References
- Xia, P., Zhang, B., Ji, R., Gao, B., Wu, L., Luo, X., Wang, H., & Xu, G. (2020). Characterizing Cryptocurrency Exchange Scams. http://arxiv.org/abs/2003.07314
- Xia, P., Wang, H., Luo, X., Wu, L., Zhou, Y., Bai, G., Xu, G., Huang, G., & Liu, X. (2020). Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams. http://arxiv.org/abs/2007.13639
- Lal, B., Agarwal, R., & Shukla, S. K. (2021). Understanding Money Trails of Suspicious Activities in a cryptocurrency-based Blockchain. http://arxiv.org/abs/2108.11818
- Reddy, E. (2020). Analysing the investigation and prosecution of cryptocurrency crime as provided for by the South African cybercrimes bill. In Statute Law Review (Vol. 41, Issue 2, pp. 226-239). Oxford University Press. https://doi.org/10.1093/slr/hmz001
- Trozze, A., Kamps, J., Akartuna, E. A., Hetzel, F. J., Kleinberg, B., Davies, T., & Johnson, S. D. (2022). Cryptocurrencies and future financial crime. In Crime Science (Vol. 11, Issue 1). BioMed Central Ltd. https://doi.org/10.1186/s40163-021-00163-8
- Astrakhantseva, I., Astrakhantsev, R., & Los, A. (2021). Cryptocurrency fraud schemes analysis. SHS Web of Conferences, 106, 02001. https://doi.org/10.1051/shsconf/202110602001
- Reddy, E., & Minnaar, A. (2018). CRYPTOCURRENCY: A TOOL AND TARGET FOR CYBERCRIME Civil-military relations View project Rural crime View project. https://www.researchgate.net/publication/338572871
- Lapuh Bele, J. (2021). Cryptocurrencies as facilitators of cybercrime. SHS Web of Conferences, 111, 01005. https://doi.org/10.1051/shsconf/202111101005
- Corbet, S., Cumming, D. J., Lucey, B. M., Peat, M., Vigne, S. A., & Chi Minh City, H. (n.d.). The Destabilising Effects of Cryptocurrency Cybercriminality.
- Ivanov, M. A., Kliuchnikova, B. v., Chugunkov, I. v., & Plaksina, A. M. (2021). Phishing Attacks and Protection against Them. Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2021, 425-428. https://doi.org/10.1109/ElConRus51938.2021.9396693
- Weber, K., Schutz, A. E., Fertig, T., & Muller, N. H. (2020). Exploiting the human factor: Social engineering attacks on cryptocurrency users. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12206 LNCS, 650-668. https://doi.org/10.1007/978-3-030-50506-6_45
- Sayeed, S., & Marco-Gisbert, H. (n.d.). On the Effectiveness of Blockchain Against Cryptocurrency Attacks.
- Froehlich M, Hulm Ph.,& Alt F. (2021). Under Pressure. A User-Centered Threat Model for Cryptocurrency Owners
- Andryukhin, A. A. (2019). Phishing Attacks and Preventions in Blockchain Based Projects. Proceedings - 20 International Conference on Engineering Technologies and Computer Science: Innovation and Application, EnT 2019, 15-19. https://doi.org/10.1109/EnT.201900008
- Anti-Phishing Working Group, & Institute of Electrical and Electronics Engineers. (n.d.). 2018 APWG Symposium on Electronic Crime Research (eCrime) : proceedings of the 2018 APWG Symposium on Electronic Crime Research (eCrime) : San Diego, California, USA, May 15-17, 2018.
- Wen, H., Fang, J., Wu, J., & Zheng, Z. (2021). Transaction-based hidden strategies against general phishing detection framework on ethereum. Proceedings - IEEE International Symposium on Circuits and Systems, 2021-May. https://doi.org/10.1109/ISCAS51556.2021.9401091
- Badawi, E., & Jourdan, G. V. (2020). Cryptocurrencies emerging threats and defensive mechanisms: A systematic literature review. In IEEE Access (Vol. 8, pp. 200021-200037). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ACCESS.2020.3034816
- Gottipati, H. (2020). A PROPOSED CYBERSECURITY MODEL FOR CRYPTOCURRENCY EXCHANGES.
- Varlioglu, S., Elsayed, N., Elsayed, Z., & Ozer, M. (n.d.). The Dangerous Combo: Fileless Malware and Cryptojacking.
- Ahvanooey, M. T., Mazurczyk, W., Taleby Ahvanooey, M., Zhu, M. X., Kilger, M., & Choo, K.-K. R. (n.d.). Do Dark Web and Cryptocurrencies Empower Cybercriminals? Covert Channels and Malware Analysis View project Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Study View project Do Dark Web and Cryptocurrencies Empower Cybercriminals? http://ax555xx.onion
- scheau, M. C., & Zaharie, stefan. (2018). The Way of Cryptocurrency. In Economy Informatics (Vol. 18, Issue 1).
