Picture for Rachit Agarwal

Rachit Agarwal

DNS based In-Browser Cryptojacking Detection

Add code
May 10, 2022
Figure 1 for DNS based In-Browser Cryptojacking Detection
Figure 2 for DNS based In-Browser Cryptojacking Detection
Figure 3 for DNS based In-Browser Cryptojacking Detection
Figure 4 for DNS based In-Browser Cryptojacking Detection
Viaarxiv icon

EPASAD: Ellipsoid decision boundary based Process-Aware Stealthy Attack Detector

Add code
Apr 08, 2022
Figure 1 for EPASAD: Ellipsoid decision boundary based Process-Aware Stealthy Attack Detector
Figure 2 for EPASAD: Ellipsoid decision boundary based Process-Aware Stealthy Attack Detector
Figure 3 for EPASAD: Ellipsoid decision boundary based Process-Aware Stealthy Attack Detector
Figure 4 for EPASAD: Ellipsoid decision boundary based Process-Aware Stealthy Attack Detector
Viaarxiv icon

Towards Malicious address identification in Bitcoin

Add code
Dec 22, 2021
Figure 1 for Towards Malicious address identification in Bitcoin
Figure 2 for Towards Malicious address identification in Bitcoin
Figure 3 for Towards Malicious address identification in Bitcoin
Figure 4 for Towards Malicious address identification in Bitcoin
Viaarxiv icon

Vulnerability and Transaction behavior based detection of Malicious Smart Contracts

Add code
Jun 25, 2021
Figure 1 for Vulnerability and Transaction behavior based detection of Malicious Smart Contracts
Figure 2 for Vulnerability and Transaction behavior based detection of Malicious Smart Contracts
Figure 3 for Vulnerability and Transaction behavior based detection of Malicious Smart Contracts
Figure 4 for Vulnerability and Transaction behavior based detection of Malicious Smart Contracts
Viaarxiv icon

Identifying malicious accounts in Blockchains using Domain Names and associated temporal properties

Add code
Jun 25, 2021
Figure 1 for Identifying malicious accounts in Blockchains using Domain Names and associated temporal properties
Figure 2 for Identifying malicious accounts in Blockchains using Domain Names and associated temporal properties
Figure 3 for Identifying malicious accounts in Blockchains using Domain Names and associated temporal properties
Figure 4 for Identifying malicious accounts in Blockchains using Domain Names and associated temporal properties
Viaarxiv icon

Detecting Malicious Accounts showing Adversarial Behavior in Permissionless Blockchains

Add code
Jan 28, 2021
Figure 1 for Detecting Malicious Accounts showing Adversarial Behavior in Permissionless Blockchains
Figure 2 for Detecting Malicious Accounts showing Adversarial Behavior in Permissionless Blockchains
Figure 3 for Detecting Malicious Accounts showing Adversarial Behavior in Permissionless Blockchains
Figure 4 for Detecting Malicious Accounts showing Adversarial Behavior in Permissionless Blockchains
Viaarxiv icon

Detecting Malicious Accounts in Permissionless Blockchains using Temporal Graph Properties

Add code
Jul 10, 2020
Figure 1 for Detecting Malicious Accounts in Permissionless Blockchains using Temporal Graph Properties
Figure 2 for Detecting Malicious Accounts in Permissionless Blockchains using Temporal Graph Properties
Figure 3 for Detecting Malicious Accounts in Permissionless Blockchains using Temporal Graph Properties
Figure 4 for Detecting Malicious Accounts in Permissionless Blockchains using Temporal Graph Properties
Viaarxiv icon

A study of existing Ontologies in the IoT-domain

Add code
Jul 01, 2017
Figure 1 for A study of existing Ontologies in the IoT-domain
Figure 2 for A study of existing Ontologies in the IoT-domain
Figure 3 for A study of existing Ontologies in the IoT-domain
Viaarxiv icon