Aug. 30, 2022, 1:20 a.m. | Jinhuan Wang, Pengtao Chen, Xinyao Xu, Jiajing Wu, Meng Shen, Qi Xuan, Xiaoniu Yang

cs.CR updates on arXiv.org arxiv.org

Due to the decentralized and public nature of the Blockchain ecosystem, the
malicious activities on the Ethereum platform impose immeasurable losses for
the users. Existing phishing scam detection methods mostly rely only on the
analysis of original transaction networks, which is difficult to dig deeply
into the transaction patterns hidden in the network structure of transaction
interaction. In this paper, we propose a \underline{T}ransaction
\underline{S}ub\underline{G}raph \underline{N}etwork (TSGN) based phishing
accounts identification framework for Ethereum. We first extract transaction
subgraphs for …

detection ethereum networks phishing phishing detection

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Cyber Security Culture – Communication and Content Specialist

@ H&M Group | Stockholm, Sweden

Container Hardening, Sr. (Remote | Top Secret)

@ Rackner | San Antonio, TX

GRC and Information Security Analyst

@ Intertek | United States

Information Security Officer

@ Sopra Steria | Bristol, United Kingdom

Casual Area Security Officer South Down Area

@ TSS | County Down, United Kingdom