Here below is the list of Most Cited Publications about ‘Forensic Analysis’.

Last updated November 4th, 2017.

Most Cited ‘Forensic Analysis’ Publications

  1. Trust among strangers in Internet transactions: Empirical analysis of eBay’s reputation system“. P Resnick, R Zeckhauser. 2002. emeraldinsight.com The Economics of the Internet and …2072 cites.
  2. Bitcoin and beyond: A technical survey on decentralized digital currencies“. F Tschorsch, B Scheuermann. 2016. ieeexplore.ieee.org IEEE Communications Surveys …80 cites.
  3. Protocols for secure electronic commerce“. MH Sherif. 2016. books.google.com 70 cites.
  4. Cutting the gordian knot: A look under the hood of ransomware attacks“. A Kharraz, W Robertson, D Balzarotti, L Bilge…. 2015. Springer … on Detection of …57 cites.
  5. Bitiodine: Extracting intelligence from the bitcoin network“. M Spagnuolo, F Maggi, S Zanero. 2014. Springer International Conference on Financial …52 cites.
  6. Virtual currencies; Bitcoin & what now after Liberty Reserve, Silk Road, and Mt. Gox?“. LJ Trautman. 2014. papers.ssrn.com 49 cites.
  7. Mobile security technology“. US Patent 9,014,661. 2015. Google Patents48 cites.
  8. Beyond Bitcoin: Issues in Regulating Blockchain Tranactions“. TI Kiviat. 2015. HeinOnline Duke LJ41 cites.
  9. A learned representation for artistic style“. V Dumoulin, J Shlens, M Kudlur, A Behboodi…. 2016. arxiv.org arXiv preprint arXiv …40 cites.
  10. Corporate governance and blockchains“. D Yermack. 2017. academic.oup.com Review of Finance40 cites.
  11. Information management systems on construction projects: case reviews“. N Craig, J Sommerville. 2006. emeraldinsight.com Records Management Journal37 cites.
  12. What will be the next records management orthodoxy?“. J Lappin. 2010. emeraldinsight.com Records Management Journal37 cites.
  13. Bitcoin: under the hood“. A Zohar. 2015. dl.acm.org Communications of the ACM28 cites.
  14. Keeping authorities” honest or bust” with decentralized witness cosigning“. E Syta, I Tamas, D Visher, DI Wolinsky…. 2016. ieeexplore.ieee.org Security and Privacy …26 cites.
  15. Recordkeeping informatics: re-figuring a discipline in crisis with a single minded approach“. F Upward, B Reed, G Oliver…. 2013. emeraldinsight.com Records Management …25 cites.
  16. Medrec: Using blockchain for medical data access and permission management“. A Azaria, A Ekblaw, T Vieira…. 2016. ieeexplore.ieee.org Open and Big Data (OBD …24 cites.
  17. Near zero Bitcoin transaction fees cannot last forever“. K Kaskaloglu. 2014. sdiwc.net … Conference on Digital Security and Forensics  …23 cites.
  18. Trends, tips, tolls: A longitudinal study of Bitcoin transaction fees“. M Möser, R Böhme. 2015. Springer … Conference on Financial Cryptography and Data …23 cites.
  19. Daemon“. D Suarez. 2017. books.google.com 16 cites.
  20. Development of RMJ: A mirror of the development of the profession and discipline of records management“. J McLeod, C Hare. 2010. emeraldinsight.com Records Management Journal16 cites.
  21. Security protocols and evidence: Where many payment systems fail“. SJ Murdoch, R Anderson. 2014. Springer … on Financial Cryptography and Data Security16 cites.
  22. A survey of P2P Network security“. L Washbourne. 2015. arxiv.org arXiv preprint arXiv:1504.0135815 cites.
  23. Blockchains and Bitcoin: Regulatory responses to cryptocurrencies“. A Guadamuz, C Marsden. 2015. papers.ssrn.com 15 cites.
  24. New Private Monies: A Bit-Part Player?“. K Dowd. 2014. papers.ssrn.com 14 cites.
  25. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage“. Y Yu, MH Au, G Ateniese, X Huang…. 2017. ieeexplore.ieee.org … Forensics and …13 cites.
  26. Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams“. NZ Aitzhan, D Svetinovic. 2016. ieeexplore.ieee.org IEEE Transactions on Dependable …13 cites.
  27. On the security of key extraction from measuring physical quantities“. M Edman, A Kiayias, Q Tang…. 2016. ieeexplore.ieee.org … on Information Forensics …12 cites.
  28. Diplomatics of born digital documents–considering documentary form in a digital environment“. C Rogers. 2015. emeraldinsight.com Records Management Journal11 cites.
  29. Listening to whispers of ripple: Linking wallets and deanonymizing transactions in the ripple network“. P Moreno-Sanchez, MB Zafar, A Kate. 2016. degruyter.com Proceedings on Privacy …11 cites.
  30. On the properties of non-media digital watermarking: a review of state of the art techniques“. AS Panah, R Van Schyndel, T Sellis, E Bertino. 2016. ieeexplore.ieee.org IEEE Access11 cites.
  31. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications“. TM Fernández-Caramés, P Fraga-Lamas…. 2016. mdpi.com Sensors11 cites.
  32. A trustless privacy-preserving reputation system“. A Schaub, R Bazin, O Hasan, L Brunie. 2016. Springer IFIP International Information …10 cites.
  33. Cyberspace and cybersecurity“. G Kostopoulos. 2017. books.google.com 10 cites.
  34. Electronic Currency: The Potential Risks to National Security and Methods to Minimize Them“. GN Vovchenko, NE Tishchenko, VT Epifanova…. 2017. ersj.eu European Research …9 cites.
  35. Tackling the wicked problem of ERM: using the Cynefin framework as a lens“. S Childs, J McLeod. 2013. emeraldinsight.com Records Management Journal9 cites.
  36. Virtual Currencies: Bitcoin & What Now after Liberty Reserve, Silk Road, and Mt. Gox“. L Trautman. 2013. HeinOnline Rich. JL & Tech.9 cites.
  37. Bitcoin and the uniform commercial code“. JL Schroeder. 2015. HeinOnline U. Miami Bus. L. Rev.8 cites.
  38. BitIodine: extracting intelligence from the Bitcoin network“. M Spagnuolo. 2013. politesi.polimi.it 8 cites.
  39. Cryptocurrency-Based Law“. M Abramaowicz. 2016. HeinOnline Ariz. L. Rev.8 cites.
  40. P2P Mixing and Unlinkable Bitcoin Transactions.“. T Ruffing, P Moreno-Sanchez…. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint …8 cites.
  41. Sovereign money: Beyond reserve banking“. J Huber. 2016. books.google.com 8 cites.
  42. A Case Study for Blockchain in Healthcare:“MedRec” prototype for electronic health records and medical research data“. A Ekblaw, A Azaria, JD Halamka…. 2016. healthit.gov … of IEEE Open & Big Data …7 cites.
  43. A dangerous trend of cybercrime: ransomware growing challenge“. DPB Pathak, YM Nanded. 2016. ijarcet.org … Journal of Advanced Research in Computer …7 cites.
  44. A Novel Multi-Focus Image Fusion Method Based on Stochastic Coordinate Coding and Local Density Peaks Clustering“. Z Zhu, G Qi, Y Chai, Y Chen. 2016. mdpi.com Future Internet7 cites.
  45. A Wearable Revolution: Is the smartwatch the next small big thing?“. M Kracheel, W Bronzi, H Kazemi. 2014. publications.uni.lu IT ONE Magazine 20147 cites.
  46. Cryptocurrencies: The Next Generation of Terrorist Financing?“. AE Brill, L Keene. 2014. papers.ssrn.com 7 cites.
  47. The Unreasonable Effectiveness of Address Clustering“. M Harrigan, C Fretter. 2016. ieeexplore.ieee.org … Cloud and Big Data Computing, Internet …7 cites.
  48. An Empirical Analysis of Linkability in the Monero Blockchain“. A Miller, M Möser, K Lee, A Narayanan. 2017. arxiv.org arXiv preprint arXiv:1704.042996 cites.
  49. Apple Pay, Bitcoin, and Consumers: The ABCs of Future Public Payments Law“. ME Burge. 2015. papers.ssrn.com 6 cites.
  50. Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin“. K Liao, Z Zhao, A Doupé, GJ Ahn. 2016. ieeexplore.ieee.org Electronic Crime Research …6 cites.
  51. Blockchain-Based Database to Ensure Data Integrity in Cloud Computing Environments.“. E Gaetani, L Aniello, R Baldoni, F Lombardi…. 2017. ceur-ws.org ITASEC6 cites.
  52. Cryptocurrencies and business ethics“. C Dierksmeier, P Seele. 2016. Springer Journal of Business Ethics6 cites.
  53. Cryptocurrency: how bitcoin and digital money are challenging the global economic order“. P Vigna, MJ Casey. 2015. Random House 6 cites.
  54. International accounting standards and accounting quality in code-law countries: The case of Egypt“. IES Ebaid. 2016. emeraldinsight.com Journal of Financial Regulation and Compliance6 cites.
  55. Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation“. PP Jayaraman, X Yang, A Yavari…. 2017. Elsevier Future Generation …6 cites.
  56. Bitcoin block withholding attack: Analysis and mitigation“. S Bag, S Ruj, K Sakurai. 2017. ieeexplore.ieee.org … on Information Forensics and …5 cites.
  57. Bitcoin-based fair payments for outsourcing computations of fog devices“. H Huang, X Chen, Q Wu, X Huang, J Shen. 2018. Elsevier Future Generation Computer …5 cites.
  58. Entering the matrix: the challenge of regulating Radical Leveling Technologies“. JJ Snow. 2015. calhoun.nps.edu 5 cites.
  59. Music on the blockchain“. M O’Dair, Z Beaven, D Neilson, R Osborne, P Pacifico. 2016. eprints.mdx.ac.uk 5 cites.
  60. Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability“. X Liang, S Shetty, D Tosh, C Kamhoua…. 2017. dl.acm.org Proceedings of the 17th …5 cites.
