Login / Signup
Rebuilding Trust in Cryptocurrency Exchanges after Cyber-attacks.
Venkata Marella
Maryam Roshan Kokabha
Jani Merikivi
Virpi Tuunainen
Published in:
HICSS (2021)
Keyphrases
</>
cyber attacks
cyber security
countermeasures
trust model
security policies
critical infrastructure
privacy issues
intrusion detection system
dos attacks
intrusion detection
privacy concerns
computer systems
information security
smart grid
operating system
data mining
resource constrained