CINXE.COM
Search results for: malicious smart contracts
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: malicious smart contracts</title> <meta name="description" content="Search results for: malicious smart contracts"> <meta name="keywords" content="malicious smart contracts"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="malicious smart contracts" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="malicious smart contracts"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 1637</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: malicious smart contracts</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1637</span> Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Malaw%20Ndiaye">Malaw Ndiaye</a>, <a href="https://publications.waset.org/abstracts/search?q=Karim%20Konate"> Karim Konate</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. The blockchain would allow all these transactions to be saved in a single ledger rather than in many databases through many organizations as is currently the case. Smart contracts have become lucrative and profitable targets for attackers because they can hold a large amount of money. This paper takes stock of cryptocurrency crime by assessing attacks due to smart contracts and the cost of losses. These losses are often the result of two types of malicious contracts: vulnerable contracts and criminal smart contracts. Studying the behavior of malicious contracts allows us to understand the root causes and consequences of attacks and the defense capabilities that exist although they do not definitively solve the crime problem. It makes it possible to approach new defense perspectives which will be concretized in future work. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=malicious%20smart%20contracts" title=" malicious smart contracts"> malicious smart contracts</a>, <a href="https://publications.waset.org/abstracts/search?q=crypto-currency" title=" crypto-currency"> crypto-currency</a>, <a href="https://publications.waset.org/abstracts/search?q=crimes" title=" crimes"> crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=attacks" title=" attacks"> attacks</a> </p> <a href="https://publications.waset.org/abstracts/135277/cryptocurrency-crime-behaviors-of-malicious-smart-contracts-in-blockchain" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135277.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">275</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1636</span> A Survey on the Blockchain Smart Contract System: Security Strengths and Weaknesses</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Malaw%20Ndiaye">Malaw Ndiaye</a>, <a href="https://publications.waset.org/abstracts/search?q=Karim%20Konate"> Karim Konate</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Smart contracts are computer protocols that facilitate, verify, and execute the negotiation or execution of a contract, or that render a contractual term unnecessary. Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. Smart contracts have become lucrative and profitable targets for attackers because they can hold a great amount of money. Smart contracts, although widely used in blockchain technology, are far from perfect due to security concerns. Since there are recent studies on smart contract security, none of them systematically study the strengths and weaknesses of smart contract security. Some have focused on an analysis of program-related vulnerabilities by providing a taxonomy of vulnerabilities. Other studies are responsible for listing the series of attacks linked to smart contracts. Although a series of attacks are listed, there is a lack of discussions and proposals on improving security. This survey takes stock of smart contract security from a more comprehensive perspective by correlating the level of vulnerability and systematic review of security levels in smart contracts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=Bitcoin" title=" Bitcoin"> Bitcoin</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20contract" title=" smart contract"> smart contract</a>, <a href="https://publications.waset.org/abstracts/search?q=criminal%20smart%20contract" title=" criminal smart contract"> criminal smart contract</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/135465/a-survey-on-the-blockchain-smart-contract-system-security-strengths-and-weaknesses" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135465.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">168</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1635</span> Static Application Security Testing Approach for Non-Standard Smart Contracts</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Antonio%20Horta">Antonio Horta</a>, <a href="https://publications.waset.org/abstracts/search?q=Renato%20Marinho"> Renato Marinho</a>, <a href="https://publications.waset.org/abstracts/search?q=Raimir%20Holanda"> Raimir Holanda</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Considered as an evolution of the Blockchain, the Ethereum platform, besides allowing transactions of its cryptocurrency named Ether, it allows the programming of decentralised applications (DApps) and smart contracts. However, this functionality into blockchains has raised other types of threats, and the exploitation of smart contracts vulnerabilities has taken companies to experience big losses. This research intends to figure out the number of contracts that are under risk of being drained. Through a deep investigation, more than two hundred thousand smart contracts currently available in the Ethereum platform were scanned and estimated how much money is at risk. The experiment was based in a query run on Google Big Query in July 2022 and returned 50,707,133 contracts published on the Ethereum platform. After applying the filtering criteria, the experimentgot 430,584 smart contracts to download and analyse. The filtering criteria consisted of filtering out: ERC20 and ERC721 contracts, contracts without transactions, and contracts without balance. From this amount of 430,584 smart contracts selected, only 268,103 had source codes published on Etherscan, however, we discovered, using a hashing process, that there were contracts duplication. Removing the duplicated contracts, the process ended up with 20,417 source codes, which were analysed using the open source SAST tool smartbugswith oyente and securify algorithms. In the end, there was nearly $100,000 at risk of being drained from the potentially vulnerable smart contracts. It is important to note that the tools used in this study may generate false positives, which may interfere with the number of vulnerable contracts. To address this point, our next step in this research is to develop an application to test the contract in a parallel environment to verify the vulnerability. Finally, this study aims to alert users and companies about the risk on not properly creating and analysing their smart contracts before publishing them into the platform. As any other application, smart contracts are at risk of having vulnerabilities which, in this case, may result in direct financial losses. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=reentrancy" title=" reentrancy"> reentrancy</a>, <a href="https://publications.waset.org/abstracts/search?q=static%20application%20security%20testing" title=" static application security testing"> static application security testing</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20contracts" title=" smart contracts"> smart contracts</a> </p> <a href="https://publications.waset.org/abstracts/157274/static-application-security-testing-approach-for-non-standard-smart-contracts" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/157274.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">88</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1634</span> Formal Verification for Ethereum Smart Contract Using Coq</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xia%20Yang">Xia Yang</a>, <a href="https://publications.waset.org/abstracts/search?q=Zheng%20Yang"> Zheng Yang</a>, <a href="https://publications.waset.org/abstracts/search?q=Haiyong%20Sun"> Haiyong Sun</a>, <a href="https://publications.waset.org/abstracts/search?q=Yan%20Fang"> Yan Fang</a>, <a href="https://publications.waset.org/abstracts/search?q=Jingyu%20Liu"> Jingyu Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Jia%20Song"> Jia Song</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The smart contract in Ethereum is a unique program deployed on the Ethereum Virtual Machine (EVM) to help manage cryptocurrency. The security of this smart contract is critical to Ethereum’s operation and highly sensitive. In this paper, we present a formal model for smart contract, using the separated term-obligation (STO) strategy to formalize and verify the smart contract. We use the IBM smart sponsor contract (SSC) as an example to elaborate the detail of the formalizing process. We also propose a formal smart sponsor contract model (FSSCM) and verify SSC’s security properties with an interactive theorem prover Coq. We found the 'Unchecked-Send' vulnerability in the SSC, using our formal model and verification method. Finally, we demonstrate how we can formalize and verify other smart contracts with this approach, and our work indicates that this formal verification can effectively verify the correctness and security of smart contracts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20contract" title="smart contract">smart contract</a>, <a href="https://publications.waset.org/abstracts/search?q=formal%20verification" title=" formal verification"> formal verification</a>, <a href="https://publications.waset.org/abstracts/search?q=Ethereum" title=" Ethereum"> Ethereum</a>, <a href="https://publications.waset.org/abstracts/search?q=Coq" title=" Coq"> Coq</a> </p> <a href="https://publications.waset.org/abstracts/85595/formal-verification-for-ethereum-smart-contract-using-coq" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/85595.