  61. The implications of economic cybercrime for policing“. M Levi, A Doig, R Gundur, D Wall, ML Williams. 2016. orca.cf.ac.uk 5 cites.
  62. Tomorrow’s Inheritance: The Frontiers of Estate Planning Formalism“. D Horton. 2017. HeinOnline BCL Rev.5 cites.
  63. “Justice delayed is justice denied” Records management and the travesty of justice in South Africa“. M Ngoepe, S Makhubela. 2015. emeraldinsight.com Records Management Journal4 cites.
  64. A New Framework for a Novel Lattice: 3D Printers, DNA Fabricators, and the Perils in Regulating the Raw Materials of the Next Era of Revolution, Renaissance, and …“. P Jensen-Haxel. 2015. HeinOnline Wake Forest JL & Pol’y4 cites.
  65. Optimizing Governed Blockchains for Financial Process Authentications“. LN Lundbaek, AC D’Iddio, M Huth. 2016. arxiv.org arXiv preprint arXiv:1612.004074 cites.
  66. Security of Electronic Payment Systems: A Comprehensive Survey“. S Solat. 2017. arxiv.org arXiv preprint arXiv:1701.045564 cites.
  67. The Decision to Produce Altcoins: Miners’ Arbitrage in Cryptocurrency Markets“. A Hayes. 2015. papers.ssrn.com Browser Download This Paper4 cites.
  68. Towards automated threat intelligence fusion“. A Modi, Z Sun, A Panwar, T Khairnar…. 2016. ieeexplore.ieee.org … (CIC), 2016 IEEE …4 cites.
  69. A review of existing and emerging digital technologies to combat the global trade in fake medicines“. TK Mackey, G Nayyar. 2017. Taylor & Francis Expert Opinion on Drug Safety3 cites.
  70. A Survey on Security and Privacy Issues of Bitcoin“. M Conti, C Lal, S Ruj. 2017. arxiv.org arXiv preprint arXiv:1706.009163 cites.
  71. A Traceability Analysis of Monero’s Blockchain.“. A Kumar, C Fischer, S Tople, P Saxena. 2017. eprint.iacr.org IACR Cryptology ePrint …3 cites.
  72. Decentralizing authorities into scalable strongest-link cothorities“. E Syta, I Tamas, D Visher…. 2015. pdfs.semanticscholar.org CoRR, abs …3 cites.
  73. Electronic Voting Service Using Block-Chain“. K Lee, JI James, TG Ejeta…. 2016. search.proquest.com … Journal of Digital Forensics …3 cites.
  74. Investment funds, shadow banking and systemic risk“. E Bengtsson. 2016. emeraldinsight.com Journal of Financial Regulation and Compliance3 cites.
  75. Money“. J Huber. 2017. Springer Sovereign Money3 cites.
  76. Radical Technologies: The Design of Everyday Life“. A Greenfield. 2017. books.google.com 3 cites.
  77. Security implications of blockchain cloud with analysis of block withholding attack“. DK Tosh, S Shetty, X Liang, CA Kamhoua…. 2017. dl.acm.org Proceedings of the 17th …3 cites.
  78. The Board’s Responsibility for Crisis Governance“. LJ Trautman. 2016. HeinOnline Hastings Bus. LJ3 cites.
  79. The Scandal of Money: Why Wall Street Recovers But the Economy Never Does“. G Gilder. 2016. books.google.com 3 cites.
  80. The use of crypto-currencies in funding violent jihad“. ASM Irwin, ASM Irwin, G Milad…. 2016. emeraldinsight.com Journal of Money …3 cites.
  81. The WPA-Lancet Psychiatry Commission on the Future of psychiatry“. D Bhugra, A Tasman, S Pathare, S Priebe, S Smith…. 2017. Elsevier The Lancet …3 cites.
  82. Using crime data in academic research: issues of comparability and integrity“. A Ludwig, M Marshall. 2015. emeraldinsight.com Records Management Journal3 cites.
  83. Why Won’t Johnny Encrypt?“. H Orman. 2015. ieeexplore.ieee.org IEEE Internet Computing3 cites.
  84. A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval.“. R Bazin, A Schaub, O Hasan…. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint …2 cites.
  85. A Probabilistic Nanopayment Scheme for Golem“. P Bylica, L Glen, P Janiuk, A Skrzypcaz, A Zawlocki. 2015. golemproject.net 2 cites.
  86. Analysis of the Cryptocurrency Marketplace“. A Heid. 2013. hackmiami.org Retrieved February2 cites.
  87. BBDS: Blockchain-Based Data Sharing for Electronic Medical Records in Cloud Environments“. Q Xia, EB Sifah, A Smahi, S Amofa, X Zhang. 2017. mdpi.com Information2 cites.
  88. Cyber Guerilla“. J Van Haaster, R Gevers, M Sprengers. 2016. books.google.com 2 cites.
  89. Cybersecurity problems in a typical hospital (and probably in all of them)“. H Thimbleby. 2017. cronfa.swan.ac.uk 2 cites.
  90. Developing a comprehensive information security framework for mHealth: a detailed analysis“. N Vithanwattana, G Mapp, C George. 2017. Springer Journal of Reliable Intelligent …2 cites.
  91. Digital Forensics: Threatscape and Best Practices“. J Sammons. 2015. books.google.com 2 cites.
  92. Knowledge discovery from within: An examination of records management and electronic records management syllabi“. DC Force, DC Force, J Zhang…. 2016. emeraldinsight.com Records Management …2 cites.
  93. Peer-to-peer law, built on Bitcoin“. MB Abramowicz. 2015. scholarship.law.gwu.edu 2 cites.
  94. Publics and counterpublics on the front page of the internet: The cultural practices, technological affordances, hybrid economics and politics of reddit’s public …“. NJ Springer. 2015. search.proquest.com 2 cites.
  95. Real-time digital signatures for time-critical networks“. AA Yavuz, A Mudgerikar, A Singla…. 2017. ieeexplore.ieee.org … Forensics and …2 cites.
  96. Research Ideas for Artificial Intelligence in Auditing: The Formalization of Audit and Workforce Supplementation“. H Issa, T Sun, MA Vasarhelyi. 2016. aaajournals.org Journal of Emerging Technologies …2 cites.
  97. Rich Credentials for Remote Identity Proofing“. K Lewison, F Corella. 2016. pomcor.com 2 cites.
  98. Scaling SPADE to “Big Provenance”“. A Gehani, H Kazmi, H Irshad. 2016. usenix.org … of the 8th USENIX Conference on Theory …2 cites.
  99. Scoping: Exploring a collective R&D process for entrepreneurs, microenterprises, and SMEs“. S COULSON, M WOODS. 2016. discovery.dundee.ac.uk the Proceedings of the 20th DMI …2 cites.
  100. Silicon to syringe: Cryptomarkets and disruptive innovation in opioid supply chains“. M Gilbert, N Dasgupta. 2017. Elsevier International Journal of Drug Policy2 cites.
  101. Social Palimpsests–Clouding the Lens of the Personal Panopticon“. N SHADBOLT. 2014. books.google.com … Yearbook 2014: Social Networks and Social …2 cites.
  102. Strong Federations: An Interoperable Blockchain Solution to Centralized Third Party Risks“. J Dilley, A Poelstra, J Wilkins, M Piekarska…. 2016. arxiv.org arXiv preprint arXiv …2 cites.
  103. Sustainability of bitcoin and blockchains“. H Vranken. 2017. Elsevier Current Opinion in Environmental Sustainability2 cites.
  104. Systems and methods for executing cryptographically secure transactions using voice and natural language processing“. MS Meadows. 2015. Google Patents US Patent App. 14/668,8822 cites.
  105. The Alpha Engine: Designing an Automated Trading Algorithm“. A Golub, J Glattfelder, RB Olsen. 2017. papers.ssrn.com 2 cites.
  106. The Anthropocene, resilience and post-colonial computation“. D McQuillan. 2017. Taylor & Francis Resilience2 cites.
  107. the Deep Web“. V Ciancaglini, M Balduzzi, R McArdle, M Rösler. 2015. trendmicro.nl Trend Micro2 cites.
  108. The economics of crypto-democracy“. DWE Allen, C Berg, AM Lane, J Potts. 2017. papers.ssrn.com 2 cites.
  109. Towards self-sovereign identity using blockchain technology“. DS Baars. 2016. essay.utwente.nl 2 cites.
  110. Trust Implications of DDoS Protection in Online Elections“. C Culnane, M Eldridge, A Essex, V Teague. 2017. Springer … Joint Conference on …2 cites.
  111. Virtual currencies and the implications for US anti-money laundering regulations“. BA Pamplin. 2014. search.proquest.com 2 cites.
  112. What happened to global banking after the crisis?“. D Schoenmaker, D Schoenmaker. 2017. emeraldinsight.com Journal of Financial …2 cites.
  113. A forensic look at Bitcoin cryptocurrency“. MD Doran. 2014. search.proquest.com 1 cites.
  114. An Analysis of Attacks on Blockchain Consensus“. G Bissias, BN Levine, AP Ozisik…. 2016. arxiv.org arXiv preprint arXiv …1 cites.
  115. An Efficient E2E Verifiable E-voting System without Setup Assumptions“. A Kiayias, T Zacharias, B Zhang. 2017. ieeexplore.ieee.org IEEE Security & Privacy1 cites.
  116. An Introduction to the Blockchain and Its Implications for Libraries and Medicine“. MB Hoy. 2017. Taylor & Francis Medical Reference Services Quarterly1 cites.
  117. Anonymity Properties of the Bitcoin P2P Network“. G Fanti, P Viswanath. 2017. arxiv.org arXiv preprint arXiv:1703.087611 cites.
  118. As technology goes democratic, nations lose military control“. B FitzGerald, J Parziale. 2017. Taylor & Francis Bulletin of the Atomic Scientists1 cites.
  119. Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks“. C Wressnegger, K Freeman, F Yamaguchi…. 2017. dl.acm.org … of the 2017 ACM on Asia …1 cites.
