1,184 research outputs found
Bitcoin Double-Spending Attack Detection using Graph Neural Network
Bitcoin transactions include unspent transaction outputs (UTXOs) as their
inputs and generate one or more newly owned UTXOs at specified addresses. Each
UTXO can only be used as an input in a transaction once, and using it in two or
more different transactions is referred to as a double-spending attack.
Ultimately, due to the characteristics of the Bitcoin protocol, double-spending
is impossible. However, problems may arise when a transaction is considered
final even though its finality has not been fully guaranteed in order to
achieve fast payment. In this paper, we propose an approach to detecting
Bitcoin double-spending attacks using a graph neural network (GNN). This model
predicts whether all nodes in the network contain a given payment transaction
in their own memory pool (mempool) using information only obtained from some
observer nodes in the network. Our experiment shows that the proposed model can
detect double-spending with an accuracy of at least 0.95 when more than about
1% of the entire nodes in the network are observer nodes.Comment: 3 pages, 1 table, Accepted as poster at IEEE ICBC 202
Effect of Information Disclosure Policy on Control of Infectious Disease:MERS-CoV Outbreak in South Korea
This study examined the effect of disclosing a list of hospitals with Middle East respiratory syndrome coronavirus (MERS-CoV) patients on the number of laboratory-confirmed MERS-CoV cases in South Korea. MERS-CoV data from 20 May 2015 to 5 July 2015 were from the Korean Ministry of Health & Welfare website and analyzed using segmented linear autoregressive error models for interrupted time series. This study showed that the number of laboratory-confirmed cases was increased by 14.629 on June 5 (p < 0.001). However, this number was significantly decreased following disclosure of a list of hospitals with MERS-CoV cases (Estimate = â0.948; p < 0.001). Disclosing the list of hospitals exposed to MERS-CoV was critical to the prevention of further infection. It reduced the number of confirmed MERS-CoV cases. Thus, providing accurate and timely information is a key to critical care response
Leader's Role in Fostering Creativity: The Creativity Creation Model at KT AIT
To achieve innovation, constraints that block the effect of a company's creative culture on innovation and creativity in the organization have to be removed. We propose the creativity creation model that takes account of these constraints and suggest that, to cultivate an innovative climateleaders should receive feedback from innovation performance. To improve creativity and achieve successful innovation, leaders should be involved in every procedure of the model. We explore the three main procedures of the model and present a practical application to the case of a Korean telecommunications company's research and development institute, KT AIT. [ABSTRACT FROM AUTHOR] Copyright of Seoul Journal of Business is the property of Seoul National University, College of Business Administration and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)This research was supported by the Institute of Management Research at Seoul National University
Beware of layer dependency: when the type of your device impacts your web traffic
Mobile devices are everywhere nowadays but little is known about the way they differ from traditional non-mobile devices in terms of usage and the characteristics of the web traffic they generate. In this paper, we propose a first study of the differences that exist between mobile and non-mobile Web traffic seen from the lorgnette of a university campus network. The study is performed at different levels starting from users' behavior to transport protocol configurations. Our main findings are that mobile users often browse websites tailored to their devices. They show a significant adoption of Apps to browse the web and a preference for multimedia content. The different way of conceiving the web for mobiles is reflected at the HTTP and TCP levels with much less HTTP redirections and abrupt TCP connection terminations. Interestingly, mobile traffic carries larger contents and have larger TCP flows than non-mobile traffic. By cross-analysis of protocols and users' behavior, we explain why TCP flows in mobile traffic are larger than those of nonmobiles
N-(3,4-DifluoroÂphenÂyl)-2-(3,4-dimethoxyÂphenÂyl)acetamide
In the title amide, C16H15F2NO3, the dihedral angle between the benzene rings is 53.7â
(1)°. MolÂecules are linked in the crystal structure by an interÂmolecular NâHâŻO hydrogen bond involving NâH and C=O functionalities of the amide group. A one-dimensional network is thus formed along the [001] direction. No significant interÂchain contacts are observed
- âŠ