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">691</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1633</span> Smart Contracts: Bridging the Divide Between Code and Law</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abeeb%20Abiodun%20Bakare">Abeeb Abiodun Bakare</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The advent of blockchain technology has birthed a revolutionary innovation: smart contracts. These self-executing contracts, encoded within the immutable ledger of a blockchain, hold the potential to transform the landscape of traditional contractual agreements. This research paper embarks on a comprehensive exploration of the legal implications surrounding smart contracts, delving into their enforceability and their profound impact on traditional contract law. The first section of this paper delves into the foundational principles of smart contracts, elucidating their underlying mechanisms and technological intricacies. By harnessing the power of blockchain technology, smart contracts automate the execution of contractual terms, eliminating the need for intermediaries and enhancing efficiency in commercial transactions. However, this technological marvel raises fundamental questions regarding legal enforceability and compliance with traditional legal frameworks. Moving beyond the realm of technology, the paper proceeds to analyze the legal validity of smart contracts within the context of traditional contract law. Drawing upon established legal principles, such as offer, acceptance, and consideration, we examine the extent to which smart contracts satisfy the requirements for forming a legally binding agreement. Furthermore, we explore the challenges posed by jurisdictional issues as smart contracts transcend physical boundaries and operate within a decentralized network. Central to this analysis is the examination of the role of arbitration and dispute resolution mechanisms in the context of smart contracts. While smart contracts offer unparalleled efficiency and transparency in executing contractual terms, disputes inevitably arise, necessitating mechanisms for resolution. We investigate the feasibility of integrating arbitration clauses within smart contracts, exploring the potential for decentralized arbitration platforms to streamline dispute resolution processes. Moreover, this paper explores the implications of smart contracts for traditional legal intermediaries, such as lawyers and judges. As smart contracts automate the execution of contractual terms, the role of legal professionals in contract drafting and interpretation may undergo significant transformation. We assess the implications of this paradigm shift for legal practice and the broader legal profession. In conclusion, this research paper provides a comprehensive analysis of the legal implications surrounding smart contracts, illuminating the intricate interplay between code and law. While smart contracts offer unprecedented efficiency and transparency in commercial transactions, their legal validity remains subject to scrutiny within traditional legal frameworks. By navigating the complex landscape of smart contract law, we aim to provide insights into the transformative potential of this groundbreaking technology. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart-contracts" title="smart-contracts">smart-contracts</a>, <a href="https://publications.waset.org/abstracts/search?q=law" title=" law"> law</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=legal" title=" legal"> legal</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a> </p> <a href="https://publications.waset.org/abstracts/184706/smart-contracts-bridging-the-divide-between-code-and-law" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/184706.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">45</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1632</span> Ethereum Based Smart Contracts for Trade and Finance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rishabh%20Garg">Rishabh Garg</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Traditionally, business parties build trust with a centralized operating mechanism, such as payment by letter of credit. However, the increase in cyber-attacks and malicious hacking has jeopardized business operations and finance practices. Emerging markets, owing to their higher banking risks and bigger presence of digital financing, are looking forward to technology-driven solutions, financial inclusion and innovative working paradigms. Blockchain has the potential to enhance transaction transparency and supply chain traceability. It has captured a vast landscape with 200 million crypto users worldwide. Fintech and blockchain products are popping up across brokerage, digital wallets, exchanges, post-trade clearance, settlement, middleware, infrastructure, and base protocols. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20ledger%20technology" title=" distributed ledger technology"> distributed ledger technology</a>, <a href="https://publications.waset.org/abstracts/search?q=decentralized%20applications" title=" decentralized applications"> decentralized applications</a>, <a href="https://publications.waset.org/abstracts/search?q=ethereum" title=" ethereum"> ethereum</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20contracts" title=" smart contracts"> smart contracts</a>, <a href="https://publications.waset.org/abstracts/search?q=trade%20finance" title=" trade finance"> trade finance</a> </p> <a href="https://publications.waset.org/abstracts/145136/ethereum-based-smart-contracts-for-trade-and-finance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145136.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">155</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1631</span> Logistics and Supply Chain Management Using Smart Contracts on Blockchain</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Armen%20Grigoryan">Armen Grigoryan</a>, <a href="https://publications.waset.org/abstracts/search?q=Milena%20Arakelyan"> Milena Arakelyan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The idea of smart logistics is still quite a complicated one. It can be used to market products to a large number of customers or to acquire raw materials of the highest quality at the lowest cost in geographically dispersed areas. The use of smart contracts in logistics and supply chain management has the potential to revolutionize the way that goods are tracked, transported, and managed. Smart contracts are simply computer programs written in one of the blockchain programming languages (Solidity, Rust, Vyper), which are capable of self-execution once the predetermined conditions are met. They can be used to automate and streamline many of the traditional manual processes that are currently used in logistics and supply chain management, including the tracking and movement of goods, the management of inventory, and the facilitation of payments and settlements between different parties in the supply chain. Currently, logistics is a core area for companies which is concerned with transporting products between parties. Still, the problem of this sector is that its scale may lead to detainments and defaults in the delivery of goods, as well as other issues. Moreover, large distributors require a large number of workers to meet all the needs of their stores. All this may contribute to big detainments in order processing and increases the potentiality of losing orders. In an attempt to break this problem, companies have automated all their procedures, contributing to a significant augmentation in the number of businesses and distributors in the logistics sector. Hence, blockchain technology and smart contracted legal agreements seem to be suitable concepts to redesign and optimize collaborative business processes and supply chains. The main purpose of this paper is to examine the scope of blockchain technology and smart contracts in the field of logistics and supply chain management. This study discusses the research question of how and to which extent smart contracts and blockchain technology can facilitate and improve the implementation of collaborative business structures for sustainable entrepreneurial activities in smart supply chains. The intention is to provide a comprehensive overview of the existing research on the use of smart contracts in logistics and supply chain management and to identify any gaps or limitations in the current knowledge on this topic. This review aims to provide a summary and evaluation of the key findings and themes that emerge from the research, as well as to suggest potential directions for future research on the use of smart contracts in logistics and supply chain management. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20contracts" title="smart contracts">smart contracts</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20logistics" title=" smart logistics"> smart logistics</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20supply%20chain%20management" title=" smart supply chain management"> smart supply chain management</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain%20and%20smart%20contracts%20in%20logistics" title=" blockchain and smart contracts in logistics"> blockchain and smart contracts in logistics</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20contracts%20for%20controlling%20supply%20chain%20management" title=" smart contracts for controlling supply chain management"> smart contracts for controlling supply chain management</a> </p> <a href="https://publications.waset.org/abstracts/161535/logistics-and-supply-chain-management-using-smart-contracts-on-blockchain" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161535.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">96</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1630</span> The Synergistic Effects of Blockchain and AI on Enhancing Data Integrity and Decision-Making Accuracy in Smart Contracts</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sayor%20Ajfar%20Aaron">Sayor Ajfar Aaron</a>, <a href="https://publications.waset.org/abstracts/search?q=Sajjat%20Hossain%20Abir"> Sajjat Hossain Abir</a>, <a href="https://publications.waset.org/abstracts/search?q=Ashif%20Newaz"> Ashif Newaz</a>, <a href="https://publications.waset.org/abstracts/search?q=Mushfiqur%20Rahman"> Mushfiqur Rahman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Investigating the convergence of blockchain technology and artificial intelligence, this paper examines their synergistic effects on data integrity and decision-making within smart contracts. By implementing AI-driven analytics on blockchain-based platforms, the research identifies improvements in automated contract enforcement and decision accuracy. The paper presents a framework that leverages AI to enhance transparency and trust while blockchain ensures immutable record-keeping, culminating in significantly optimized operational efficiencies in various industries. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title="artificial intelligence">artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20integrity" title=" data integrity"> data integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20contracts" title=" smart contracts"> smart contracts</a> </p> <a href="https://publications.waset.org/abstracts/185868/the-synergistic-effects-of-blockchain-and-ai-on-enhancing-data-integrity-and-decision-making-accuracy-in-smart-contracts" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/185868.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">55</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1629</span> A Security Study for Smart Metering Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Musaab%20Hasan">Musaab Hasan</a>, <a href="https://publications.waset.org/abstracts/search?q=Farkhund%20Iqbal"> Farkhund Iqbal</a>, <a href="https://publications.waset.org/abstracts/search?q=Patrick%20C.%20K.%20Hung"> Patrick C. K. Hung</a>, <a href="https://publications.waset.org/abstracts/search?q=Benjamin%20C.%20M.%20Fung"> Benjamin C. M. Fung</a>, <a href="https://publications.waset.org/abstracts/search?q=Laura%20Rafferty"> Laura Rafferty</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In modern societies, the smart cities concept raised simultaneously with the projection towards adopting smart devices. A smart grid is an essential part of any smart city as both consumers and power utility companies benefit from the features provided by the power grid. In addition to advanced features presented by smart grids, there may also be a risk when the grids are exposed to malicious acts such as security attacks performed by terrorists. Considering advanced security measures in the design of smart meters could reduce these risks. This paper presents a security study for smart metering systems with a prototype implementation of the user interfaces for future works. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=security%20design" title="security design">security design</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20city" title=" smart city"> smart city</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20meter" title=" smart meter"> smart meter</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20grid" title=" smart grid"> smart grid</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20metering%20system" title=" smart metering system"> smart metering system</a> </p> <a href="https://publications.waset.org/abstracts/79129/a-security-study-for-smart-metering-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/79129.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">336</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1628</span> Taxonomy of Threats and Vulnerabilities in Smart Grid Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Faisal%20Al%20Yahmadi">Faisal Al Yahmadi</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20R.%20Ahmed"> Muhammad R. Ahmed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Electric power is a fundamental necessity in the 21<sup>st</sup> century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20grid%20network" title="smart grid network">smart grid network</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=threats" title=" threats"> threats</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerabilities" title=" vulnerabilities"> vulnerabilities</a> </p> <a href="https://publications.waset.org/abstracts/135866/taxonomy-of-threats-and-vulnerabilities-in-smart-grid-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135866.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">139</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1627</span> Bitcoin, Blockchain and Smart Contract: Attacks and Mitigations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Rasslan">Mohamed Rasslan</a>, <a href="https://publications.waset.org/abstracts/search?q=Doaa%20Abdelrahman"> Doaa Abdelrahman</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahmoud%20M.%20Nasreldin"> Mahmoud M. Nasreldin</a>, <a href="https://publications.waset.org/abstracts/search?q=Ghada%20Farouk"> Ghada Farouk</a>, <a href="https://publications.waset.org/abstracts/search?q=Heba%20K.%20Aslan"> Heba K. Aslan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Blockchain is a distributed database that endorses transparency while bitcoin is a decentralized cryptocurrency (electronic cash) that endorses anonymity and is powered by blockchain technology. Smart contracts are programs that are stored on a blockchain. Smart contracts are executed when predetermined conditions are fulfilled. Smart contracts automate the agreement execution in order to make sure that all participants immediate-synchronism of the outcome-certainty, without any intermediary's involvement or time loss. Currently, the Bitcoin market worth billions of dollars. Bitcoin could be transferred from one purchaser to another without the need for an intermediary bank. Network nodes through cryptography verify bitcoin transactions, which are registered in a public-book called “blockchain”. Bitcoin could be replaced by other coins, merchandise, and services. Rapid growing of the bitcoin market-value, encourages its counterparts to make use of its weaknesses and exploit vulnerabilities for profit. Moreover, it motivates scientists to define known vulnerabilities, offer countermeasures, and predict future threats. In his paper, we study blockchain technology and bitcoin from the attacker’s point of view. Furthermore, mitigations for the attacks are suggested, and contemporary security solutions are discussed. Finally, research methods that achieve strict security and privacy protocol are elaborated. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cryptocurrencies" title="Cryptocurrencies">Cryptocurrencies</a>, <a href="https://publications.waset.org/abstracts/search?q=Blockchain" title=" Blockchain"> Blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=Bitcoin" title=" Bitcoin"> Bitcoin</a>, <a href="https://publications.waset.org/abstracts/search?q=Smart%20Contracts" title=" Smart Contracts"> Smart Contracts</a>, <a href="https://publications.waset.org/abstracts/search?q=Peer-to-Peer%20Network" title=" Peer-to-Peer Network"> Peer-to-Peer Network</a>, <a href="https://publications.waset.org/abstracts/search?q=Security%20Issues" title=" Security Issues"> Security Issues</a>, <a href="https://publications.waset.org/abstracts/search?q=Privacy%20Techniques" title=" Privacy Techniques"> Privacy Techniques</a> </p> <a href="https://publications.waset.org/abstracts/164642/bitcoin-blockchain-and-smart-contract-attacks-and-mitigations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164642.