  120. Autonomous Weapon Systems and Strategic Stability“. J Altmann, F Sauer. 2017. iiss.tandfonline.com Survival1 cites.
  121. BITCOIN COMO ALTERNATIVA TRANSVERSAL DE INTERCAMBIO MONETARIO EN LA ECONOMÍA DIGITAL“. ZJP Cárdenas, MAV Avellaneda…. 2015. revistas.udistrital.edu.co Redes de …1 cites.
  122. Bitcoin, the Law and Emerging Public Policy: Towards a 21st Century Regulatory Scheme“. GM Karch. 2014. HeinOnline Fla. A & M UL Rev.1 cites.
  123. Bitcoin: Perils of an Unregulated Global P2P Currency (Transcript of Discussion)“. ST Ali. 2015. Springer Cambridge International Workshop on Security …1 cites.
  124. BitIodine: Extracting Intelligence from the Bitcoin Network“. F Maggi, S Zanero, M Spagnuolo. 2014. . 1 cites.
  125. Cloud as a Service: Understanding the Service Innovation Ecosystem“. E Castro-Leon, R Harmon. 2016. books.google.com 1 cites.
  126. Conflict of Laws Cross to Public International Laws: The Conflicting Models in the Conceptualisation of Disability Rights Under International Humanitarian Law and …“. I Mugabi. 2015. papers.ssrn.com 1 cites.
  127. Cyberinsurance Value Generator or Cost Burden?“. SK Ishaq, C CISA. 2016. isaca.org 1 cites.
  128. Data Analytics and Big Data: Opportunity or Threat for the Accounting Profession?“. G Richins, A Stapleton, TC Stratopoulos, C Wong. 2016. papers.ssrn.com 1 cites.
  129. Dealer, Hacker, Lawyer, Spy. Modern Techniques and Legal Boundaries of Counter-cybercrime Operations“. K Bojarski. 2015. academia.edu The European Review of Organised Crime1 cites.
  130. Digital diplomatics and forensics: going forward on a global basis“. FB Cohen. 2015. emeraldinsight.com Records Management Journal1 cites.
  131. Digital diplomatics and measurement of electronic public data qualities: What lessons should be learned?“. B Makhlouf Shabou. 2015. emeraldinsight.com Records Management Journal1 cites.
  132. Digital Preservation: From Possible to Practical“. G Dingwall. 2017. books.google.com Currents of Archival Thinking1 cites.
  133. Disrupting Agents, Distributing Agency“. CHP Zuckerman. 2017. books.google.com Distributed Agency1 cites.
  134. How companies achieve balance between technology enabled innovation and cyber-security“. NNN Nelson. 2016. dspace.mit.edu 1 cites.
  135. Incentivizing blockchain forks via whale transactions“. K Liao, J Katz. 2017. cs.umd.edu Bitcoin Workshop1 cites.
  136. Information Security and Privacy“. JK Liu, R Steinfeld. 2007. Springer 1 cites.
  137. Macroprudential policy–closing the financial stability gap“. S Fahr, S Fahr, J Fell, J Fell. 2017. emeraldinsight.com Journal of Financial Regulation …1 cites.
  138. MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain“. Q Xia, EB Sifah, KO Asamoah, J Gao, X Du…. 2017. ieeexplore.ieee.org IEEE …1 cites.
  139. MOBILE SECURITY TECHNOLOGY“. C Decharms. 2016. freepatentsonline.com US Patent 20,160,192,1661 cites.
  140. NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users“. A Fu, S Yu, Y Zhang, H Wang…. 2017. ieeexplore.ieee.org IEEE Transactions on Big …1 cites.
  141. Object-oriented diplomatics: Using archival diplomatics in software application development to support authenticity of digital records“. A Jansen. 2015. emeraldinsight.com Records Management Journal1 cites.
  142. P2P Mixing and Unlinkable P2P Transactions“. P Moreno-Sanchez, T Ruffing, A Kate. 2016. pdfs.semanticscholar.org Draft, June1 cites.
  143. Personal Archive Service System using Blockchain Technology: Case Study, Promising and Challenging“. Z Chen, Y Zhu. 2017. ieeexplore.ieee.org AI & Mobile Services (AIMS), 2017 IEEE …1 cites.
  144. Preserving the Archival Bond in Distributed Ledgers: A Data Model and Syntax“. VL Lemieux, M Sporny. 2017. dl.acm.org … of the 26th International Conference on World …1 cites.
  145. Privacy-preserving smart grid tariff decisions with blockchain-based smart contracts“. F Knirsch, A Unterweger, G Eibl, D Engel. 2018. Springer Sustainable Cloud and Energy …1 cites.
  146. Proof of Stake Blockchain: Performance and Scalability for Groupware Communications“. J Spasovski, P Eklund. 2017. researchgate.net Proceedings of the International …1 cites.
  147. Revisiting the effect of regulation, supervision and risk on banking performance: Evidence from European banks based on PSTR model“. H Rachdi, F Ben Bouheni. 2016. emeraldinsight.com Journal of Financial Regulation and …1 cites.
  148. Securing Claim Data via Block-Chains for a Peer to Peer Platform“. W Slavin. 2016. Google Patents US Patent App. 15/004,7021 cites.
  149. Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes“. MA Ferrag, L Maglaras, A Argyriou…. 2017. arxiv.org arXiv preprint arXiv …1 cites.
  150. Short selling and the development of anti-shorting laws in the UK“. A Mohamad. 2016. emeraldinsight.com Journal of Financial Regulation and Compliance1 cites.
  151. Software independence revisited“. RL Rivest, M Virza. 2017. people.csail.mit.edu … -World Electronic Voting: Design, Analysis …1 cites.
  152. Solving Modern Crime in Financial Markets: Analytics and Case Studies“. MC Frunza. 2015. books.google.com 1 cites.
  153. System and method for data management structure using auditable delta records in a distributed environment“. S Grefen, A Jaehde, D Mackie. 2016. Google Patents US Patent App. 15/367,8731 cites.
  154. The 21st Century Case for Gold: A New Information Theory of Money“. G Gilder. 2016. thescienceexperience.org 1 cites.
  155. The Adoption Process of Cryptocurrencies-Identifying factors that influence the adoption of cryptocurrencies from a multiple stakeholder perspective“. HF Spenkelink. 2014. essay.utwente.nl 1 cites.
  156. The Challenge of Bitcoin Pseudo-Anonymity to Computer Forensics“. EJ Imwinkelried, J Luu. 2015. papers.ssrn.com 1 cites.
  157. The crowdjury, a crowdsourced justice system for the collaboration era“. F Ast, A Sewrjugin. 2015. weusecoins.com 1 cites.
  158. The measurement and regulation of shadow banking in Ireland“. J Stewart, J Stewart, C Doyle…. 2017. emeraldinsight.com Journal of Financial …1 cites.
  159. The New Market Manipulation“. TCW Lin. 2016. HeinOnline Emory LJ1 cites.
  160. The Tao of open source intelligence“. S Bertram. 2015. books.google.com 1 cites.
  161. Time intervals as a Behavioral Biometric“. JV Monaco. 2015. researchgate.net 1 cites.
  162. Towards an internet of trust: issues and solutions for identification and authentication in the internet of things“. M Signorini. 2015. tdx.cat 1 cites.
  163. Tracking digital footprints: anonymity within the bitcoin system“. P Reynolds, P Reynolds, ASM Irwin…. 2017. emeraldinsight.com Journal of Money …1 cites.
  164. Uncoupling the relationship between corruption and money laundering crimes“. N Mugarura. 2016. emeraldinsight.com Journal of Financial Regulation and Compliance1 cites.
  165. Virtual Currencies and Fundamental Rights“. C Rueckert. 2016. papers.ssrn.com Browser Download This Paper1 cites.
  166. Visualization and Data Provenance Trends in Decision Support for Cybersecurity“. J Garae, RKL Ko. 2017. Springer Data Analytics and Decision Support for Cybersecurity1 cites.
  167. When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies“. S Goldfeder, H Kalodner, D Reisman…. 2017. arxiv.org arXiv preprint arXiv …1 cites.
  168. Точки экономического и инновационного роста: модель организации эффективного функционирования региона“. ДД Буркальцева. 2017. cyberleninka.ru МИР (Модернизация. Инновации. Развитие)1 cites.
  169. “SMART” CONTRACT MARKETS: TRADING DERIVATIVES CONTRACTS ON THE BLOCKCHAIN“. TI KIVIAT. 2015. pdfs.semanticscholar.org 0 cites.
  170. 11th USENIX Symposium on Networked Systems Design and Implementation“. S IX. 2016. enigma.usenix.org 0 cites.
  171. 12 Social media’s impact on intellectual property rights“. D Collopy. 2017. books.google.com Handbook of Research on Counterfeiting and Illicit …0 cites.
  172. 3TH1CS: A reinvention of ethics in the digital age?“. P Otto, E Gräf. 2017. iRights Media 0 cites.
  173. 4.25 Chromatic index/edge coloring“. M Lewenstein, S Pettie…. 2017. vesta.informatik.rwth-aachen.de … and Hardness in …0 cites.
  174. 4-D COMMON OPERATIONAL PICTURE (COP) FOR MISSION ASSURANCE (4D COP) Task Order 0001: Air Force Research Laboratory (AFRL) Autonomy …“. PH Jones, KM Dye. 2016. dtic.mil 0 cites.
  175. 4-D printing (four-dimensional printing)“. A Rajey. 0. tngconsultores.com0 cites.
  176. A Bibliography of O’Reilly & Associates and O’Reilly Media. Inc. Publishers“. NHF Beebe. 2017. 155.101.98.136 0 cites.
  177. A blockchain future to Internet of Things security: A position paper“. M Banerjee, J Lee, KKR Choo. 2017. Elsevier Digital Communications and Networks0 cites.
  178. A Block-Chain Implemented Voting System“. F Caiazzo, M Chow. 2016. cs.tufts.edu 0 cites.
  179. A Comprehensive Insight towards Research Direction in Information Propagation“. N Kayarvizhy. 0. researchgate.net0 cites.
  180. A conceptual framework for the Basel accords-based regulation“. J Mohammed Ahmed. 2016. emeraldinsight.com Journal of Financial Regulation and …0 cites.
  181. A Cross-Sectional Overview of Cryptoasset Governance and Implications for Investors“. N Carter. 0. coinmetrics.io0 cites.
