{"id":"https://openalex.org/W2965921928","doi":"https://doi.org/10.1109/acitt.2019.8779855","title":"Blockchain\u2019s Future Role in Cybersecurity. Analysis of Defensive and Offensive Potential Leveraging Blockchain-Based Platforms","display_name":"Blockchain\u2019s Future Role in Cybersecurity. Analysis of Defensive and Offensive Potential Leveraging Blockchain-Based Platforms","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https://openalex.org/W2965921928","doi":"https://doi.org/10.1109/acitt.2019.8779855","mag":"2965921928"},"language":"en","primary_location":{"id":"doi:10.1109/acitt.2019.8779855","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acitt.2019.8779855","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 9th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059029128","display_name":"Artur Rot","orcid":"https://orcid.org/0000-0002-7281-8253"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Artur Rot","raw_affiliation_strings":["Dept.of Information Systems, Wrocaw University of Economics, Wrocaw, Poland"],"affiliations":[{"raw_affiliation_string":"Dept.of Information Systems, Wrocaw University of Economics, Wrocaw, Poland","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036206575","display_name":"Bartosz Blaicke","orcid":"https://orcid.org/0000-0002-5083-0059"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bartosz Blaicke","raw_affiliation_strings":["Dept.of Information Systems, Wrocaw University of Economics, Wrocaw, Poland"],"affiliations":[{"raw_affiliation_string":"Dept.of Information Systems, Wrocaw University of Economics, Wrocaw, Poland","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5059029128"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.3914,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.93527353,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"447","last_page":"451"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.954200029373169,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9352999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9282510876655579},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.8584630489349365},{"id":"https://openalex.org/keywords/offensive","display_name":"Offensive","score":0.7427538633346558},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5459999442100525},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.49962687492370605},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4865109324455261},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.43737733364105225},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.38604238629341125},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3697303533554077},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15810298919677734},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.10879671573638916}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9282510876655579},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.8584630489349365},{"id":"https://openalex.org/C176856949","wikidata":"https://www.wikidata.org/wiki/Q2001676","display_name":"Offensive","level":2,"score":0.7427538633346558},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5459999442100525},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.49962687492370605},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4865109324455261},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.43737733364105225},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.38604238629341125},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3697303533554077},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15810298919677734},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.10879671573638916},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acitt.2019.8779855","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acitt.2019.8779855","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 9th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2517744317","https://openalex.org/W2533941064","https://openalex.org/W2536325433","https://openalex.org/W2539190473","https://openalex.org/W2746911092","https://openalex.org/W2751130135","https://openalex.org/W2796762053","https://openalex.org/W2884779908","https://openalex.org/W2963264685","https://openalex.org/W2963604227","https://openalex.org/W2989237946","https://openalex.org/W4211068006","https://openalex.org/W4248175462","https://openalex.org/W6743187627","https://openalex.org/W6753488797"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3048554917","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4386732777","https://openalex.org/W4304136894","https://openalex.org/W2517088709"],"abstract_inverted_index":{"Blockchain":[0],"and":[1,13,30,42,91,108,140],"cybersecurity":[2,35],"are":[3,101],"two":[4],"current":[5],"themes":[6],"in":[7,53],"Information":[8],"Technology":[9],"that":[10],"have":[11],"evolved":[12],"gained":[14],"tremendous":[15],"attention":[16],"over":[17],"the":[18,38,47,51,96,142],"past":[19],"few":[20],"years.":[21],"In":[22],"this":[23],"paper":[24],"authors":[25],"aim":[26],"to":[27,44,122],"structure":[28],"existing":[29],"potential":[31,144],"use":[32,77],"of":[33,40,55,57,105,128],"blockchain-based":[34,99,129],"solutions":[36,130],"from":[37,136],"perspective":[39],"attackers":[41],"defenders":[43],"assess":[45],"whether":[46],"intersection":[48],"will":[49],"tip":[50],"scales":[52],"favor":[54],"one":[56],"these":[58],"groups.":[59],"Historically":[60],"blockchain":[61],"has":[62,74],"been":[63],"mainly":[64],"associated":[65],"with":[66],"innovative":[67],"financial":[68],"services":[69],"(including":[70],"crypto-currencies)":[71],"but":[72],"it":[73],"other":[75,97],"emerging":[76],"cases":[78],"within":[79],"e-government,":[80],"supply":[81],"chain":[82],"management":[83],"as":[84,86,112],"well":[85],"security":[87,138],"(e.g.":[88],"encryption,":[89],"identity":[90],"authentication,":[92],"data":[93],"security).":[94],"On":[95],"hand,":[98],"platforms":[100],"increasingly":[102],"a":[103,120,137],"target":[104],"malicious":[106],"actors":[107],"could":[109,147],"be":[110,123,132,148],"used":[111],"an":[113],"initial":[114],"attack":[115],"vector.":[116],"Therefore,":[117],"there":[118],"is":[119],"case":[121],"made":[124],"weather":[125],"further":[126],"adoption":[127],"should":[131],"encouraged":[133],"or":[134],"not":[135],"standpoint":[139],"if":[141],"overall":[143],"for":[145],"change":[146],"net":[149],"positive.":[150]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