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">82</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1626</span> A Study of Blockchain Oracles</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdeljalil%20Beniiche">Abdeljalil Beniiche</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The limitation with smart contracts is that they cannot access external data that might be required to control the execution of business logic. Oracles can be used to provide external data to smart contracts. An oracle is an interface that delivers data from external data outside the blockchain to a smart contract to consume. Oracle can deliver different types of data depending on the industry and requirements. In this paper, we study and describe the widely used blockchain oracles. Then, we elaborate on his potential role, technical architecture, and design patterns. Finally, we discuss the human oracle and its key role in solving the truth problem by reaching a consensus about a certain inquiry and tasks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=oracles" title=" oracles"> oracles</a>, <a href="https://publications.waset.org/abstracts/search?q=oracles%20design" title=" oracles design"> oracles design</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20oracles" title=" human oracles"> human oracles</a> </p> <a href="https://publications.waset.org/abstracts/133352/a-study-of-blockchain-oracles" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/133352.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1625</span> A Decentralized Application for Secure Data Handling of Wireless Networks Using Ethereum Smart Contracts</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Midhun%20Xavier">Midhun Xavier</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper introduces a method to verify multi-agent systems in industrial control systems using blockchain technology. The proposed solution enables to record and verify each process that occurs while generating a customized product using Ethereum-based smart contracts. Node-Red software agents are developed with the help of semantic web technologies, and these software agents interact with IEC 61499 function blocks to execute the processes. The agent associated with each mechatronic component and its controller can communicate with the blockchain to record various events that occur during each process, and the latter smart contract helps to verify these process orders of the customized product. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=Ethereum" title=" Ethereum"> Ethereum</a>, <a href="https://publications.waset.org/abstracts/search?q=node-red" title=" node-red"> node-red</a>, <a href="https://publications.waset.org/abstracts/search?q=IEC%2061499" title=" IEC 61499"> IEC 61499</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-agent%20system" title=" multi-agent system"> multi-agent system</a>, <a href="https://publications.waset.org/abstracts/search?q=MQTT" title=" MQTT"> MQTT</a> </p> <a href="https://publications.waset.org/abstracts/158419/a-decentralized-application-for-secure-data-handling-of-wireless-networks-using-ethereum-smart-contracts" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/158419.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">94</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1624</span> Securing Online Voting With Blockchain and Smart Contracts</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anant%20Mehrotra">Anant Mehrotra</a>, <a href="https://publications.waset.org/abstracts/search?q=Krish%20Phagwani"> Krish Phagwani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Democratic voting is vital for any country, but current methods like ballot papers or EVMs have drawbacks, including transparency issues, low voter turnout, and security concerns. Blockchain technology offers a potential solution by providing a secure, decentralized, and transparent platform for e-voting. With features like immutability, security, and anonymity, blockchain combined with smart contracts can enhance trust and prevent vote tampering. This paper explores an Ethereum-based e-voting application using Solidity, showcasing a web app that prevents duplicate voting through a token-based system, while also discussing the advantages and limitations of blockchain in digital voting. Voting is a crucial component of democratic decision-making, yet current methods, like paper ballots, remain outdated and inefficient. This paper reviews blockchain-based voting systems, highlighting strategies and guidelines to create a comprehensive electronic voting system that leverages cryptographic techniques, such as zero-knowledge proofs, to enhance privacy. It addresses limitations of existing e-voting solutions, including cost, identity management, and scalability, and provides key insights for organizations looking to design their own blockchain-based voting systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=electronic%20voting" title="electronic voting">electronic voting</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20contracts" title=" smart contracts"> smart contracts</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain%20nased%20voting" title=" blockchain nased voting"> blockchain nased voting</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/193842/securing-online-voting-with-blockchain-and-smart-contracts" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/193842.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">9</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1623</span> AI-Enabled Smart Contracts for Reliable Traceability in the Industry 4.0</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Harris%20Niavis">Harris Niavis</a>, <a href="https://publications.waset.org/abstracts/search?q=Dimitra%20Politaki"> Dimitra Politaki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The manufacturing industry was collecting vast amounts of data for monitoring product quality thanks to the advances in the ICT sector and dedicated IoT infrastructure is deployed to track and trace the production line. However, industries have not yet managed to unleash the full potential of these data due to defective data collection methods and untrusted data storage and sharing. Blockchain is gaining increasing ground as a key technology enabler for Industry 4.0 and the smart manufacturing domain, as it enables the secure storage and exchange of data between stakeholders. On the other hand, AI techniques are more and more used to detect anomalies in batch and time-series data that enable the identification of unusual behaviors. The proposed scheme is based on smart contracts to enable automation and transparency in the data exchange, coupled with anomaly detection algorithms to enable reliable data ingestion in the system. Before sensor measurements are fed to the blockchain component and the smart contracts, the anomaly detection mechanism uniquely combines artificial intelligence models to effectively detect unusual values such as outliers and extreme deviations in data coming from them. Specifically, Autoregressive integrated moving average, Long short-term memory (LSTM) and Dense-based autoencoders, as well as Generative adversarial networks (GAN) models, are used to detect both point and collective anomalies. Towards the goal of preserving the privacy of industries' information, the smart contracts employ techniques to ensure that only anonymized pointers to the actual data are stored on the ledger while sensitive information remains off-chain. In the same spirit, blockchain technology guarantees the security of the data storage through strong cryptography as well as the integrity of the data through the decentralization of the network and the execution of the smart contracts by the majority of the blockchain network actors. The blockchain component of the Data Traceability Software is based on the Hyperledger Fabric framework, which lays the ground for the deployment of smart contracts and APIs to expose the functionality to the end-users. The results of this work demonstrate that such a system can increase the quality of the end-products and the trustworthiness of the monitoring process in the smart manufacturing domain. The proposed AI-enabled data traceability software can be employed by industries to accurately trace and verify records about quality through the entire production chain and take advantage of the multitude of monitoring records in their databases. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20quality" title=" data quality"> data quality</a>, <a href="https://publications.waset.org/abstracts/search?q=industry4.0" title=" industry4.0"> industry4.0</a>, <a href="https://publications.waset.org/abstracts/search?q=product%20quality" title=" product quality"> product quality</a> </p> <a href="https://publications.waset.org/abstracts/141980/ai-enabled-smart-contracts-for-reliable-traceability-in-the-industry-40" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141980.