  182. A Distributed Public Key Infrastructure for the Web Backed by a Blockchain“. B Fredriksson. 2017. diva-portal.org 0 cites.
  183. A Distributed X. 509 Public Key Infrastructure Backed by a Blockchain“. B Fredriksson. 2017. helix.stormhub.org 0 cites.
  184. A GRAPH-BASED INVESTIGATION OF BITCOIN TRANSACTIONS“. C Zhao, Y Guan. 2015. Springer IFIP International Conference on Digital Forensics0 cites.
  185. A novel method to authenticate in website using CAPTCHA‐based validation“. SK Krishnamoorthy…. 2016. Wiley Online Library Security and …0 cites.
  186. A platform for end-to-end mobile application infrastructure analytics using system log correlation“. V Ramakrishna, N Rajput…. 2017. ieeexplore.ieee.org IBM Journal of …0 cites.
  187. A proposal to improve the authentication process in m-health environments“. FD Guillén-Gámez, I García-Magariño…. 2017. ieeexplore.ieee.org IEEE …0 cites.
  188. A restful e-health interoperability platform: case of Nairobi County health facilities“. DK Rono. 2016. su-plus.strathmore.edu 0 cites.
  189. A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications“. S Rostampour, N Bagheri, M Hosseinzadeh…. 2017. Springer The Journal of …0 cites.
  190. A study of Bitcoin as a currency for email-based micro-transactions“. B Eriksson. 2016. diva-portal.org 0 cites.
  191. A Survey on FinTech“. K Gai, M Qiu, X Sun. 2017. Elsevier Journal of Network and Computer Applications0 cites.
  192. A Text-Independent Speaker Authentication System for Mobile Devices“. F Thullier, B Bouchard, BAJ Menelas. 2017. mdpi.com Cryptography0 cites.
  193. Adaptation 12 strategies of cybercriminals to interventions from public and private sectors“. F Jansen, J van Lenthe. 2016. books.google.com Cybercrime Through an Interdisciplinary …0 cites.
  194. Advance Program“. P MobiApps, E SNAMS, ABA SITA. 2016. ficloud.org 0 cites.
  195. Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30-February 1, 2017, Revised Selected Papers“. G Peterson, S Shenoi. 2017. books.google.com 0 cites.
  196. Advances in Internetworking, Data & Web Technologies: The 5th International Conference on Emerging Internetworking, Data & Web Technologies (EIDWT …“. L Barolli, M Zhang, XA Wang. 2017. books.google.com 0 cites.
  197. Algorithmic governance: Developing a research agenda through the power of collective intelligence“. J Danaher, MJ Hogan, C Noone…. 2017. journals.sagepub.com Big Data & …0 cites.
  198. Alumni US“. JP Mitrovic. 2010. alumnius.net The Center for Leadership Studies Network at the …0 cites.
  199. Amazon Cloud Journal“. PR Newswire. 0. amazon.ulitzer.com0 cites.
  200. American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road“. N Bilton. 2017. books.google.com 0 cites.
  201. American Kingpin: The Epic Hunt for the Criminal Mastermind behind the Silk Road Drugs Empire“. N Bilton. 2017. Random House 0 cites.
  202. An Analysis of Energy and Hardware Impacts on the Bitcoin Mining Network“. J LEE, Y KIM. 0. jakehlee.com0 cites.
  203. An approach for initiating interventions for bank recovery“. CAE Goodhart, CAE Goodhart…. 2017. emeraldinsight.com Journal of Financial …0 cites.
  204. An Exploratory Analysis of the Security Risks of the Internet of Things in Finance“. K Markantonakis. 2017. books.google.com Trust, Privacy and Security in Digital Business …0 cites.
  205. An Exploratory Analysis of the Security Risks of the Internet of Things in Finance“. C Shepherd, FAP Petitcolas, RN Akram…. 2017. Springer … Conference on Trust …0 cites.
  206. An Innovative Merger of Academe and Corporation: A Non-Thesis Distance Computing Masters’ Degree with IBM Open Badging Technologies“. RF Roggio, K Shaik. 2017. search.proquest.com International Conference on Computer …0 cites.
  207. Analysis of Bitcoin Transaction Flows to Reveal Usage and Geographic Patterns“. SP Bissessar. 2013. nicolascourtois.com The New York Times0 cites.
  208. Analysis of Present Day Election Processes Vis-À-Vis Elections Through Blockchain Technology“. K Hegadekatti. 2017. papers.ssrn.com 0 cites.
  209. Analysis of the impact of technological advances on financial institutions“. MJ Michalow. 2016. search.proquest.com 0 cites.
  210. and the Chair of the Applied Economics Department at the Sapir Academic College. His main areas of interest are innovation and high-tech policy, economic growth …“. R Bar-El. 2017. emeraldinsight.com Human Capital and Assets in the Networked World0 cites.
  211. Arbitrage and International Trade and Finance“. K Doshi. 2017. qrius.com Science0 cites.
  212. Artificial Intelligence and Blockchains in financial services. Potential applications, challenges, and risks“. A Shet Shirodkar. 2017. content.grin.com 0 cites.
  213. Artificial Intelligence–Fact or Fiction“. KVN Rajesh, KVN Ramesh. 2012. csi-india.org Computing NaNo0 cites.
  214. Authenticated Data Redaction with Fine-Grained Control“. J Ma, J Liu, X Huang, Y Xiang…. 2017. ieeexplore.ieee.org IEEE Transactions on …0 cites.
  215. Authorization by Documents“. H Sato. 2017. jstage.jst.go.jp Journal of Information Processing0 cites.
  216. Automated Workflow Scheduling in Self-Adaptive Clouds: Concepts, Algorithms and Methods“. G Kousalya, P Balakrishnan, CP Raj. 2017. Springer 0 cites.
  217. Automating the accounts payable process“. M Heusser. 0. tngconsultores.com0 cites.
  218. Automating the accounts payable process“. M Heusser. 0. tngconsultores.com0 cites.
  219. Backchanneling Quantum Bit (Qubit)’Shuffling’: Quantum Bit (Qubit)’Shuffling’as Added Security by Slipstreaming Q-Morse“. J Ronczka. 2016. ieeexplore.ieee.org Computer Science and Engineering (APWC on …0 cites.
  220. Bare Feet Pat The Earth: Hardships, Future And Legislations For The Salt Pan Workers In Kutch“. K Doshi. 2017. qrius.com Science0 cites.
  221. Big Data Analytics: Opportunity or Threat for the Accounting Profession?“. G Richins, A Stapleton, TC Stratopoulos…. 2017. aaajournals.org Journal of Information …0 cites.
  222. Big Data on Ulitzer“. M Walker, K Irwin. 0. bigdata.ulitzer.com0 cites.
  223. Big Data Orchestration as a Service Network“. C Esposito, A Castiglione…. 2017. ieeexplore.ieee.org IEEE Communications …0 cites.
  224. Bioengineering and biocrime“. V Sutton. 2017. books.google.com The Routledge Handbook of Technology, Crime and …0 cites.
  225. Bitcoin as an investment asset: The added value of bitcoin in a global market portfolio“. S Klabbers. 2017. theses.ubn.ru.nl 0 cites.
  226. Bitcoin forensics: a tutorial“. D Neilson, S Hara, I Mitchell. 2017. Springer … Conference on Global Security, Safety, and …0 cites.
  227. Bitcoin regulations and investigations: A proposal for US policies“. JP Fawcett. 2017. search.proquest.com 0 cites.
  228. Bitcoin: Between Digital Currency and Financial Commodity“. ML Perugini, C Maioli. 2014. papers.ssrn.com 0 cites.
  229. Bitcoin: Pyramid-scheme Wildfire, New Online Payment Medium, or Future Alternative Currency?“. H Vozak. 0. dspace.cuni.cz0 cites.
  230. BITCOIN-BANKING AND TECHNOLOGICAL CHALLENGES“. G Kunjadić. 0. . 0 cites.
  231. BitIodine: Extracting Intelligence from the Bitcoin Network“. D NECSTLab. 2014. books.google.com Financial Cryptography and Data Security: 18th …0 cites.
  232. BLOCK CHAIN BASED DATA LOGGING AND INTEGRITY MANAGEMENT SYSTEM FOR CLOUD FORENSICS“. JH Park, JY Park, EN Huh. 0. pdfs.semanticscholar.org0 cites.
  233. Blockchain and Distributed Ledgers as Trusted Recordkeeping Systems“. VL Lemieux. 0. researchgate.net0 cites.
  234. Blockchain as an Audit-Able Communication Channel“. S Suzuki, J Murai. 2017. ieeexplore.ieee.org Computer Software and Applications …0 cites.
  235. Blockchain as an enabler for public mHealth solutions in South Africa“. M WEISS, A BOTHA, M HERSELMAN, G LOOTS. 0. researchgate.net0 cites.
  236. Blockchain entrepreneurship opportunity in the practices of the unbanked“. GJ Larios-Hernández. 2017. Elsevier Business Horizons0 cites.
  237. Blockchain Explorer: An Analytical Process and Investigation Environment for Bitcoin“. H Kuzuno, C Karam. 0. ieeexplore.ieee.org0 cites.
  238. Blockchain for smart grid resilience: Exchanging distributed energy at speed, scale and security“. M Mylrea, SNG Gourisetti. 2017. ieeexplore.ieee.org Resilience Week (RWS), 20170 cites.
  239. Blockchain for the people: Blockchain technology as the basis for a secure and reliable e-voting system“. M Kovic. 2017. osf.io 0 cites.
  240. Blockchain or not blockchain, that is the question of the insurance and other sectors“. F Lamberti, V Gatteschi, C Demartini…. 2017. ieeexplore.ieee.org IT …0 cites.
  241. Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions“. JH Park, JH Park. 2017. mdpi.com Symmetry0 cites.
  242. Blockchain: Emergent Industry Adoption and Implications for Accounting“. J Kokina, R Mancha…. 2017. aaajournals.org Journal of Emerging …0 cites.
