Aug. 26, 2022, 1:20 a.m. | Mayank Pandey, Rachit Agarwal, Sandeep Kumar Shukla, Nishchal Kumar Verma

cs.CR updates on arXiv.org arxiv.org

In cryptocurrency-based permissionless blockchain networks, the decentralized
structure enables any user to join and operate across different regions. The
criminal entities exploit it by using cryptocurrency transactions on the
blockchain to facilitate activities such as money laundering, gambling, and
ransomware attacks. In recent times, different machine learning-based
techniques can detect such criminal elements based on blockchain transaction
data. However, there is no provision within the blockchain to deal with such
elements. We propose a reputation-based methodology for response to the …

blockchain pos

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

IT Security Manager

@ Teltonika | Vilnius/Kaunas, VL, LT

Security Officer - Part Time - Harrah's Gulf Coast

@ Caesars Entertainment | Biloxi, MS, United States

DevSecOps Full-stack Developer

@ Peraton | Fort Gordon, GA, United States

Cybersecurity Cooperation Lead

@ Peraton | Stuttgart, AE, United States

Cybersecurity Engineer - Malware & Forensics

@ ManTech | 201DU - Customer Site,Herndon, VA