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">189</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1622</span> The Implications of Technological Advancements on the Constitutional Principles of Contract Law</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Laura%20%C3%87ami%20%28Vorpsi%29">Laura Çami (Vorpsi)</a>, <a href="https://publications.waset.org/abstracts/search?q=Xhon%20Sk%C3%ABnderi"> Xhon Skënderi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In today's rapidly evolving technological landscape, the traditional principles of contract law are facing significant challenges. The emergence of new technologies, such as electronic signatures, smart contracts, and online dispute resolution mechanisms, is transforming the way contracts are formed, interpreted, and enforced. This paper examines the implications of these technological advancements on the constitutional principles of contract law. One of the fundamental principles of contract law is freedom of contract, which ensures that parties have the autonomy to negotiate and enter into contracts as they see fit. However, the use of technology in the contracting process has the potential to disrupt this principle. For example, online platforms and marketplaces often offer standard-form contracts, which may not reflect the specific needs or interests of individual parties. This raises questions about the equality of bargaining power between parties and the extent to which parties are truly free to negotiate the terms of their contracts. Another important principle of contract law is the requirement of consideration, which requires that each party receives something of value in exchange for their promise. The use of digital assets, such as cryptocurrencies, has created new challenges in determining what constitutes valuable consideration in a contract. Due to the ambiguity in this area, disagreements about the legality and enforceability of such contracts may arise. Furthermore, the use of technology in dispute resolution mechanisms, such as online arbitration and mediation, may raise concerns about due process and access to justice. The use of algorithms and artificial intelligence to determine the outcome of disputes may also raise questions about the impartiality and fairness of the process. Finally, it should be noted that there are many different and complex effects of technical improvements on the fundamental constitutional foundations of contract law. As technology continues to evolve, it will be important for policymakers and legal practitioners to consider the potential impacts on contract law and to ensure that the principles of fairness, equality, and access to justice are preserved in the contracting process. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=technological%20advancements" title="technological advancements">technological advancements</a>, <a href="https://publications.waset.org/abstracts/search?q=constitutional%20principles" title=" constitutional principles"> constitutional principles</a>, <a href="https://publications.waset.org/abstracts/search?q=contract%20law" title=" contract law"> contract law</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20contracts" title=" smart contracts"> smart contracts</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20dispute%20resolution" title=" online dispute resolution"> online dispute resolution</a>, <a href="https://publications.waset.org/abstracts/search?q=freedom%20of%20contract" title=" freedom of contract"> freedom of contract</a> </p> <a href="https://publications.waset.org/abstracts/164524/the-implications-of-technological-advancements-on-the-constitutional-principles-of-contract-law" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164524.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">150</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1621</span> Comparison of Buyback Contracts and Concession Regimes in the Regime of the Common Law System and the Islamic Legal Regime</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Javid%20Zarei">Javid Zarei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> International buyback contracts are a type of contract service. These kinds of contracts are the most important instrument for attracting foreign investors in accordance with Iran's laws. These contracts have been the basis of commercial and economic relations between Iran and foreign companies for about 30 years. The legal structure of this type of contract has gradually evolved, so today, an advanced generation of it under the title of Iran Petroleum Contract is being used in the industry of Iran. This article has analytically examined the issue of Iran's commercial contracts in the oil industry and contracting services and allocated sections to examine the strengths and weaknesses of these oil contracts. Also, this research is an attempt to examine and compare the Concession regime with the Buyback contracts, each of which is derived from the common law legal system and the Islamic legal system, respectively. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=buyback%20contracts" title="buyback contracts">buyback contracts</a>, <a href="https://publications.waset.org/abstracts/search?q=concession%20regime" title=" concession regime"> concession regime</a>, <a href="https://publications.waset.org/abstracts/search?q=ownership" title=" ownership"> ownership</a>, <a href="https://publications.waset.org/abstracts/search?q=common%20law%20legal%20system" title=" common law legal system"> common law legal system</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20legal%20system%20of%20Iran" title=" Islamic legal system of Iran"> Islamic legal system of Iran</a> </p> <a href="https://publications.waset.org/abstracts/156460/comparison-of-buyback-contracts-and-concession-regimes-in-the-regime-of-the-common-law-system-and-the-islamic-legal-regime" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/156460.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">82</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1620</span> A Multi-Agent Smart E-Market Design at Work for Shariah Compliant Islamic Banking</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wafa%20Ghonaim">Wafa Ghonaim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Though quite fast on growth, Islamic financing at large, and its diverse instruments, is a controversial matter among scholars. This is evident from the ongoing debates on its Shariah compliance. Arguments, however, are inciting doubts and concerns among clients about its credibility, which is harming this lucrative sector. The work here investigates, particularly, some issues related to the Tawarruq instrument. The work examines the issues of linking Murabaha and Wakala contracts, the reselling of commodities to same traders, and the transfer of ownerships. The work affirms that a multi-agent smart electronic market design would facilitate Shariah compliance. The smart market exploits the rational decision-making capabilities of autonomous proxy agents that enable the clients, traders, brokers, and the bank buy and sell commodities, and manage transactions and cash flow. The smart electronic market design delivers desirable qualities that terminate the need for Wakala contracts and the reselling of commodities to the same traders. It also resolves the ownership transfer issues by allowing stakeholders to trade independently. The bank administers the smart electronic market and assures reliability of trades, transactions and cash flow. A multi-agent simulation is presented to validate the concept and processes. We anticipate that the multi-agent smart electronic market design would deliver Shariah compliance of personal financing to the aspiration of scholars, banks, traders and potential clients. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Islamic%20finance" title="Islamic finance">Islamic finance</a>, <a href="https://publications.waset.org/abstracts/search?q=share%27ah%20compliance" title=" share'ah compliance"> share'ah compliance</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20electronic%20markets%20design" title=" smart electronic markets design"> smart electronic markets design</a>, <a href="https://publications.waset.org/abstracts/search?q=multiagent%20systems" title=" multiagent systems"> multiagent systems</a> </p> <a href="https://publications.waset.org/abstracts/82623/a-multi-agent-smart-e-market-design-at-work-for-shariah-compliant-islamic-banking" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82623.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">317</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1619</span> Renegotiating International Contract Clauses: The Case of Investment Environment Changes in Egypt</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Marwa%20Zein">Marwa Zein</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The long-term of the contract is one of the major features that distinguish international trade and investment contracts from other internal contracts. This is due to the nature of the contract and the huge works required to be performed from one hand or the desire of the parties to achieve stability in their transactions. However, long-term contracts might expose them to certain events and circumstances that impact the capability of the parties to execute their obligations pursuant to these contracts. During the year 2016, the Egyptian government has taken series of economic decisions which greatly impacted the economic and investment environment. Consequently, many contracts have encountered many problems in their execution due to such changes that greatly influence the performance of their obligation, a matter that necessitated the renegotiation of the conditions of these contracts on the basis of the unpredicted changes that could be listed under the Force Majeure Clause. The principle of fair and equitable treatment in investment placed on an obligation on the Egyptian government to consider the renegotiation of contract clauses based on the new conditions. This paper will discuss the idea of renegotiating international trade and investment contracts in Egypt with reference to the changes the economic environment has witnessed lately. