{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T02:52:04Z","timestamp":1767149524312,"version":"3.48.0"},"reference-count":51,"publisher":"Informa UK Limited","issue":"1","license":[{"start":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T00:00:00Z","timestamp":1699228800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Italian Ministry of University and Research"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Parallel, Emergent and Distributed Systems"],"published-print":{"date-parts":[[2026,1,2]]},"DOI":"10.1080\/17445760.2023.2272280","type":"journal-article","created":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T23:23:00Z","timestamp":1699312980000},"page":"151-166","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":4,"title":["Enhancing blockchain security through natural language processing and real-time monitoring"],"prefix":"10.1080","volume":"41","author":[{"given":"Francesco","family":"Salzano","sequence":"first","affiliation":[{"name":"University of Molise","place":["Campobasso, Italy"]},{"name":"University of Cagliari","place":["Cagliari, Italy"]}]},{"given":"Remo","family":"Pareschi","sequence":"additional","affiliation":[{"name":"University of Molise","place":["Campobasso, Italy"]},{"name":"BB-Smile Srl","place":["Rome, Italy"]}]}],"member":"301","published-online":{"date-parts":[[2023,11,6]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00242"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.3389\/fbloc.2020.00006"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.3389\/fbloc.2020.483227"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETSEB52558.2021.00011"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/09537287.2019.1631460"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700879"},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2022.100088"},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00287-019-01178-x"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.3389\/fbloc.2020.535787"},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2020.100002"},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2022.1020946"},{"key":"e_1_3_3_13_1","article-title":"The balance of secure development and secure operations in the software security equation","author":"Barnum S.","year":"2010","unstructured":"Barnum S. The balance of secure development and secure operations in the software security equation. J Def Softw Eng. 2010.","journal-title":"J Def Softw Eng"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0871-4_24"},{"key":"e_1_3_3_15_1","doi-asserted-by":"crossref","unstructured":"Lau F Rubin SH Smith MH et\u00a0al. Distributed denial of service attacks. In: SMC 2000 Conference Proceedings. 2000 IEEE International Conference on Systems Man and Cybernetics.'Cybernetics Evolving to Systems Humans Organizations and Their Complex Interactions' (Cat. No. 0; Vol. 3; IEEE; 2000. p. 2275\u20132280.","DOI":"10.1109\/ICSMC.2000.886455"},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICENCO.2018.8636115"},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.v33.4"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.102"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.02.080"},{"key":"e_1_3_3_21_1","volume-title":"Attacks on peer-to-peer networks","author":"Pretre B.","year":"2005","unstructured":"Pretre B. Attacks on peer-to-peer networks. Zurich\/Switzerland: Dept of Computer Science Swiss Federal Institute of Technology (ETH) Zurich Autumn; 2005."},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.08.001"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.04.008"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.05.034"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301614"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2015.36"},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133613"},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.544"},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080192.1080202"},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85230-8_1"},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2017.8123011"},{"key":"e_1_3_3_33_1","first-page":"21260","article-title":"Bitcoin: a peer-to-peer electronic cash system","author":"Nakamoto S.","year":"2008","unstructured":"Nakamoto S. Bitcoin: a peer-to-peer electronic cash system. Decent Bus Rev. 2008:21260.","journal-title":"Decent Bus Rev"},{"key":"e_1_3_3_34_1","unstructured":"Siim J. Proof-of-stake. In: Research seminar in cryptography; 2017."},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.3390\/e24081013"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2022.102674"},{"issue":"6","key":"e_1_3_3_37_1","first-page":"36","article-title":"Sybil attacks and defenses in internet of things and mobile social networks","volume":"15","author":"Alharbi A","year":"2018","unstructured":"Alharbi A, Zohdy M, Debnath D, et\u00a0al. Sybil attacks and defenses in internet of things and mobile social networks. Int J Comput Sci Issues (IJCSI). 2018;15(6):36\u201341.","journal-title":"Int J Comput Sci Issues (IJCSI)"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3119291"},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9091788"},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382292"},{"key":"e_1_3_3_41_1","unstructured":"Paulsen C. Revisiting smart contract vulnerabilities in hyperledger fabric. repositorytudelf. 2021."},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain50366.2020.00046"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES48979.2020.00049"},{"key":"e_1_3_3_44_1","first-page":"0073","article-title":"Delta-distributed elastic log text analyser","volume":"1613","author":"Di Pilla P","year":"2022","unstructured":"Di Pilla P, Pareschi R, Salzano F, et\u00a0al. Delta-distributed elastic log text analyser. Proc http:\/\/ceur-ws org ISSN. 2022;1613:0073.","journal-title":"Proc http:\/\/ceur-ws org ISSN"},{"key":"e_1_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9712-1_31"},{"key":"e_1_3_3_46_1","unstructured":"Wolf T Debut L Sanh V et\u00a0al. Huggingface's transformers: State-of-the-art natural language processing. arXiv preprint arXiv:191003771. 2019."},{"key":"e_1_3_3_47_1","series-title":"The Oxford handbook of computational linguistics","first-page":"219","volume-title":"Part-of-speech tagging","author":"Voutilainen A.","year":"2003","unstructured":"Voutilainen A. Part-of-speech tagging. 2003. (The Oxford handbook of computational linguistics). p. 219\u2013232."},{"key":"e_1_3_3_48_1","unstructured":"Pushp PK Srivastava MM. Train once test anywhere: zero-shot learning for text classification. arXiv preprint arXiv:171205972. 2017."},{"key":"e_1_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1404"},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2017.117"},{"key":"e_1_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC53001.2021.9631249"},{"key":"e_1_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWBOSE.2019.8666486"}],"container-title":["International Journal of Parallel, Emergent and Distributed Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/17445760.2023.2272280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T02:41:24Z","timestamp":1767148884000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/17445760.2023.2272280"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,6]]},"references-count":51,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1,2]]}},"alternative-id":["10.1080\/17445760.2023.2272280"],"URL":"https:\/\/doi.org\/10.1080\/17445760.2023.2272280","relation":{},"ISSN":["1744-5760","1744-5779"],"issn-type":[{"type":"print","value":"1744-5760"},{"type":"electronic","value":"1744-5779"}],"subject":[],"published":{"date-parts":[[2023,11,6]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=gpaa20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=gpaa20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-10-13","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}