  243. Blockchain: Vision and Challenges“. G Caglar, YS Hanay. 2016. internetinitiative.ieee.org Newsletter0 cites.
  244. Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms“. A Judmayer, N Stifter, K Krombholz…. 2017. morganclaypool.com Synthesis Lectures on …0 cites.
  245. BlockSci: Design and applications of a blockchain analysis platform“. H Kalodner, S Goldfeder, A Chator, M Möser…. 2017. arxiv.org arXiv preprint arXiv …0 cites.
  246. Bobbies on the net: a police workforce for the digital age“. A Hitchcock, R Holmes, E Sundorph. 2017. reform.uk 0 cites.
  247. Breaking Data as a Service News“. PR Newswire. 0. daas.ulitzer.com0 cites.
  248. Breaking van Gogh: Saint-Rémy, Forgery, and the $95 Million Fake at the Met“. JO Grundvig. 2016. books.google.com 0 cites.
  249. Buying Votes in the 21st Century: The Potential Use of Bitcoins and Blockchain Technology in Electronic Voting Reform“. B Bogucki. 2017. HeinOnline Asper Rev. Int’l Bus. & Trade L.0 cites.
  250. by System Administrator-Wednesday, 10 July 2013, 7: 26 PM“. H o Milestones. 0. tngconsultores.com0 cites.
  251. by System Administrator-Wednesday, 10 July 2013, 7: 26 PM“. H o Milestones. 0. tngconsultores.com0 cites.
  252. Call for Participants“. JPY Regular, FT Student. 0. jstage.jst.go.jp0 cites.
  253. Career Summary“. BM David. 0. bmdavid.com0 cites.
  254. CEOs in Technology“. FDA First. 0. ceo.ulitzer.com0 cites.
  255. CHANGE HISTORY“. S Martín. 0. truessec.eu0 cites.
  256. Changing the Practice of Law Leadership“. K Grady. 0. seytlines.com0 cites.
  257. Changing the rules of the game: How can law enforcement deter criminals by increasing the risks of conducting cybercrime?“. P Amann, A Klayn, G Mounier. 2017. ingentaconnect.com Cyber Security: A Peer …0 cites.
  258. Characterization of Counterfeit and Substandard Medicines Using Capillary Electrophoresis“. JSS Rudaz. 2016. chromatographyonline.com 0 cites.
  259. Child abuse materials as digital goods: Why we should fear new commercial forms“. KV Acar. 2017. econstor.eu 0 cites.
  260. Chuncan Deng, Cheng Yang, Fangyong Xiao, Dajie Suolang and Wenshan She. Accurate Recognition and Extraction of Massive Device Monitoring Signals Based …“. AR Arban Uka, O Tahan, R Hawchar, F Matar. 0. ieeexplore.ieee.org Algorithms0 cites.
  261. Cloud as a Service“. E Castro-Leon, R Harmon. 0. Springer0 cites.
  262. Cloud Computing as a Service“. E Castro-Leon, R Harmon. 2016. Springer Cloud as a Service0 cites.
  263. Cloud Storage: Background and Related Work“. J Reardon. 2016. Springer Secure Data Deletion0 cites.
  264. Command Disaggregation Attack and Mitigation in Industrial Internet of Things“. P Xun, PD Zhu, YF Hu, PS Cui, Y Zhang. 2017. mdpi.com Sensors0 cites.
  265. Cómo funciona blockchain: Una explicación infográfica“. E McLaughlin. 0. tngconsultores.com0 cites.
  266. Computer Security–ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings“. SN Foley, D Gollmann, E Snekkenes. 2017. books.google.com 0 cites.
  267. CONNECTING MULTIPLE DEVICES WITH BLOCKCHAIN IN THE INTERNET OF THINGS“. JJ Karst, G Brodar. 0. courses.cs.ut.ee0 cites.
  268. Conspiracy Theories and Their Investigator (s), Matthew RX Dentith“. MRX Dentith. 0. social-epistemology.com0 cites.
  269. Constructing Narrative in the Contemporary Music Industries“. K Barr. 2017. joebennett.net Presented at IASPM0 cites.
  270. Contemplating human-centred security & privacy research: Suggesting future directions“. K Renaud, S Flowerday. 2017. Elsevier Journal of Information Security and Applications0 cites.
  271. Contributions to Content Placement, Load-balancing and Caching: System Design and Security“. C Neumann. 2016. hal.inria.fr 0 cites.
  272. Controlling Cyberspace“. D Lewis. 2017. qrius.com History0 cites.
  273. Critical analysis and comparison of data protection techniques for genomics data sets“. D Naro. 2016. upcommons.upc.edu 0 cites.
  274. CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing“. M Li, J Weng, A Yang, W Lu, Y Zhang, L Hou, J Liu. 0. eprint.iacr.org0 cites.
  275. Cryptocurrency the new money laundering problem for banking, law enforcement, and the legal system“. T Jacquez. 2016. search.proquest.com 0 cites.
  276. Cryptographic Key Management in Delay Tolerant Networks: A Survey“. SA Menesidou, V Katos, G Kambourakis. 2017. mdpi.com Future Internet0 cites.
  277. Cryptography“. B Buchanan. 2017. books.google.com 0 cites.
  278. Current State Survey and Future Opportunities for Trust and Security in Green Cloud Computing“. A Haouari, Z Mostapha, S Yassir. 2018. igi-global.com Cloud Computing Technologies for …0 cites.
  279. Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings“. S Wen, W Wu, A Castiglione. 2017. books.google.com 0 cites.
  280. Cyber-und Computerkriminalität: Prüfung doloser Handlungen“. A Sowa. 2017. Springer Management der Informationssicherheit0 cites.
  281. Cyrilic encryption based image Steganography algorithm“. V Shah. 2017. irjet.net 0 cites.
  282. D4. 1 Findings on economic modelling of malware as business model“. D Hurley-Smith. 0. . 0 cites.
  283. Damon Liwanu McCoy“. CAD Grunwald, D Sicker. 0. pdfs.semanticscholar.org0 cites.
  284. Darknet Forensics“. D Rathod. 0. ijettcs.org future0 cites.
  285. Data and the City“. R Kitchin, TP Lauriault, G McArdle. 2017. books.google.com 0 cites.
  286. Data provenance assurance in the cloud using blockchain“. S Shetty, V Red, C Kamhoua, K Kwiat…. 2017. spiedigitallibrary.org … in Sensors and …0 cites.
  287. Decentralized enforcement of document lifecycle constraints“. S Hallé, R Khoury, Q Betti, A El-Hokayem, Y Falcone. 2017. Elsevier Information Systems0 cites.
  288. DECIPHERING CRYPTOCURRENCY: SHINING A LIGHT ON THE DEEP DARK WEB“. C DiPiero. 2017. litigation-essentials.lexisnexis.com U. Ill. L. Rev.0 cites.
  289. Deep web: Challenges of catching the cyber criminal“. N Williamson. 2014. search.proquest.com 0 cites.
  290. Defence Against Terrorism Review-DATR“. A Richards. 0. researchgate.net0 cites.
  291. Defining cybercrime based on roles of data processing systems“. X Li. 2016. search.informit.com.au Pandora’s Box0 cites.
  292. Deliverable D5. 2.1-Conception Exploitation plan“. P Meyer, M Weinrich, S Custic, D Tofan, W Tremmel…. 0. acdc-project.eu0 cites.
  293. De-SAG: On the De-anonymization of Structure-Attribute Graph Data“. S Ji, T Wang, J Chen, W Li, P Mittal…. 2017. ieeexplore.ieee.org IEEE Transactions on …0 cites.
  294. Developing an adaptive Risk-based access control model for the Internet of Things“. HF Atlam, A Alenezi, RJ Walters, GB Wills, J Daniel. 2017. researchgate.net 0 cites.
  295. Development of Secure and Reliable Techniques for Data Communication“. A Mileva, P RM Inácio, S Bouyuklieva, N Stojkovic…. 2017. eprints.ugd.edu.mk 0 cites.
  296. Deviating From the Cybercriminal Script: Exploring Tools of Anonymity (Mis) Used by Carders on Cryptomarkets“. GJ van Hardeveld, C Webber…. 2017. journals.sagepub.com American Behavioral …0 cites.
  297. Digital Currencies: Unlocking the Secrets of Crypto-Currencies“. D Peterson. 2017. books.google.com 0 cites.
  298. Digital Currency: Risks, Rewards and Investigative Techniques“. P Kraus. 2017. search.proquest.com 0 cites.
  299. Digital Forensic Implications of Collusion Attacks on the Lightning Network“. D Piatkivskyi, S Axelsson, M Nowostawski. 2017. Springer … on Digital Forensics0 cites.
  300. Digital forensics: The smart person’s guide“. D Patterson. 0. tngconsultores.com0 cites.
  301. Digital forensics: The smart person’s guide“. D Patterson. 0. tngconsultores.com0 cites.
  302. Digital image integrity–a survey of protection and verification techniques“. P Korus. 2017. Elsevier Digital Signal Processing0 cites.
  303. Digital Watermarking of Non-media data stream (applications)“. A Soltani Panah. 2017. researchbank.rmit.edu.au 0 cites.
  304. Digital Witness and Privacy in IoT: Anonymous Witnessing Approach“. A Nieto, R Rios, J Lopez. 2017. ieeexplore.ieee.org Trustcom/BigDataSE/ICESS, 2017 …0 cites.
  305. Digitaler Tatort, Sicherung und Verfolgung digitaler Spuren“. D Pawlaszczyk. 2017. Springer Forensik in der digitalen Welt: Moderne Methoden der …0 cites.
  306. Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things“. M Henze, B Wolters, R Matzutt…. 2017. ieeexplore.ieee.org … /ICESS, 2017 IEEE0 cites.
  307. Do vouchers make a difference? A study of vouchers for improving organizational capabilities in firms“. E Magro. 2016. delegia.com EU-SPRI CONFERENCE LUND 20160 cites.
  308. Don’t Dirty Green!“. R Suryaprakash. 2017. qrius.com Science0 cites.
  309. ED TECH TRENDS TO WATCH“. HOWABR LED. 0. pdf.101com.com0 cites.
  310. Efficient private subset computation“. J Dou, L Gong, S Li, L Ma. 2016. Wiley Online Library Security and Communication …0 cites.