- Poursafaei, F., Hamad, G. B., & Zilic, Z. (2020). Detecting Malicious Ethereum Entities via Application of Machine Learning Classification.
- Phillips, R., & Wilder, H. (2020). Tracing Cryptocurrency Scams: Clustering Replicated Advance-Fee and Phishing Websites. https://help.twitter.com/en/rules-and-policies/financial-scam
- Chen, W., Guo, X., Chen, Z., Zheng, Z., & Lu, Y. (2020). Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem. https://bitcoin.org/bitcoin.pdf
- IEEE Circuits and Systems Society, & Institute of Electrical and Electronics Engineers. (n.d.). 2020 IEEE International Symposium on Circuits and Systems (ISCAS) : proceedings : ISCAS 2020 : Virtual Conference, October 10-21, 2020.
- Bartoletti, M., Lande, S., Loddo, A., Pompianu, L., & Serusi, S. (2021). Cryptocurrency scams: Analysis and perspectives. IEEE Access, 9, 148353-148373. https://doi.org/10.1109/ACCESS.2021.3123894
- Chen, L., Peng, J., Liu, Y., Li, J., Xie, F., & Zheng, Z. (2021). Phishing Scams Detection in Ethereum Transaction Network. ACM Transactions on Internet Technology, 21(1). https://doi.org/10.1145/3398071
- Wu, J., Yuan, Q., Lin, D., You, W., Chen, W., Chen, C., & Zheng, Z. (2022). Who Are the Phishers? Phishing Scam Detection on Ethereum via Network Embedding. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 52(2), 1156-1166. https://doi.org/10.1109/TSMC.2020.3016821
- Dika, A., & Nowostawski, M. (2018). Security Vulnerabilities in Ethereum Smart Contracts. 2018 IEEE International Conference on Internet of Things (IThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 955-962. https://doi.org/10.1109/Cybermatics_2018.2018.00182
- Chen, W., Xu, Y., Zheng, Z., Zhou, Y., Yang, J. E., & Bian, J. (2019). Detecting "Pump & dump schemes" on cryptocurrency market using an improved apriori algorithm. Proceedings - 13th IEEE International Conference on Service-Oriented System Engineering, SOSE 2019, 10th International Workshop on Joint Cloud Computing, JCC 2019 and 2019 IEEE International Workshop on Cloud Computing in Robotic Systems, CCRS 2019, 293-298. https://doi.org/10.1109/SOSE.2019.00050
- Laadam, J. A., Profile, S., Li, J.-J., Shetewy, N., Aitlaadam, J., Li, *, & Jiang, J. (2019). Challenges of the Bitcoin in the Arabic Countries. https://doi.org/10.7176/JESD
- A. Alghamdi, "A Hybrid Method for Customer Segmentation in Saudi Arabia Restaurants Using Clustering, Neural Networks and Optimization Learning Techniques," Arabian Journal of Science Engineering, Jul. 2022, doi: 10.1007/s13369-022-07091-y.
- A. Alghamdi, "A Hybrid Method for Big Data Analysis Using Fuzzy Clustering, Feature Selection and Adaptive Neuro-Fuzzy Inferences System Techniques: Case of Mecca and Medina Hotels in Saudi Arabia," Arabian Journal of Science Engineering, Jun. 2022, doi: 10.1007/S13369-022-06978-0.
- Alghamdi, A., "Computer Science Graduation Project During Covid-19 Pandemic: Challenges and Solutions." IJCSNS - International Journal of Computer Science and Network Security, 22, 1, 718-724, 2022, doi: 10.22937/IJCSNS.2022.22.1.94
- A. Alghamdi, "Analyzing the Barriers and Possibilities with p-values towards Starting a New Postgraduate Computer and Engineering Programs at Najran University: A Cross-Sectional Study," International Journal of Advanced Computer Science and Applications (IJACSA), vol. 11, no. 12, 59/31 2020, doi: 10.14569/IJACSA.2020.0111215.
- Y. Liu, G. Shan, Y. Liu, A. Alghamdi, I. Alam, and S. Biswas, "Blockchain Bridges Critical National Infrastructures: E-Healthcare Data Migration Perspective," IEEE Access, vol. 10, pp. 28509-28519, 2022, doi: 10.1109/ACCESS.2022.3156591
- Reza, Md. S., Biswas, S., Alghamdi, A., Alrizq, M., Bairagi, A. K., & Masud, M., "ACC: Blockchain Based Trusted Management of Academic Credentials." 2021 IEEE International Symposium on Smart Electronic Systems (ISES) (Formerly INiS), 438-443, 2021, https://doi.org/10.1109/iSES52644.2021.00104