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=change%20of%20circumstances" title="change of circumstances">change of circumstances</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20contracts" title=" international contracts"> international contracts</a>, <a href="https://publications.waset.org/abstracts/search?q=investment%20contracts" title=" investment contracts"> investment contracts</a>, <a href="https://publications.waset.org/abstracts/search?q=renegotiation" title=" renegotiation"> renegotiation</a> </p> <a href="https://publications.waset.org/abstracts/87880/renegotiating-international-contract-clauses-the-case-of-investment-environment-changes-in-egypt" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/87880.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">197</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1618</span> Challenges of Blockchain Applications in the Supply Chain Industry: A Regulatory Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pardis%20Moslemzadeh%20Tehrani">Pardis Moslemzadeh Tehrani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Due to the emergence of blockchain technology and the benefits of cryptocurrencies, intelligent or smart contracts are gaining traction. Artificial intelligence (AI) is transforming our lives, and it is being embraced by a wide range of sectors. Smart contracts, which are at the heart of blockchains, incorporate AI characteristics. Such contracts are referred to as "smart" contracts because of the underlying technology that allows contracting parties to agree on terms expressed in computer code that defines machine-readable instructions for computers to follow under specific situations. The transmission happens automatically if the conditions are met. Initially utilised for financial transactions, blockchain applications have since expanded to include the financial, insurance, and medical sectors, as well as supply networks. Raw material acquisition by suppliers, design, and fabrication by manufacturers, delivery of final products to consumers, and even post-sales logistics assistance are all part of supply chains. Many issues are linked with managing supply chains from the planning and coordination stages, which can be implemented in a smart contract in a blockchain due to their complexity. Manufacturing delays and limited third-party amounts of product components have raised concerns about the integrity and accountability of supply chains for food and pharmaceutical items. Other concerns include regulatory compliance in multiple jurisdictions and transportation circumstances (for instance, many products must be kept in temperature-controlled environments to ensure their effectiveness). Products are handled by several providers before reaching customers in modern economic systems. Information is sent between suppliers, shippers, distributors, and retailers at every stage of the production and distribution process. Information travels more effectively when individuals are eliminated from the equation. The usage of blockchain technology could be a viable solution to these coordination issues. In blockchains, smart contracts allow for the rapid transmission of production data, logistical data, inventory levels, and sales data. This research investigates the legal and technical advantages and disadvantages of AI-blockchain technology in the supply chain business. It aims to uncover the applicable legal problems and barriers to the use of AI-blockchain technology to supply chains, particularly in the food industry. It also discusses the essential legal and technological issues and impediments to supply chain implementation for stakeholders, as well as methods for overcoming them before releasing the technology to clients. Because there has been little research done on this topic, it is difficult for industrial stakeholders to grasp how blockchain technology could be used in their respective operations. As a result, the focus of this research will be on building advanced and complex contractual terms in supply chain smart contracts on blockchains to cover all unforeseen supply chain challenges. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=supply%20chain" title=" supply chain"> supply chain</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20contract" title=" smart contract"> smart contract</a> </p> <a href="https://publications.waset.org/abstracts/150473/challenges-of-blockchain-applications-in-the-supply-chain-industry-a-regulatory-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150473.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">126</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1617</span> Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Moslehpour">M. Moslehpour</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Khorsandi"> S. Khorsandi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CGA" title="CGA">CGA</a>, <a href="https://publications.waset.org/abstracts/search?q=ICMPv6" title=" ICMPv6"> ICMPv6</a>, <a href="https://publications.waset.org/abstracts/search?q=IPv6" title=" IPv6"> IPv6</a>, <a href="https://publications.waset.org/abstracts/search?q=malicious%20node" title=" malicious node"> malicious node</a>, <a href="https://publications.waset.org/abstracts/search?q=modifier" title=" modifier"> modifier</a>, <a href="https://publications.waset.org/abstracts/search?q=NDP" title=" NDP"> NDP</a>, <a href="https://publications.waset.org/abstracts/search?q=overall%20load" title=" overall load"> overall load</a>, <a href="https://publications.waset.org/abstracts/search?q=SEND" title=" SEND"> SEND</a>, <a href="https://publications.waset.org/abstracts/search?q=trust%20management" title=" trust management"> trust management</a> </p> <a href="https://publications.waset.org/abstracts/41739/improving-cryptographically-generated-address-algorithm-in-ipv6-secure-neighbor-discovery-protocol-through-trust-management" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41739.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">184</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1616</span> Empowering Certificate Management with Blockchain Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yash%20Ambekar">Yash Ambekar</a>, <a href="https://publications.waset.org/abstracts/search?q=Kapil%20Vhatkar"> Kapil Vhatkar</a>, <a href="https://publications.waset.org/abstracts/search?q=Prathamesh%20Swami"> Prathamesh Swami</a>, <a href="https://publications.waset.org/abstracts/search?q=Kartikey%20Singh"> Kartikey Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Yashovardhan%20Kaware"> Yashovardhan Kaware</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The rise of online courses and certifications has created new opportunities for individuals to enhance their skills. However, this digital transformation has also given rise to coun- terfeit certificates. To address this multifaceted issue, we present a comprehensive certificate management system founded on blockchain technology and strengthened by smart contracts. Our system comprises three pivotal components: certificate generation, authenticity verification, and a user-centric digital locker for certificate storage. Blockchain technology underpins the entire system, ensuring the immutability and integrity of each certificate. The inclusion of a cryptographic hash for each certificate is a fundamental aspect of our design. Any alteration in the certificate’s data will yield a distinct hash, a powerful indicator of potential tampering. Furthermore, our system includes a secure digital locker based on cloud storage that empowers users to efficiently manage and access all their certificates in one place. Moreover, our project is committed to providing features for certificate revocation and updating, thereby enhancing the system’s flexibility and security. Hence, the blockchain and smart contract-based certificate management system offers a robust and one-stop solution to the escalating problem of counterfeit certificates in the digital era. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain%20technology" title="blockchain technology">blockchain technology</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20contracts" title=" smart contracts"> smart contracts</a>, <a href="https://publications.waset.org/abstracts/search?q=counterfeit%20certificates" title=" counterfeit certificates"> counterfeit certificates</a>, <a href="https://publications.waset.org/abstracts/search?q=authenticity%20verification" title=" authenticity verification"> authenticity verification</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptographic%20hash" title=" cryptographic hash"> cryptographic hash</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20locker" title=" digital locker"> digital locker</a> </p> <a href="https://publications.waset.org/abstracts/182702/empowering-certificate-management-with-blockchain-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/182702.