  311. Electronic finance–recent developments“. K Dandapani, K Dandapani. 2017. emeraldinsight.com Managerial Finance0 cites.
  312. Emergence of Fintech and cybersecurity in a global financial centre: Strategic approach by a regulator“. AW Ng, AW Ng, BKB Kwok…. 2017. emeraldinsight.com Journal of Financial …0 cites.
  313. Encyclopedia of Cyber Warfare“. PJ Springer. 2017. books.google.com 0 cites.
  314. Energy-Efficient Distance-Bounding with Residual Charge Computation“. Y Zhuang, A Yang, GP Hancke…. 2017. ieeexplore.ieee.org IEEE Transactions on …0 cites.
  315. Enhancing Breeder Document Long-Term Security Using Blockchain Technology“. N Buchmann, C Rathgeb, H Baier…. 2017. ieeexplore.ieee.org … ), 2017 IEEE 41st …0 cites.
  316. Enhancing National Cybersecurity: The Current and Future States of Cybersecurity in the Digital Economy“. T Patterson, E Liebig, R Sapp, B Searcy, D Desai…. 0. nist.gov0 cites.
  317. Establishing Governance for Hybrid Cloud and the Internet of Things“. M Wolfe. 2016. books.google.com Handbook of Research on End-to-End Cloud …0 cites.
  318. Europe and MENA Cooperation Advances in Information and Communication Technologies“. Á Rocha, M Serrhini, C Felgueiras. 2017. Springer 0 cites.
  319. Evolution of bitcoin and security risk in bitcoin wallets“. PK Kaushal, A Bagga, R Sobti. 2017. ieeexplore.ieee.org … and Electronics (Comptelix) …0 cites.
  320. Examining the forensic artifacts produced by use of bitcoin currency“. LD Jones. 2014. search.proquest.com 0 cites.
  321. Exploring the Essence of Records Management, Engaging with Experts: Proceedings“. R Barry. 2007. emeraldinsight.com Records Management Journal0 cites.
  322. FBI DIRECTOR COMEY NOT QUALIFIED TO DECIDE ON HILLARY EMAILGATE-REWROTE LAW“. U CONFLICT, HISM CLINTON. 0. fbcoverup.com0 cites.
  323. FDA News“. PR Newswire. 0. fda.ulitzer.com0 cites.
  324. Financial Stability Governance Today: A Job Half Done“. A Large. 0. group30.org0 cites.
  325. Forenzní analýza sítě Bitcoin“. PBT DROZDA, V VESELÝ. 2016. itspy.cz 0 cites.
  326. Four tips for effective software testing“. RF Goldsmith. 0. tngconsultores.com0 cites.
  327. From show on blog page“. S Milan, E Treré. 0. data-activism.net0 cites.
  328. From SMOG to Fog: A security perspective“. R Rios, R Roman, JA Onieva…. 2017. ieeexplore.ieee.org Fog and Mobile Edge …0 cites.
  329. GI-Dagstuhl Seminar 16353 on Aware Machine to Machine Communication“. M Arumaithurai, S Sigg, X Wang. 0. dagstuhl.de0 cites.
  330. Governing eMoney: On Bitcoin & Global Governance“. DAL Pope, R Marlin-Bennett. 2016. academia.edu 0 cites.
  331. Government Activities to Detect, Deter and Disrupt Threats Enumerating from the Dark Web“. NV Denic. 2017. dtic.mil 0 cites.
  332. Government News“. A This. 0. gov.ulitzer.com0 cites.
  333. Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud“. I Molloy, S Chari, U Finkler, M Wiggerman…. 2016. Springer … Conference on Financial …0 cites.
  334. Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud“. C Jonker, T Habeck, Y Park, F Jordens…. 0. books.google.com … Cryptography and Data …0 cites.
  335. Graph-based forensic investigation of Bitcoin transactions“. C Zhao. 2014. lib.dr.iastate.edu 0 cites.
  336. Heritage. exe. The current state and future of Norwegian software preservation-mapping the challenges of preserving locally executable digital artifacts and the …“. TB Madsen. 2016. dspace.uib.no 0 cites.
  337. Himachal Pradesh, growing to prosper“. PS Vyas. 2017. qrius.com Science0 cites.
  338. Hitching Healthcare to the Chain: An Introduction to Blockchain Technology in the Healthcare Sector“. MA Engelhardt. 2017. timreview.ca Technology Innovation Management Review0 cites.
  339. How Sensitive Is Genetic Data?“. M Sariyar, S Suhr, I Schlünder. 2017. online.liebertpub.com Biopreservation and …0 cites.
  340. HPCC-SmartCity-DSS 2016“. X Ling, J Yang, D Wang, J Chen, L Li. 0. ieeexplore.ieee.org0 cites.
  341. Human Capital and Assets in the Networked World“. M Russ. 2017. emeraldinsight.com 0 cites.
  342. ICIOT 2017“. M Hossain, R Hasan. 0. ieeexplore.ieee.org0 cites.
  343. Identifying and analyzing digital payment flows regarding illegal purposes on the Internet: I samarbete med CGI och Finanskoalitionen“. C Berggren, J Asplund. 2016. diva-portal.org 0 cites.
  344. IEEE CCEM 2016 Program Details“. P Chelliah, A Mangalvedkar. 0. ieeexplore.ieee.org0 cites.
  345. II. Cyber-OC in the Netherlands“. G Odinot, MA Verhoeven, RLD Pool…. 0. researchgate.net Cyber-OC–Scope and …0 cites.
  346. Impact of Technology Innovation: A Study on Cloud Risk Mitigation“. N Suresh, M Gupta. 2017. books.google.com Information Technology Risk Management …0 cites.
  347. Incentive Compatibility of Pay Per Last N Shares in Bitcoin Mining Pools“. Y Zolotavkin, J García, C Rudolph. 2017. Springer … on Decision and Game Theory for …0 cites.
  348. Indian export competitiveness and performance: A long story“. A Kulkarni. 2017. qrius.com Science0 cites.
  349. Indiana Journal of Law and Social Equality“. M Selmi. 2014. scholarship.law.gwu.edu 0 cites.
  350. Information Security and Privacy: 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings“. JK Liu, R Steinfeld. 2016. books.google.com 0 cites.
  351. Infrastructure 2.0 Journal“. M Kim, DS Meliksetian, C Malone. 0. infrastructure20.ulitzer.com0 cites.
  352. Intellectual Property in Silicon Valley“. PR Newswire. 0. ip.ulitzer.com0 cites.
  353. Internet Voting Using Zcash“. P Tarasov, H Tewari. 0. allquantor.at0 cites.
  354. Introduzione Agli Smart Contract (Introduction to Smart Contract)“. ML Perugini, P Dal Checco. 2015. papers.ssrn.com 0 cites.
  355. Investigation of Cryptocurrency Wallets on iOS and Android Mobile Devices for Potential Forensic Artifacts“. A Montanez. 2014. marshall.edu 0 cites.
  356. IoT based smart home: Security challenges, security requirements and solutions“. W Ali, G Dustgeer, M Awais…. 2017. ieeexplore.ieee.org … and Computing (ICAC) …0 cites.
  357. iPad on Ulitzer“. PR Newswire. 0. ipad.ulitzer.com0 cites.
  358. Islamic State of Iraq and Syria Revenue Sources and Countermeasures With a Specific Look at Cryptocurrency Use“. DM Haines. 2017. search.proquest.com 0 cites.
  359. It’s the Cyber Crime and Its Sponsors (Not My Cyber-Security), Stupid“. D Lawrence, F Townsend, T Murphy, D Garrie…. 2016. HeinOnline JL & Cyber …0 cites.
  360. JOnline: Dealing With Computer Fraud“. C Filip Van Hallewijn, A CISM. 0. m.isaca.org0 cites.
  361. JOURNAL OF LAW AND CYBER WARFARE“. S Comment. 0. jlcw.org0 cites.
  362. Juridische beroepen in de toekomst“. MJ ter Voert, M Beenakkers. 0. researchgate.net0 cites.
  363. Komparace právních podmínek užití kryptoměn ve Švýcarsku, Spojených státech amerických a Japonsku“. A Yakimenka. 2017. dspace.cuni.cz 0 cites.
  364. LAWNEWS“. J Ting-Edwards. 0. c-justice.com0 cites.
  365. LE TRAFIC ILLICITE DE TABAC SUR LES CRYPTOMARCHÉS“. D Décary-Hétu, V Mousseau, I Rguioui. 2017. daviddhetu.openum.ca 0 cites.
  366. Learning Python for Forensics“. P Miller, C Bryce. 2016. books.google.com 0 cites.
  367. Legal Risks of Owning Cryptocurrencies“. K Low, EGS Teo. 2016. papers.ssrn.com 0 cites.
  368. LegalTech on the Rise: Technology Changes Legal Work Behaviours, But Does Not Replace Its Profession“. MM Bues, E Matthaei. 2017. Springer Liquid Legal0 cites.
  369. Long term data storage using peer-to-peer technology“. PN Meessen, A de Vries. 2017. ru.nl 0 cites.
  370. Managing electronic records across organizational boundaries: The experience of the Belgian federal government in automating investigation processes“. L Maroye, L Maroye, S van Hooland…. 2017. emeraldinsight.com Records …0 cites.
  371. Matrix Accounting Illustrated: Contribution Margin“. M Hughes. 2016. Wiley Online Library Journal of Corporate Accounting & Finance0 cites.
  372. MedRec: blockchain for medical data access, permission management and trend analysis“. AC Ekblaw. 2017. dspace.mit.edu 0 cites.
  373. Memory Forensics and Bitcoin mining malware“. P Dimotikalis. 2016. repository.ihu.edu.gr 0 cites.
  374. Mentoring in Cyber Education: Capture-the-Flag Exercises to Promote Good Cyber Hygiene in Disadvantaged Populations“. R Thomson. 0. westpoint.edu0 cites.
  375. Method and apparatus for protecting digital photos from alteration“. N Powers, TM Fortuna, P Kocsis. 2016. Google Patents US Patent App. 15/260,0740 cites.
