최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.33 no.3, 2023년, pp.471 - 485
김주은 (서울과학기술대학교) , 서승희 (서울과학기술대학교) , 석병진 (서울과학기술대학교 전기정보기술연구소) , 변현수 (서울과학기술대학교) , 이창훈 (서울과학기술대학교)
Recently, due to the nature of blockchain that guarantees users' anonymity, more and more cases are being exploited for crimes such as illegal transactions. However, cryptocurrency is protected in cryptocurrency wallets, making it difficult to recover criminal funds. Therefore, this study acquires a...
Understanding the blockchain investigation method of preventing money laundering using cryptocurrency., "money laundering", IT Word, 2022.03.07, 1
"Room N 'Devil's Deal'...Cryptocurrency grows and cryptocurrency catch", "cryptocurrency crime", News1, 2020.03.27, 1
T. Thomas, M. Piscitelli, I. Shavrovand I. Baggili, "Memory FORESHADO W: Memory FOREnSics of HArDware?CryptOcurrency wallets - A Tool and?Visualization Framework," Forensic Science International: Digital Investigation, vol. 33, pp.301002-301012, Jul. 2020.
Min-taek Lim, Jeong-yoon Kang, Junsung Park, Moon-gyu Lee and Hyeon-deok Jeoung, "A Study on the Extraction of Cryptocurrency Transaction Information Based on Memory Analysis,"?Journal of Digital Forensics, 16(1), pp.99-117, Mar. 2022.
S. Zollner, K.K.R. Choo and N.A. LeKhac, "An Automated Live Forensic and Postmortem Analysis Tool for Bitcoin on Windows Systems," IEEE Access, vol. 7, pp. 158250-158263, Oct. 2019.
Hyun-jae Park, So-jeong Kim and Jung-heum Kim, "A study on techniques to assist cryptocurrency-related investigationsthrough collecting and analyzing OS and application artifacts on," Journal of Digital Forensics, 16(4), pp.?138-150, Dec. 2022.
Ji-hun Son and Jung-heum Park, "Forensic analysis of MetaMask cryptocurrency wallet artifacts," Journal of Digital Forensics, 16(4), pp.151-165, Dec.?2022.
Hyeon Kwon, Kyung-ju Lee, Ha-young?Kim, Yeong-woong Kim and Gi-bum Kim. "Seizure of Ransomwar e Group's?Virtual Assets Using Network Investigative Technique," Journal of Digital?Forensics, 16(3), pp.130-142, Sep. 2022.
Hyeon Kwon. "Acquisition Method of?Virtual Asset Restoration Information?in Memory," Master's thesis, Sungkyunkwan University, Feb. 2023.
Chrome Web Store, "Metamask", valibale on : https://chrome.google.com/webstore/detail/metamask/nkbihfbeogaeaoehlefnkodbefgpgknn?hlko, accessed 2023.05.08.
Chrome Web Store, "Binance chrome extension", https://chrome.google.com/webstore/detail/binance-wallet/fhbohimaelbohpjbbldcngcnapndodjp?hlko, accessed 2023.05.08.
Chrome Web Store, "Phantom chrome extension", https://chrome.google.com/webstore/detail/phantom/bfnaelmomeimhlpmgjnjophhpkkoljpa?hlko, accessed 2023.05.08
Chrome Web Store, "Kaikas chrome extension", https://chrome.google.com/webstore/detail/kaikas/jblndlipeogpafnldhgmapagcccfchpi?hlko, accessed 2023.05.08.
GOERLI FAUCET, "goerlifaucet", https://goerlifaucet.com/, accessed 2023.03.10.
Binance Smart Chian Test(BNBT) "Binance testnet", https://testnet.binance.org/faucet-smart/, accessed 2023.05.08.
Solana Devnet, "solana testnet", https://solfaucet.com/, accessed 2023.05.08.
KLAY Faucet, "klaytn testnet", https://baobab.wallet.klaytn.foundation/faucet/, accessed 2023.05.08.
MetaSwap, "metaswap", https://support.metamask.io/hc/en-us/articles/4405093054363-User-Guide-Swaps, accessed 2023.05.08.
Etherscan, "etherscan api", https://docs.etherscan.io/api-endpoints/accounts, accessed 2023.03.10.
cryptocompare, "cryptocompare", https://min-api.cryptocompare.com/documentation?keyPrice&catSingleSymbolPriceEndpoint, accessed 2023.05.08.
INFURA, "infura api", hhttps://docs.infura.io/infura/networks/ethereum/how-to/make-requests, accessed 2023.05.08.
Binance, "'binance", https://docs.bnbchain.org/docs/overview, accessed 2023.03.10.
Moonpay, "moonpay", https://www.moonpay.com/ko/about-us, accessed 2023.03.10.
CoinGecko, "coingecko", https://www.coingecko.com/en/api/documentation, accessed 2023.05.08.
BNB Chain, "bnb chain", https://forum.bnbchain.org/, accessed 2023.05.08.
Phantom, "phantom", https://help.phantom.app/hc/en-us/articles/13515761228051-Security-Tips-for-Phantom-users, accessed 2023.03.10.
Kaiks, "kaias", https://docs.kaikas.io/02_api_reference/01_klaytn_provider, accessed 2023,05.08
Github, "bitcoin bip", https://github.com/bitcoin/bips, accessed 2023.03.10.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.