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">46</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1615</span> Communication Layer Security in Smart Farming: A Survey on Wireless Technologies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hossein%20Mohammadi%20Rouzbahani">Hossein Mohammadi Rouzbahani</a>, <a href="https://publications.waset.org/abstracts/search?q=Hadis%20Karimipour"> Hadis Karimipour</a>, <a href="https://publications.waset.org/abstracts/search?q=Evan%20Fraser"> Evan Fraser</a>, <a href="https://publications.waset.org/abstracts/search?q=Ali%20Dehghantanha"> Ali Dehghantanha</a>, <a href="https://publications.waset.org/abstracts/search?q=Emily%20Duncan"> Emily Duncan</a>, <a href="https://publications.waset.org/abstracts/search?q=Arthur%20Green"> Arthur Green</a>, <a href="https://publications.waset.org/abstracts/search?q=Conchobhair%20Russell"> Conchobhair Russell</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Human population growth has driven rising demand for food that has, in turn, imposed huge impacts on the environment. In an effort to reconcile our need to produce more sustenance while also protecting the world’s ecosystems, farming is becoming more reliant on smart tools and communication technologies. Developing a smart farming framework allows farmers to make more efficient use of inputs, thus protecting water quality and biodiversity habitat. Internet of Things (IoT), which has revolutionized every sphere of the economy, is being applied to agriculture by connecting on-farm devices and providing real-time monitoring of everything from environmental conditions to market signals through to animal health data. However, utilizing IoT means farming networks are now vulnerable to malicious activities, mostly when wireless communications are highly employed. With that in mind, this research aims to review different utilized communication technologies in smart farming. Moreover, possible cyber-attacks are investigated to discover the vulnerabilities of communication technologies considering the most frequent cyber-attacks that have been happened. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20farming" title="smart farming">smart farming</a>, <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things" title=" Internet of Things"> Internet of Things</a>, <a href="https://publications.waset.org/abstracts/search?q=communication%20layer" title=" communication layer"> communication layer</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-attack" title=" cyber-attack"> cyber-attack</a> </p> <a href="https://publications.waset.org/abstracts/138941/communication-layer-security-in-smart-farming-a-survey-on-wireless-technologies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/138941.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">242</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1614</span> A Case Study on Smart Energy City of the UK: Based on Business Model Innovation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Minzheong%20Song">Minzheong Song </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this paper is to see a case of smart energy evolution of the UK along with government projects and smart city project like 'Smart London Plan (SLP)' in 2013 with the logic of business model innovation (BMI). For this, it discusses the theoretical logic and formulates a research framework of evolving smart energy from silo to integrated system. The starting point is the silo system with no connection and in second stage, the private investment in smart meters, smart grids implementation, energy and water nexus, adaptive smart grid systems, and building marketplaces with platform leadership. As results, the UK’s smart energy sector has evolved from smart meter device installation through smart grid to new business models such as water-energy nexus and microgrid service within the smart energy city system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20city" title="smart city">smart city</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20energy" title=" smart energy"> smart energy</a>, <a href="https://publications.waset.org/abstracts/search?q=business%20model" title=" business model"> business model</a>, <a href="https://publications.waset.org/abstracts/search?q=business%20model%20innovation%20%28BMI%29" title=" business model innovation (BMI)"> business model innovation (BMI)</a> </p> <a href="https://publications.waset.org/abstracts/110461/a-case-study-on-smart-energy-city-of-the-uk-based-on-business-model-innovation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/110461.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">162</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1613</span> Determination of International Jurisdiction of Courts over Disputes Arising from Electronic Consumer Contracts</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aslihan%20Coban">Aslihan Coban</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As a result of the rapid development of information communication technology, especially the internet, consumers have become an active party in commerce and in law. Consequently, the protection of consumers in cross-border contracts has become increasingly important. This paper is confined to the international jurisdiction of courts over disputes arising from electronic consumer contracts according to the ‘5718 Turkish Act on Private International Law and Civil Procedure’ and the ‘1215/2012 Council Regulation On Jurisdiction and The Recognition and Enforcement Of Judgments In Civil and Commercial Matters’ (Hereafter ‘Brussels I Regulation’). The international jurisdiction of courts for consumer contracts is recognized under both acts above-mentioned; however, there exist some differences between the said legal regulations. Firstly, while there is a specific provision for electronic consumer contracts in Brussels I Regulation, there is no specific provision in the Turkish Act. Secondly, under the Turkish Act, habitual residence, domicile, and workplace of the other party who is not a consumer are all accepted as jurisdiction elements; while domicile is the only jurisdiction element in Brussels I Regulation. Thirdly, the ability to make jurisdiction agreements in disputes arising from electronic consumer contracts is a controversial issue under the Turkish Act while it is explicitly regulated under Brussels I Regulation that such jurisdiction agreements can be concluded by complying with certain conditions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Brussels%20I%20Regulation" title="Brussels I Regulation">Brussels I Regulation</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20consumer%20contracts" title=" electronic consumer contracts"> electronic consumer contracts</a>, <a href="https://publications.waset.org/abstracts/search?q=jurisdiction" title=" jurisdiction"> jurisdiction</a>, <a href="https://publications.waset.org/abstracts/search?q=jurisdiction%20agreement" title=" jurisdiction agreement"> jurisdiction agreement</a> </p> <a href="https://publications.waset.org/abstracts/93339/determination-of-international-jurisdiction-of-courts-over-disputes-arising-from-electronic-consumer-contracts" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/93339.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">161</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1612</span> A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Naghmeh%20Moradpoor%20Sheykhkanloo">Naghmeh Moradpoor Sheykhkanloo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Structured Query Language Injection (SQLI) attack is a code injection technique in which malicious SQL statements are inserted into a given SQL database by simply using a web browser. Losing data, disclosing confidential information or even changing the value of data are the severe damages that SQLI attack can cause on a given database. SQLI attack has also been rated as the number-one attack among top ten web application threats on Open Web Application Security Project (OWASP). OWASP is an open community dedicated to enabling organisations to consider, develop, obtain, function, and preserve applications that can be trusted. In this paper, we propose an effective pattern recognition neural network model for detection and classification of SQLI attacks. The proposed model is built from three main elements of: a Uniform Resource Locator (URL) generator in order to generate thousands of malicious and benign URLs, a URL classifier in order to: 1) classify each generated URL to either a benign URL or a malicious URL and 2) classify the malicious URLs into different SQLI attack categories, and an NN model in order to: 1) detect either a given URL is a malicious URL or a benign URL and 2) identify the type of SQLI attack for each malicious URL. The model is first trained and then evaluated by employing thousands of benign and malicious URLs. The results of the experiments are presented in order to demonstrate the effectiveness of the proposed approach. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=neural%20networks" title="neural networks">neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=pattern%20recognition" title=" pattern recognition"> pattern recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=SQL%20injection%20attacks" title=" SQL injection attacks"> SQL injection attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=SQL%20injection%20attack%20classification" title=" SQL injection attack classification"> SQL injection attack classification</a>, <a href="https://publications.waset.org/abstracts/search?q=SQL%20injection%20attack%20detection" title=" SQL injection attack detection "> SQL injection attack detection </a> </p> <a href="https://publications.waset.org/abstracts/22997/a-pattern-recognition-neural-network-model-for-detection-and-classification-of-sql-injection-attacks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22997.