  376. MMTC Communications-Frontiers“. A Costanzo, V Loscrì, S Costanzo. 0. mmc.committees.comsoc.org0 cites.
  377. Mobile security technology“. US Patent App. 14/476,629. 2014. Google Patents0 cites.
  378. Mobile security technology“. US Patent App. 14/686,069. 2015. Google Patents0 cites.
  379. Money for Nothing and Bits for Free: The Geographies of Bitcoin“. A Pel. 2015. tspace.library.utoronto.ca 0 cites.
  380. MỘT SỐ GIẢI PHÁP VỀ PHÁT TRIỂN NGUỒN NHÂN LỰC CÔNG NGHỆ THÔNG TIN TẠI VIỆT NAM.“. G Trần Thu. 2017. data.uet.vnu.edu.vn 0 cites.
  381. Moving One Step Ahead of the 90’s Job Options“. RN Ahsan, A Chatterjee. 2017. qrius.com Science0 cites.
  382. Neuerwerbungen im Dezember 2016“. A von Fürstenberg, CP Müller…. 2016. ub.uni-heidelberg.de Ann Arbor: University of …0 cites.
  383. NIZKCTF: A Non-Interactive Zero-Knowledge Capture the Flag Platform“. P Matias, P Barbosa, T Cardoso, D Mariano…. 2017. arxiv.org arXiv preprint arXiv …0 cites.
  384. NUS Hackers“. IHA Git. 0. nushackers.org0 cites.
  385. O novo eo atual na Arquivística internacional: a desmaterialização, a interoperabilidade, a organização eo uso da informação em evidência (2011-2016)“. MC Freitas, CG Silva. 2016. bad.pt Actas do Encontro Nacional de Arquivos Municipais0 cites.
  386. Online Anonymization Relating to Cyber Attacks“. J Cornwell. 2017. search.proquest.com 0 cites.
  387. Organised Cybercrime in the Netherlands“. G Odinot, MA Verhoeven, RLD Pool, CJ de Poot. 0. wodc.nl0 cites.
  388. OSC Staff Notice 33-748-Annual Summary Report for Dealers, Advisers and Investment Fund Managers“. Ontario Securities Commission. 2017. osc.gov.on.ca Update0 cites.
  389. Overview and Comparison of P2P File Synchronization and Storage Solutions“. J Fröhlich, S Ruesch. 2015. csg.uzh.ch Communication Systems VIII0 cites.
  390. Peer-to-Peer Location-Based Services based on Blockchain and Web Technologies“. G Brambilla. 2017. dspace-unipr.cineca.it 0 cites.
  391. Periyar Journal of Research in Business and Development Studies“. S Chhabra, N Gangwar, AB Singhal, F Fatima…. 0. pmccdelhi.com0 cites.
  392. Periyar Journal of Research in Business and Development Studies“. S Singh. 0. pmccdelhi.com0 cites.
  393. Personal control of privacy and data: Estonian experience“. J Priisalu, R Ottis. 2017. Springer Health and Technology0 cites.
  394. Pharmaceutical News on Ulitzer“. PR Newswire. 0. pharmaceuticals.ulitzer.com0 cites.
  395. Pluralism and Economics Today: Understanding the ISIPE Rebellion“. A Baksy. 2017. qrius.com Science0 cites.
  396. Policing af kryptomarkeder“. J Demant, R Munksgaard. 2017. justitsministeriet.dk 0 cites.
  397. Predictive Computing and Information Security“. PK Gupta, V Tyagi, SK Singh. 2017. Springer 0 cites.
  398. Predictive Computing and Information Security: A Technical Review“. PK Gupta, V Tyagi, SK Singh. 2017. Springer Predictive Computing and Information …0 cites.
  399. Privacy in the Smart City–Applications, Technologies, Challenges and Solutions“. D Eckhoff, I Wagner. 2017. ieeexplore.ieee.org IEEE Communications Surveys & …0 cites.
  400. Privacy Verification Chains for IoT“. N Foukia, D Billard, E Solana. 2017. Springer International Conference on Network and …0 cites.
  401. Privacy‐preserving smart data storage for financial industry in cloud computing“. M Qiu, K Gai, H Zhao, M Liu. 0. Wiley Online Library Concurrency and Computation: Practice …0 cites.
  402. Process memory investigation of the Bitcoin Clients Electrum and Bitcoin Core“. L van der Horst, KKR Choo, NA Le-Khac. 2017. ieeexplore.ieee.org IEEE Access0 cites.
  403. Prof J Maiti Head, I&SE“. PP Chakrabarti, IIT Director. 0. iem.iitkgp.ernet.in0 cites.
  404. Protecting Data Privacy in the Presence of Data Provenance“. P Kianmajd. 2017. search.proquest.com 0 cites.
  405. Provenance threat modeling“. O Hambolu, L Yu, J Oakley, RR Brooks…. 2016. ieeexplore.ieee.org Privacy, Security and …0 cites.
  406. Public Evidence from Secret Ballots“. J Benaloh, M Bernhard, JA Halderman…. 2017. arxiv.org arXiv preprint arXiv …0 cites.
  407. Quick Start“. MTWT Friday. 2016. wp.df.uba.ar 0 cites.
  408. Ransomware 7 and cryptocurrency“. GJ Ahn, A Doupe, Z Zhao, K Liao. 2016. books.google.com Cybercrime Through an …0 cites.
  409. Rarity trading legacy protection and digital convergence platform“. MM Saigh, X Zhang. 2016. Google Patents US Patent App. 15/072,9110 cites.
  410. Rational mining on bitcoin“. S Pachal. 2017. library.isical.ac.in 0 cites.
  411. Rational Whistle Blower Prototypes Buch 1 Grundlagen, Ergebnisse und Literatur“. G Förster. 2016. integrity-art.de 0 cites.
  412. Read The Manual“. M Faou, JI Boutin. 2017. welivesecurity.com 0 cites.
  413. RECALIBRATING LAW ENFORCEMENT TO KEEP PACE WITH NEW TECHNOLOGIES AND FORMS OF CRIME“. MM Oberoi. 0. idsa.in SECURING CYBERSPACE0 cites.
  414. Recent Trends in Information and Communication Technology: Proceedings of the 2nd International Conference of Reliable Information and Communication …“. F Saeed, N Gazem, S Patnaik, ASS Balaid…. 2017. books.google.com 0 cites.
  415. Recognition of Traffic Sign Based on Bag-of-Words and Artificial Neural Network“. KT Islam, RG Raj, G Mujtaba. 2017. mdpi.com Symmetry0 cites.
  416. Reflections on the REST architectural style and principled design of the modern web architecture (impact paper award)“. RT Fielding, RN Taylor, JR Erenkrantz…. 2017. dl.acm.org Proceedings of the …0 cites.
  417. Reflections upon periclitations in privacy: perspectives from Rwanda’s digital transformation“. JP Nsengimana. 2017. Springer Health and Technology0 cites.
  418. Regulation based switching system for electronic message routing“. J Crabtree, A Sellers, J Uchiyama. 2017. Google Patents US Patent App. 15/489,7160 cites.
  419. Report from GI-Dagstuhl Seminar 16394: Software Performance Engineering in the DevOps World“. A van Hoorn, P Jamshidi, P Leitner, I Weber. 2017. arxiv.org arXiv preprint arXiv …0 cites.
  420. Report of the second expert group meeting on opportunities and risks associated with the advent of digital currency in the Caribbean“. NU CEPAL. 2015. repositorio.cepal.org 0 cites.
  421. Requisitos y soluciones de privacidad para la testificacion digital“. A Nieto, R Rios. 0. nics.uma.es0 cites.
  422. Research Challenges in Financial Data Modeling and Analysis“. L Alexander, SR Das, Z Ives, HV Jagadish…. 2017. online.liebertpub.com Big …0 cites.
  423. Research Specialties“. T MOORE. 2016. tylermoore.ens.utulsa.edu Computing0 cites.
  424. Retrofit Device And Method Of Retrofitting A Flow Meter“. D Mackie, S Grefen, CJ Boelter…. 2017. Google Patents US Patent App. 15 …0 cites.
  425. REXIT: What It Brings to Light About Term Length“. B Pratap. 2017. qrius.com Science0 cites.
  426. Schöne neue Verbraucherwelt?“. C Bala, W Schuldzinski. 0. projekte.meine-verbraucherzentrale …0 cites.
  427. Searchain: Blockchain-based private keyword search in decentralized storage“. P Jiang, F Guo, K Liang, J Lai, Q Wen. 2017. Elsevier Future Generation Computer …0 cites.
  428. Section 75 and credit cards: misconceived interpretation?“. J Mukwiri. 2005. emeraldinsight.com Journal of Financial Regulation and Compliance0 cites.
  429. Secure lightweight context-driven data logging for bodyworn sensing devices“. M Siddiqi, ST All, V Sivaraman. 2017. ieeexplore.ieee.org … Forensic and Security (ISDFS) …0 cites.
  430. Securing Fog Computing for Internet of Things Applications: Challenges and Solutions“. J Ni, K Zhang, X Lin, X Shen. 2017. ieeexplore.ieee.org IEEE Communications Surveys & …0 cites.
  431. Securing the Assets of Decentralized Applications using Financial Derivatives}}“. G Bissias, BN Levine, N Kapadia, AP Ozisik…. 0. people.cs.umass.edu Elsevier Child Abuse …0 cites.
  432. Security Enhancement of Digital Watermarking“. MA Nematollahi, C Vorakulpipat, HG Rosales. 2017. Springer Digital Watermarking0 cites.
  433. Security Hands-On-Training–Part 6–Final“. L Rocha, I Handling. 0. countuponsecurity.com0 cites.
  434. SEEKING PAPERS ON COMPUTATIONAL SOCIAL SYSTEMS“. SD Computing, S Computing. 0. ieeexplore.ieee.org0 cites.
  435. Self-reported Verifiable Reputation with Rater Privacy“. R Bazin, A Schaub, O Hasan, L Brunie. 2017. Springer IFIP International Conference on …0 cites.
  436. Share and Share Alike: The challenges from social media for Intellectual Property Rights“. D Collopy. 2017. uhra.herts.ac.uk 0 cites.
