May 10, 2023, 1:10 a.m. | Yiming Jiang, Jiangfan Zhang

cs.CR updates on arXiv.org arxiv.org

Distributed detection over a blockchain-aided Internet of Things (BIoT)
network in the presence of attacks is considered, where the integrated
blockchain is employed to secure data exchanges over the BIoT as well as data
storage at the agents of the BIoT. We consider a general adversary model where
attackers jointly exploit the vulnerability of IoT devices and that of the
blockchain employed in the BIoT. The optimal attacking strategy which minimizes
the Kullback-Leibler divergence is pursued. It can be shown …

adversary attacks blockchain data data storage detection distributed general internet internet of things network secure data storage things

Intern, Cyber Security Vulnerability Management

@ Grab | Petaling Jaya, Malaysia

Compliance - Global Privacy Office - Associate - Bengaluru

@ Goldman Sachs | Bengaluru, Karnataka, India

Cyber Security Engineer (m/w/d) Operational Technology

@ MAN Energy Solutions | Oberhausen, DE, 46145

Armed Security Officer - Hospital

@ Allied Universal | Sun Valley, CA, United States

Governance, Risk and Compliance Officer (Africa)

@ dLocal | Lagos (Remote)

Junior Cloud DevSecOps Network Engineer

@ Accenture Federal Services | Arlington, VA