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">469</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1611</span> Study on Network-Based Technology for Detecting Potentially Malicious Websites</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Byung-Ik%20Kim">Byung-Ik Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Hong-Koo%20Kang"> Hong-Koo Kang</a>, <a href="https://publications.waset.org/abstracts/search?q=Tae-Jin%20Lee"> Tae-Jin Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Hae-Ryong%20Park"> Hae-Ryong Park</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Advanced%20Persistent%20Threat%20%28APT%29" title="Advanced Persistent Threat (APT)">Advanced Persistent Threat (APT)</a>, <a href="https://publications.waset.org/abstracts/search?q=malware" title=" malware"> malware</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20security" title=" network security"> network security</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20packet" title=" network packet"> network packet</a>, <a href="https://publications.waset.org/abstracts/search?q=exploit%20kits" title=" exploit kits"> exploit kits</a> </p> <a href="https://publications.waset.org/abstracts/2429/study-on-network-based-technology-for-detecting-potentially-malicious-websites" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2429.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">366</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1610</span> A Study of Key Technologies for the Realization of Smart Grid and Its Research Situation in Pakistan and Abroad</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arjmand%20Khaliq">Arjmand Khaliq</a>, <a href="https://publications.waset.org/abstracts/search?q=Pemra%20Sohaib"> Pemra Sohaib</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper smart grid technologies which converts conventional grid into smart grid has been discussed. Integration of advanced technologies including two way communication, advanced control system, sensors, smart metering system and other provide opportunity to make conventional grid a intelligent and automatic system which is named as smart grid. This paper gives the concept of smart grid and functional characteristics of smart grid technology, summed up the research progress in Pakistan and abroad and the significance of developing smart grid. Based on the analysis of the smart grid, smart grid technologies will result a reliable and energy efficient power system in the future. On the other hand smart grid technologies have been reviewed in this paper highlighting the key technologies of smart grid, and points out the problems and challenges in the realization of smart grid. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=energy" title="energy">energy</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20system%20reliability" title=" power system reliability"> power system reliability</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20system%20monitoring%20and%20control" title=" power system monitoring and control"> power system monitoring and control</a>, <a href="https://publications.waset.org/abstracts/search?q=sensor" title=" sensor"> sensor</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20grid" title=" smart grid"> smart grid</a>, <a href="https://publications.waset.org/abstracts/search?q=two-way%20communication" title=" two-way communication "> two-way communication </a> </p> <a href="https://publications.waset.org/abstracts/40935/a-study-of-key-technologies-for-the-realization-of-smart-grid-and-its-research-situation-in-pakistan-and-abroad" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40935.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">396</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1609</span> A Survey on Important Factors of the Ethereum Network Performance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ali%20Mohammad%20Mobaser%20Azad">Ali Mohammad Mobaser Azad</a>, <a href="https://publications.waset.org/abstracts/search?q=Alireza%20Akhlaghinia"> Alireza Akhlaghinia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Blockchain is changing our world and launching a new generation of decentralized networks. Meanwhile, Blockchain-based networks like Ethereum have been created and they will facilitate these processes using tools like smart contracts. The Ethereum has fundamental structures, each of which affects the activity of the nodes. Our purpose in this paper is to review similar research and examine various components to demonstrate the performance of the Ethereum network and to do this, and we used the data published by the Ethereum Foundation in different time spots to examine the number of changes that determine the status of network performance. This will help other researchers understand better Ethereum in different situations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=ethereum" title=" ethereum"> ethereum</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20contract" title=" smart contract"> smart contract</a>, <a href="https://publications.waset.org/abstracts/search?q=decentralization%20consensus%20algorithm" title=" decentralization consensus algorithm"> decentralization consensus algorithm</a> </p> <a href="https://publications.waset.org/abstracts/143378/a-survey-on-important-factors-of-the-ethereum-network-performance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143378.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">226</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1608</span> A Smart Contract Project: Peer-to-Peer Energy Trading with Price Forecasting in Microgrid</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=%C5%9Eakir%20Bing%C3%B6l">Şakir Bingöl</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdullah%20Emre%20Aydemir"> Abdullah Emre Aydemir</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdullah%20Saado"> Abdullah Saado</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmet%20Ak%C4%B1l"> Ahmet Akıl</a>, <a href="https://publications.waset.org/abstracts/search?q=Elif%20Canbaz"> Elif Canbaz</a>, <a href="https://publications.waset.org/abstracts/search?q=Feyza%20Nur%20Bulgurcu"> Feyza Nur Bulgurcu</a>, <a href="https://publications.waset.org/abstracts/search?q=Gizem%20Uzun"> Gizem Uzun</a>, <a href="https://publications.waset.org/abstracts/search?q=G%C3%BCnsu%20Bilge%20Dal"> Günsu Bilge Dal</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammedcan%20Pirin%C3%A7%C3%A7i"> Muhammedcan Pirinççi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Smart contracts, which can be applied in many different areas, from financial applications to the internet of things, come to the fore with their security, low cost, and self-executing features. In this paper, it is focused on peer-to-peer (P2P) energy trading and the implementation of the smart contract on the Ethereum blockchain. It is assumed a microgrid consists of consumers and prosumers that can produce solar and wind energy. The proposed architecture is a system where the prosumer makes the purchase or sale request in the smart contract and the maximum price obtained through the distribution system operator (DSO) by forecasting. It is aimed to forecast the hourly maximum unit price of energy by using deep learning instead of a fixed pricing. In this way, it will make the system more reliable as there will be more dynamic and accurate pricing. For this purpose, Istanbul's energy generation, energy consumption and market clearing price data were used. The consistency of the available data and forecasting results is observed and discussed with graphs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=energy%20trading%20smart%20contract" title="energy trading smart contract">energy trading smart contract</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title=" deep learning"> deep learning</a>, <a href="https://publications.waset.org/abstracts/search?q=microgrid" title=" microgrid"> microgrid</a>, <a href="https://publications.waset.org/abstracts/search?q=forecasting" title=" forecasting"> forecasting</a>, <a href="https://publications.waset.org/abstracts/search?q=Ethereum" title=" Ethereum"> Ethereum</a>, <a href="https://publications.waset.org/abstracts/search?q=peer%20to%20peer" title=" peer to peer"> peer to peer</a> </p> <a href="https://publications.waset.org/abstracts/152401/a-smart-contract-project-peer-to-peer-energy-trading-with-price-forecasting-in-microgrid" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152401.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">138</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=malicious%20smart%20contracts&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=malicious%20smart%20contracts&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=malicious%20smart%20contracts&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=malicious%20smart%20contracts&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=malicious%20smart%20contracts&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=malicious%20smart%20contracts&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=malicious%20smart%20contracts&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=malicious%20smart%20contracts&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=malicious%20smart%20contracts&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=malicious%20smart%20contracts&page=54">54</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=malicious%20smart%20contracts&page=55">55</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=malicious%20smart%20contracts&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>