TY - JOUR AU - Baliga, A. PY - 2017 DA - 2017// TI - Understanding blockchain consensus models JO - Persistent VL - 2017 ID - Baliga2017 ER - TY - STD TI - Cai, F, Zhu N, He J, Mu P, Li W, Yu Y (2018) Survey of access control models and technologies for cloud computing. Clust Comput:1–12. https://doi.org/10.1007/s10586-018-1850-7. ID - ref2 ER - TY - JOUR AU - Conteh, N. Y. AU - Royer, M. D. PY - 2016 DA - 2016// TI - The rise in cybercrime and the dynamics of exploiting the human vulnerability factor JO - Int J Comput (IJC) VL - 20 ID - Conteh2016 ER - TY - STD TI - Course, ORMIA Specialized (2016) Social engineering. ID - ref4 ER - TY - JOUR AU - Crosby, M. AU - Pattanayak, P. AU - Verma, S. AU - Kalyanaraman, V. PY - 2016 DA - 2016// TI - Blockchain technology: Beyond bitcoin JO - Appl Innov VL - 2 ID - Crosby2016 ER - TY - JOUR AU - Ehrenfeld, J. M. PY - 2017 DA - 2017// TI - Wannacry, cybersecurity and health information technology: A time to act JO - J Med Syst VL - 41 UR - https://doi.org/10.1007/s10916-017-0752-1 DO - 10.1007/s10916-017-0752-1 ID - Ehrenfeld2017 ER - TY - JOUR AU - Ettredge, M. AU - Guo, F. AU - Li, Y. PY - 2018 DA - 2018// TI - Trade secrets and cyber security breaches JO - J Account Pub Policy VL - 37 UR - https://doi.org/10.1016/j.jaccpubpol.2018.10.006 DO - 10.1016/j.jaccpubpol.2018.10.006 ID - Ettredge2018 ER - TY - STD TI - Garcia, DJP, Ouye MM, Rossmann A, Crocker ST, Gilbertson E, Huang W, Humpich S, Vainstein K, Ryan NM (2015) Methods and systems for providing access control to secured data. Google Patents. US Patent 9,129,120. ID - ref8 ER - TY - STD TI - Jarvis, J (2017) Ransomware: Are you paying attention?https://www.fortinet.com/blog/industrytrends/ransomware-are-you-payingattention.html. Accessed 14 May 2018. ID - ref9 ER - TY - JOUR AU - Kshetri, N. AU - Voas, J. PY - 2017 DA - 2017// TI - Do crypto-currencies fuel ransomware? JO - IT Prof VL - 19 UR - https://doi.org/10.1109/MITP.2017.3680961 DO - 10.1109/MITP.2017.3680961 ID - Kshetri2017 ER - TY - JOUR AU - Malomo, O. O. AU - Rawat, D. B. AU - Garuba, M. PY - 2018 DA - 2018// TI - Next-generation cybersecurity through a blockchain-enabled federated cloud framework JO - J Supercomput VL - 74 UR - https://doi.org/10.1007/s11227-018-2385-7 DO - 10.1007/s11227-018-2385-7 ID - Malomo2018 ER - TY - STD TI - Malomo, O, Rawat DB, Garuba MA federated cloud computing framework for adaptive cyber defense and distributed computing In: 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 1–6. https://doi.org/10.1109/infcomw.2017.8376184. ID - ref12 ER - TY - JOUR AU - Malomo, O. O. AU - Rawat, D. B. AU - Garuba, M. PY - 2018 DA - 2018// TI - A Survey on Recent Advances in Cloud Computing Security JO - The Journal of Next Generation Information Technology VL - 9 ID - Malomo2018 ER - TY - JOUR AU - Page, J. AU - Kaur, M. AU - Waters, E. PY - 2017 DA - 2017// TI - Directors’ liability survey: Cyber attacks and data loss—a growing concern JO - J Data Prot Priv VL - 1 ID - Page2017 ER - TY - STD TI - Rawat, DB, Malomo O, Bajracharya C, Song M (2017) Evaluating physical-layer security for secondary users in cognitive radio systems with attackers In: MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 659–665. https://doi.org/10.1109/milcom.2017.8170855. ID - ref15 ER - TY - JOUR AU - Sabillon, R. AU - Cano, J. AU - Cavaller, R. V. AU - Serra Ruiz, J. PY - 2016 DA - 2016// TI - Cybercrime and cybercriminals: a comprehensive study JO - Int J Comput Netw Commun Secur VL - 4 ID - Sabillon2016 ER - TY - JOUR AU - Saridakis, G. AU - Benson, V. AU - Ezingeard, J. -. N. AU - Tennakoon, H. PY - 2016 DA - 2016// TI - Individual information security, user behaviour and cyber victimisation: An empirical study of social networking users JO - Technol Forecast Soc Chang VL - 102 UR - https://doi.org/10.1016/j.techfore.2015.08.012 DO - 10.1016/j.techfore.2015.08.012 ID - Saridakis2016 ER - TY - JOUR AU - Sayeed, S. AU - Marco-Gisbert, H. PY - 2019 DA - 2019// TI - Assessing Blockchain Consensus and Security Mechanisms against the 51% Attack JO - Appl Sci Multidiscip Digit Publ Inst VL - 9 ID - Sayeed2019 ER - TY - STD TI - Swanson, T (2015) Consensus-as-a-service: a brief report on the emergence of permissioned, distributed ledger systems. ID - ref19 ER - TY - STD TI - Tabone, SR (2017) Cyber Security: 51 Handy Things to Know about Cyber Attacks.. RJT Lion Publishing. ID - ref20 ER - TY - CHAP AU - Thomas, H. ED - Cormen, C. E. ED - Leiserson, R. L. ED - Rivest, C. S. PY - 2009 DA - 2009// TI - Amortized Analysis BT - Introduction to Algorithms PB - The MIT Press CY - Cambridge, Massachusetts London ID - Thomas2009 ER - TY - JOUR AU - Underwood, S. PY - 2016 DA - 2016// TI - Blockchain beyond bitcoin JO - Commun ACM VL - 59 UR - https://doi.org/10.1145/2994581 DO - 10.1145/2994581 ID - Underwood2016 ER - TY - STD TI - Yu, PK (2015) Trade Secret Hacking, Online Data Breaches, and China’s Cyberthreats. Cardozo L. Rev. De-Novo:130. ID - ref23 ER -