1 |
S. Hwang, H-W Lee, "Identification of Counterfeit Android Malware Apps using Hyperledger Fabric Blockchain," Journal of Internet Computing and Services(JICS), Vol.20, No.2, pp.61-68, 2019. http://dx.doi.org/10.7472/jksii.2019.20.2.61
DOI
|
2 |
Jingting Xue, Chunxiang Xu and Yuan Zhang, "Private Blockchain-Based Secure Access Control for Smart Home Systems," KSII Transactions on Internet and Information Systems, Vol.12, No.12, pp.6057-6078, 2018. https://doi.org/10.3837/tiis.2018.12.024
DOI
|
3 |
Jiao Li, Gongqian Liang and Tianshi Liu, "A Novel Multi-Link Integrated Factor Algorithm Considering Node Trust Degree for Blockchain-based Communication," KSII Transactions on Internet and Information Systems, Vol. 11, No. 8, pp.3766-3788, 2017. https://doi.org/10.3837/tiis.2017.08.001
DOI
|
4 |
Xiaojian He, Ximeng Chen and Kangzi Li, "A Decentralized and Non-reversible Traceability System for Storing Commodity Data," KSII Transactions on Internet and Information Systems, Vol.13, No.2, pp.619-634, 2019. https://doi.org/10.3837/tiis.2019.02.008
DOI
|
5 |
Ssdeep - Fuzzy hashing program, https://ssdeep-project.github.io/ssdeep/index.html
|
6 |
Jesse Kornblum, "Fuzzy Hashing" [Online] Available : http://jessekornblum.com/presentations/htcia06.pdf
|
7 |
Jingjing Gu, Binglin Sun, Xiaojiang Du, Jun Wang, Yi Zhuang, Ziwang Wang, "Consortium Blockchain-based Malware Detection in Mobile Device," IEEE Access Vol. 6, pp(99):1-1, 2018.
DOI
|
8 |
The Linux Foundation Project, Hyperledger Project URL: https://www.hyperledger.org
|
9 |
Wikipedia contributors, "Blockchain," Wikipedia, The Free Encyclopedia, https://en.wikipedia.org/w/index.php?title=Blockchain&oldid=912153874 (accessed August 26, 2019).
|
10 |
Commexting the World to Crypto. The World's Fastest Crypto Exchange, Blockchain Web site: https://www.blockchain.com
|
11 |
Welcome to Hyperledger Composer, https://hyperledger.github.io/composer/v0.19/introduction/introduction.html
|
12 |
Hyperledger Fabric, Accessed on Jun. 18, 2019. [Online] Available: https://hyperledger-fabric.readthedocs.io/en/release-1.3/
|
13 |
Make your blockchain smart contracts smarter with business rules, https://www.ibm.com/developerworks/library/mw-1708-mery-blockchain/1708-mery.html
|
14 |
K. Christidis and M. Devetsikiotis, ''Blockchains and smart contracts for the Internet of Things,'' IEEE Access, Vol. 4, pp. 2292-2303, 2016.
DOI
|
15 |
Hyperledger Explorer GitHub, https://github.com/hyperledger/blockchain-explorer
|
16 |
Yilin Ye, Lifa Wu, Zheng Hong and Kangyu Huang, "A Risk Classification Based Approach for Android Malware Detection," KSII Transactions on Internet and Information Systems, Vol.11, No.2, pp.959-981, 2017. https://doi.org/10.3837/tiis.2017.02.018
DOI
|