ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
3
views
0
references
Top references
cited by
2
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,258
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
A first look at the crypto-mining malware ecosystem: A decade of unrestricted wealth
Author(s):
Publication date:
2019
Read this book at
Bookmark
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Hearing Loss and Restoration
Data availability:
Comments
Comment on this book
Sign in to comment
Similar content
1,258
Deep ground truth analysis of current android malware
Authors:
Wei
A PE header-based method for malware detection using clustering and deep embedding techniques
Authors:
Tina Rezaei
,
Farnoush Manavi
,
Ali Hamzeh
…
Classifying malware represented as control flow graphs using deep graph convolutional neural network
Authors:
See all similar
Cited by
2
A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security
Authors:
Morteza Safaei Pour
,
Christelle Nader
,
Kurt Friday
…
An analysis of fake social media engagement services
Authors:
David Nevado-Catalán
,
Sergio Pastrana
,
Narseo Vallina-Rodriguez
…
See all cited by