with fiat-based currency is confusing due to extreme coin appreciation rates as compared to fiat interest rates. Here, we provide a net present value method based on using crypto-coin as the underlying asset. Using this method, we compare HODL vs. mining, we also pr...

متن کامل

The Art of Crypto Currencies: A Comprehensive Analysis of Popular Crypto Currencies

Crypto Currencies have recently gained enormous popularity amongst the general public. With each passing day, more and more companies are radically accepting crypto currencies in their payment systems, paving way for an economic revolution. Currently more than 700 crypto-currencies are available at Coindesk alone for trade purposes. As of November 2016, the Crypto currencies hold a total market...

متن کامل

Identifying the software and their families using the exploration techniques of sequential patterns in dynamic analysis

Nowadays, crypto-ransomware is considered as one of the most threats in cybersecurity. Crypto ransomware removes data access by encrypting valuable data and requests a ransom payment to allow data decryption. As ransomware is still new in the field of cybersecurity, there are few pieces of research focusing on detecting ransomware samples. Most published works considered System File and process...

متن کامل

Profiling Smart Contracts Interactions Tensor Decomposition and Graph Mining

Smart contracts, computer protocols designed for autonomous execution on predefined conditions, arise from the evolution of the Bitcoin’s crypto-currency. They provide higher transaction security and allow economy of scale through the automated process. Smart contracts provides inherent benefits for financial institutions such as investment banking, retail banking, and insurance. This technolog...

متن کامل

Crypto Currencies and the Blockchain Technology: An Evolutionary Review of Money and the Payment Systems

In this paper we utilize the main findings from the recent literature to set the economic foundation for the existence of money, its modern interpretation as “memory” (Chokerlakota 1998) and how the Blockchain technology has empowered crypto currencies to perform this role in the information age.  To locate the issue in a historical perspective and in line with this strand of thought, we consid...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015