{"id":"https://openalex.org/W4360585529","doi":"https://doi.org/10.1109/ic3i56241.2022.10072588","title":"Enhancing Cybersecurity Policies with Blockchain Technology: A Survey","display_name":"Enhancing Cybersecurity Policies with Blockchain Technology: A Survey","publication_year":2022,"publication_date":"2022-12-14","ids":{"openalex":"https://openalex.org/W4360585529","doi":"https://doi.org/10.1109/ic3i56241.2022.10072588"},"language":"en","primary_location":{"id":"doi:10.1109/ic3i56241.2022.10072588","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3i56241.2022.10072588","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100710518","display_name":"Atul Kumar","orcid":"https://orcid.org/0000-0003-2548-1173"},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Atul Kumar","raw_affiliation_strings":["Chitkara University Institute of Engineering and Technology, Chitkara University,Punjab,India","Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Chitkara University Institute of Engineering and Technology, Chitkara University,Punjab,India","institution_ids":["https://openalex.org/I74319210"]},{"raw_affiliation_string":"Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India","institution_ids":["https://openalex.org/I74319210"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035830349","display_name":"Ishu Sharma","orcid":"https://orcid.org/0000-0003-1669-3393"},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ishu Sharma","raw_affiliation_strings":["Chitkara University Institute of Engineering and Technology, Chitkara University,Punjab,India","Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Chitkara University Institute of Engineering and Technology, Chitkara University,Punjab,India","institution_ids":["https://openalex.org/I74319210"]},{"raw_affiliation_string":"Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India","institution_ids":["https://openalex.org/I74319210"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100710518"],"corresponding_institution_ids":["https://openalex.org/I74319210"],"apc_list":null,"apc_paid":null,"fwci":14.6294,"has_fulltext":false,"cited_by_count":46,"citation_normalized_percentile":{"value":0.98996096,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1050","last_page":"1054"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.970300018787384,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9646999835968018,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9239459037780762},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7344561219215393},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6644765138626099},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.6577829718589783},{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.5816356539726257},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.5650205612182617},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5562587976455688},{"id":"https://openalex.org/keywords/information-technology","display_name":"Information technology","score":0.4431687593460083},{"id":"https://openalex.org/keywords/emerging-technologies","display_name":"Emerging technologies","score":0.4301503896713257},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.36888980865478516},{"id":"https://openalex.org/keywords/engineering-management","display_name":"Engineering management","score":0.32188597321510315},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17919600009918213},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.11774048209190369}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9239459037780762},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7344561219215393},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6644765138626099},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.6577829718589783},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.5816356539726257},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.5650205612182617},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5562587976455688},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.4431687593460083},{"id":"https://openalex.org/C207267971","wikidata":"https://www.wikidata.org/wiki/Q120208","display_name":"Emerging technologies","level":2,"score":0.4301503896713257},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.36888980865478516},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.32188597321510315},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17919600009918213},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.11774048209190369},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3i56241.2022.10072588","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3i56241.2022.10072588","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W2804594461","https://openalex.org/W2907251489","https://openalex.org/W2939131990","https://openalex.org/W2973601119","https://openalex.org/W2977697741","https://openalex.org/W3002341897","https://openalex.org/W3005687645","https://openalex.org/W3011602808","https://openalex.org/W3036394689","https://openalex.org/W3037314179","https://openalex.org/W3087446158","https://openalex.org/W3092625934","https://openalex.org/W3111738396","https://openalex.org/W3155049485","https://openalex.org/W3177808496","https://openalex.org/W3195558906","https://openalex.org/W3198863209","https://openalex.org/W4206005545","https://openalex.org/W4226152041"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W4386732777","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4304136894","https://openalex.org/W4303984095","https://openalex.org/W3137908135"],"abstract_inverted_index":{"Cybersecurity":[0],"is":[1,16,58,64,76,120,141],"a":[2],"major":[3],"challenge":[4],"in":[5,48,108,114,134],"today\u2019s":[6],"era":[7],"despite":[8],"being":[9],"equipped":[10],"with":[11,117],"multiple":[12],"technologies,":[13],"the":[14,36,53,73,105,109,124,131,142,163,166],"world":[15],"lacking":[17],"behind":[18],"due":[19],"to":[20,41,60,145,152],"security":[21,164],"issues.":[22],"The":[23],"domains":[24,154],"like":[25],"industries,":[26],"manufacturing":[27],"plants,":[28],"healthcare":[29],"organizations,":[30],"educational":[31],"institutes,":[32],"etc":[33],"are":[34,127],"at":[35],"edge":[37],"of":[38,111,165],"shifting":[39],"entirely":[40],"digitalization.":[42],"This":[43],"gives":[44],"us":[45],"immense":[46],"improvement":[47],"existing":[49],"processes":[50],"but":[51],"on":[52],"other":[54,83,95],"hand,":[55],"digitalized":[56],"information":[57],"prone":[59],"hackers.":[61],"Blockchain":[62,139],"Technology":[63,140],"widely":[65],"used":[66],"for":[67,81,161],"creating":[68],"cryptocurrency":[69],"as":[70,72],"well":[71],"research":[74,103,132,137],"community":[75],"also":[77,123],"utilizing":[78],"this":[79,102],"concept":[80],"numerous":[82],"applications.":[84],"Supply":[85],"chain,":[86],"industry":[87],"4.0,":[88],"defense":[89],"services,":[90],"agriculture":[91],"industry,":[92],"and":[93,122,149,155],"many":[94],"fields":[96,116],"exploit":[97],"blockchain":[98,118],"technology\u2019s":[99],"benefits.":[100],"In":[101],"paper,":[104],"recent":[106],"work":[107],"direction":[110],"boosting":[112],"cybersecurity":[113],"different":[115],"technology":[119],"discussed,":[121],"future":[125],"directions":[126],"outlined":[128],"by":[129],"depicting":[130],"gap":[133],"that":[135],"specific":[136],"area.":[138],"master":[143],"coin":[144],"provide":[146],"reliable,":[147],"transparent,":[148],"authorized":[150],"access":[151],"information-sharing":[153],"it":[156],"can":[157],"be":[158],"explored":[159],"further":[160],"expanding":[162],"system.":[167]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":26},{"year":2023,"cited_by_count":17}],"updated_date":"2026-03-28T06:11:35.319607","created_date":"2025-10-10T00:00:00"}
