1,184 research outputs found

    Bitcoin Double-Spending Attack Detection using Graph Neural Network

    Full text link
    Bitcoin transactions include unspent transaction outputs (UTXOs) as their inputs and generate one or more newly owned UTXOs at specified addresses. Each UTXO can only be used as an input in a transaction once, and using it in two or more different transactions is referred to as a double-spending attack. Ultimately, due to the characteristics of the Bitcoin protocol, double-spending is impossible. However, problems may arise when a transaction is considered final even though its finality has not been fully guaranteed in order to achieve fast payment. In this paper, we propose an approach to detecting Bitcoin double-spending attacks using a graph neural network (GNN). This model predicts whether all nodes in the network contain a given payment transaction in their own memory pool (mempool) using information only obtained from some observer nodes in the network. Our experiment shows that the proposed model can detect double-spending with an accuracy of at least 0.95 when more than about 1% of the entire nodes in the network are observer nodes.Comment: 3 pages, 1 table, Accepted as poster at IEEE ICBC 202

    Effect of Information Disclosure Policy on Control of Infectious Disease:MERS-CoV Outbreak in South Korea

    Get PDF
    This study examined the effect of disclosing a list of hospitals with Middle East respiratory syndrome coronavirus (MERS-CoV) patients on the number of laboratory-confirmed MERS-CoV cases in South Korea. MERS-CoV data from 20 May 2015 to 5 July 2015 were from the Korean Ministry of Health & Welfare website and analyzed using segmented linear autoregressive error models for interrupted time series. This study showed that the number of laboratory-confirmed cases was increased by 14.629 on June 5 (p < 0.001). However, this number was significantly decreased following disclosure of a list of hospitals with MERS-CoV cases (Estimate = −0.948; p < 0.001). Disclosing the list of hospitals exposed to MERS-CoV was critical to the prevention of further infection. It reduced the number of confirmed MERS-CoV cases. Thus, providing accurate and timely information is a key to critical care response

    Leader's Role in Fostering Creativity: The Creativity Creation Model at KT AIT

    Get PDF
    To achieve innovation, constraints that block the effect of a company's creative culture on innovation and creativity in the organization have to be removed. We propose the creativity creation model that takes account of these constraints and suggest that, to cultivate an innovative climateleaders should receive feedback from innovation performance. To improve creativity and achieve successful innovation, leaders should be involved in every procedure of the model. We explore the three main procedures of the model and present a practical application to the case of a Korean telecommunications company's research and development institute, KT AIT. [ABSTRACT FROM AUTHOR] Copyright of Seoul Journal of Business is the property of Seoul National University, College of Business Administration and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)This research was supported by the Institute of Management Research at Seoul National University

    Beware of layer dependency: when the type of your device impacts your web traffic

    Get PDF
    Mobile devices are everywhere nowadays but little is known about the way they differ from traditional non-mobile devices in terms of usage and the characteristics of the web traffic they generate. In this paper, we propose a first study of the differences that exist between mobile and non-mobile Web traffic seen from the lorgnette of a university campus network. The study is performed at different levels starting from users' behavior to transport protocol configurations. Our main findings are that mobile users often browse websites tailored to their devices. They show a significant adoption of Apps to browse the web and a preference for multimedia content. The different way of conceiving the web for mobiles is reflected at the HTTP and TCP levels with much less HTTP redirections and abrupt TCP connection terminations. Interestingly, mobile traffic carries larger contents and have larger TCP flows than non-mobile traffic. By cross-analysis of protocols and users' behavior, we explain why TCP flows in mobile traffic are larger than those of nonmobiles

    N-(3,4-Difluoro­phen­yl)-2-(3,4-dimethoxy­phen­yl)acetamide

    Get PDF
    In the title amide, C16H15F2NO3, the dihedral angle between the benzene rings is 53.7 (1)°. Mol­ecules are linked in the crystal structure by an inter­molecular N—H⋯O hydrogen bond involving N—H and C=O functionalities of the amide group. A one-dimensional network is thus formed along the [001] direction. No significant inter­chain contacts are observed
    • 

    corecore