  437. Small scale denial of service attacks“. V Bukač. 0. is.muni.cz0 cites.
  438. Smart Contracts: A Preliminary Evaluation“. ML Perugini, P Dal Checco. 2015. papers.ssrn.com 0 cites.
  439. Snap forensics: a tradeoff between ephemeral intelligence and persistent evidence collection“. Y Yu, T Tun. 2017. oro.open.ac.uk 0 cites.
  440. Social, Cultural, and Behavioral Modeling“. D Lee, YR Lin, N Osgood, R Thomson. 0. Springer0 cites.
  441. Social, Cultural, and Behavioral Modeling: 10th International Conference, SBP-BRiMS 2017, Washington, DC, USA, July 5-8, 2017, Proceedings“. D Lee, N Osgood, YR Lin, R Thomson. 2017. books.google.com 0 cites.
  442. Sparse Encoded Matrix based Steganography algorithm“. V Shah. 2017. irjet.net 0 cites.
  443. Sticky policies approach within cloud computing“. G Spyra, WJ Buchanan, E Ekonomou. 2017. Elsevier Computers & Security0 cites.
  444. Students Link Brains to Fire Video Game Cannon“. J DORRIER. 0. losnuevosguerreros.org0 cites.
  445. Studi atas Pemanfaatan Blockchain bagi Internet of Things (IoT)“. L Arief, TA Sundara. 2017. jurnal.iaii.or.id Jurnal RESTI (Rekayasa Sistem dan Teknologi …0 cites.
  446. Supporting users to take informed decisions on privacy settings of personal devices“. I Torre, OR Sanchez, F Koceva, G Adorni. 2017. Springer Personal and Ubiquitous …0 cites.
  447. Systemic banking crises: completing the enhanced policy responses“. O Frecaut, O Frecaut. 2017. emeraldinsight.com Journal of Financial Regulation and …0 cites.
  448. Tails Linux Operating System: Remaining Anonymous with the Assistance of an Incognito System in Times of High Surveillance“. M Dawson, JA Cárdenas-Haro. 2017. igi-global.com … and the Internet of Things (IJHIoT)0 cites.
  449. Tamper-Resistant Mobile Health Using Blockchain Technology“. D Ichikawa, M Kashiyama, T Ueno. 2017. ncbi.nlm.nih.gov JMIR mHealth and uHealth0 cites.
  450. TCCN Newsletter“. M Yannuzzi, R Milito, R Serral-Gracià, D Montero…. 0. cn.committees.comsoc.org0 cites.
  451. Technologien, Forschungsfragen und Anwendungen“. J Schütte, G Fridgen, W Prinz, T Rose, NU FIT…. 0. aisec.fraunhofer.de0 cites.
  452. TERRORIST USE OF VIRTUAL CURRENCIES“. ZK Goldman, E Maruyama, E Rosenberg, E Saravalle…. 2017. caict.ac.cn 0 cites.
  453. The Bitcoin Guidebook: How to Obtain, Invest, and Spend the World’s First Decentralized Cryptocurrency“. I DeMartino. 2016. books.google.com 0 cites.
  454. The Cyber Triad“. B Thijssen. 2016. researchgate.net 0 cites.
  455. The Establishment of Bitcoin“. P Hesch. 2017. dspace.allegheny.edu 0 cites.
  456. The Evolving Cloud“. J Weinman. 2017. ieeexplore.ieee.org IEEE Cloud Computing0 cites.
  457. The global village and it’s back-breaking terrain“. JD Ostry. 2017. qrius.com Science0 cites.
  458. The illicit drug trade on the dark net: Analysing the need for a new EU Framework“. Y Hassan. 2017. openaccess.leidenuniv.nl 0 cites.
  459. The impact of Self-Generated Images in online pornography“. A Monaghan. 2017. eprints.mdx.ac.uk 0 cites.
  460. The Missing Account of Progressive Corporate Criminal Law“. WS Laufer. 2017. papers.ssrn.com 0 cites.
  461. The New Bio-Citizen: How the Democratization of Genomics Will Transform Our Lives from Epidemics Management to the Internet of Living Things“. E Pauwels. 0.wilsoncenter.org0 cites.
  462. The Nuts and Bolts of Micropayments: A Survey“. ST Ali, D Clarke, P McCorry. 2017. arxiv.org arXiv preprint arXiv:1710.029640 cites.
  463. The Programmable Economy: Envisaging an Entire Planned Economic System as a Single Computer Through Blockchain Networks“. K Hegadekatti, Y SG. 2017. papers.ssrn.com 0 cites.
  464. The Tor browser: A forensic investigation study“. K Keller. 2016. search.proquest.com 0 cites.
  465. Threshold Single Password Authentication“. D İşler, A Küpçü. 2017. Springer … Management, Cryptocurrencies and Blockchain …0 cites.
  466. Towards a leaner, smarter public-sector workforce.“. A Hitchcock, K Laycock, E Sundorph. 2017. reform.uk 0 cites.
  467. Towards an accountable software-defined networking architecture“. BE Ujcich, A Miller, A Bates…. 2017. ieeexplore.ieee.org … (NetSoft), 2017 IEEE …0 cites.
  468. Towards Efficient and Secure Encrypted Databases: Extending Message-Locked Encryption in Three-Party Model“. Y Ishihara, T Fujiwara. 2017. books.google.com … Blockchain Technology: ESORICS 2017 …0 cites.
  469. Towards Efficient and Secure Encrypted Databases: Extending Message-Locked Encryption in Three-Party Model“. Y Furuta, N Yanai, M Karasaki, K Eguchi…. 2017. Springer … and Blockchain …0 cites.
  470. TOWARDS ENHANCING SECURITY IN CLOUD STORAGE ENVIRONMENTS“. D Wilson. 2016. jscholarship.library.jhu.edu 0 cites.
  471. Trifling and Gambling with Virtual Money“. JT Holden. 2017. papers.ssrn.com 0 cites.
  472. Trumpeting in the New Era of a Lean Technology-Driven Financial System“. V Rule. 0. financialintergroup.com0 cites.
  473. Trust Management in Fog Computing“. TS Dybedokken. 2017. brage.bibsys.no 0 cites.
  474. Turkish Riviera, the Turquoise Coast“. PR Newswire. 0. turkishriviera.ulitzer.com0 cites.
  475. Typologies in Canadian Securities Fraud: An Impact Assessment on Investor Protection, Money Laundering and the Financing of Terrorism (AML/CFT), and Risk …“. R Ranjan. 2015. papers.ssrn.com 0 cites.
  476. Understanding Digital Crime, Trust, and Control in Blockchain Technologies“. JB Walton, G Dhillon. 2017. aisel.aisnet.org 0 cites.
  477. Unlocking Innovations and Competitive Advantage of State Bank of India“. B Jha, A Gulati, S Goyal, S Vig. 2017. strategiesinemergingmarkets.com 0 cites.
  478. Use of Bitcoin in Online Travel Product Shopping: The European Perspective“. D Leung, A Dickinger. 2017. Springer … and Communication Technologies in Tourism 20170 cites.
  479. Using Blockchain for Research Transparency“. K Opoku-Agyemang. 2017. osf.io 0 cites.
  480. Using blockchain for scientific transparency“. KA Opoku-Agyemang. 2017. papers.ssrn.com 0 cites.
  481. Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect Patterns in Raw Data“. RR Brooks, L Yu, Y Fu, G Cordone, J Oakley…. 2017. arxiv.org arXiv preprint arXiv …0 cites.
  482. Using the Blockchain to Secure Provenance Meta-Data (A CCoE Webinar Presentation)“. RR Brooks, A Skjellum. 2017. scholarworks.iu.edu 0 cites.
  483. Using Tor in cybersecurity investigations“. J Flanagan. 2015. search.proquest.com 0 cites.
  484. Vers la sécurité mobile: caractérisation des attaques et contremesures“. Y Le Traon, JY Marion, F Massacci, S Limet…. 0. tel.archives-ouvertes.fr0 cites.
  485. Vers la sécurité mobile: caractérisation des attaques et contremesures“. JF Lalande. 2016. hal-univ-orleans.archives-ouvertes.fr 0 cites.
  486. Video Integrity through Blockchain Technology“. A Hemlin Billström, F Huss. 2017. diva-portal.org 0 cites.
  487. Welcome Message“. M Koscina, D Caragata, N Abdoun, S El Assady…. 0. ieeexplore.ieee.org0 cites.
  488. What Are They Really Up To? Activist Social Scientists Backpedal on Conspiracy Theory Agenda, Kurtis Hagen“. L Basham. 0. social-epistemology.com0 cites.
  489. WHAT MAKES A CURRENCY?–THE BITCOIN PHENOMENON“. EE LEWIS. 0. researchgate.net0 cites.
  490. Why Fintech Could Lead to More Financial Crime“. C Harrington. 2017. CFA Institute CFA Institute Magazine0 cites.
  491. Will Donald trump Hillary’s Climb to the Top of the Everest?“. A Kulkarni. 2017. qrius.com Science0 cites.
  492. Will Organizations Emerge as “Hybrid Intelligences” from the Digital Transformation?“. W Leodolter. 2017. Springer … Transformation Shaping the Subconscious Minds of …0 cites.
  493. Words to go: Data center design standards bodies“. W Enterprises. 0. tngconsultores.com0 cites.
  494. Zeng Chong, Huang Song, Yang Yongming“. X Yang, D Ogawa, N Dai, TTG Hoang, X Wang, X Zhou…. 0. ieeexplore.ieee.org0 cites.
  495. Zwischen Online-Streife und Online-(Raster-) Fahndung–Ein Beitrag zur Verarbeitung öffentlich zugänglicher Daten im Ermittlungsverfahren“. C Rückert. 2017. degruyter.com Zeitschrift für die gesamte Strafrechtswissenschaft0 cites.
  496. 比特币与法定数字货币“. 秦波. 2017. jcr.cacrnet.org.cn 密码学报0 cites.

———————————————————-

(Featured Image: ‘‘Unintentional Bias in Forensic Investigation’by UK Parliament)