Denial of Chain: Evaluation and prediction of a novel cyberattack in Blockchain-supported systems
暂无分享,去创建一个
[1] Tyler Moore,et al. Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem , 2014, Financial Cryptography Workshops.
[2] Garry A. Gabison. Policy Considerations for the Blockchain Technology Public and Private Applications , 2016 .
[3] Borja Bordel,et al. Process execution in Cyber-Physical Systems using cloud and Cyber-Physical Internet services , 2018, The Journal of Supercomputing.
[4] Hyoung Joong Kim,et al. Electronic Voting Service Using Block-Chain , 2016, J. Digit. Forensics Secur. Law.
[5] Sergei Tikhomirov,et al. Ethereum: State of Knowledge and Research Perspectives , 2017, FPS.
[6] David Lee Kuo Chuen. Handbook of Digital Currency: Bitcoin, Innovation, Financial Instruments, and Big Data , 2015 .
[7] Kim-Kwang Raymond Choo,et al. A blockchain future for internet of things security: a position paper , 2017, Digit. Commun. Networks.
[8] A. Lazarenko,et al. Financial Risks of the Blockchain Industry: A Survey of Cyberattacks , 2018, Proceedings of the Future Technologies Conference (FTC) 2018.
[9] Angela Walch,et al. The Bitcoin Blockchain as Financial Market Infrastructure: A Consideration of Operational Risk , 2015 .
[10] Ilsun You,et al. Securing Internet-of-Things Systems Through Implicit and Explicit Reputation Models , 2018, IEEE Access.
[11] Davor Svetinovic,et al. Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams , 2018, IEEE Transactions on Dependable and Secure Computing.
[12] Jong Hyuk Park,et al. Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions , 2017, Symmetry.
[13] Borja Bordel,et al. Protecting Industry 4.0 Systems Against the Malicious Effects of Cyber-Physical Attacks , 2017, UCAmI.
[14] Norman Meuschke,et al. Decentralized Trusted Timestamping using the Crypto Currency Bitcoin , 2015, ArXiv.
[15] Martijn Bastiaan,et al. Preventing the 51%-Attack: a Stochastic Analysis of Two Phase Proof of Work in Bitcoin , 2015 .
[16] T. Robles,et al. Digital Food Product Traceability: Using Blockchain in the International Commerce , 2018, Advances in Intelligent Systems and Computing.
[17] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[18] Mauro Conti,et al. A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.
[19] Ghassan O. Karame,et al. Is Bitcoin a Decentralized Currency? , 2014, IEEE Security & Privacy.
[20] Ghassan O. Karame,et al. Bitcoin and Blockchain Security , 2016 .
[21] Guoqiang Hu,et al. Distributed consensus tracking for multi‐agent systems under two types of attacks , 2016 .
[22] Nicolas Courtois,et al. On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency , 2014, ArXiv.
[23] Nir Kshetri,et al. Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.
[24] Gareth Owen,et al. Rep on the block: A next generation reputation system based on the blockchain , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[25] Christof Weinhardt,et al. A blockchain-based smart grid: towards sustainable local energy markets , 2017, Computer Science - Research and Development.
[26] Emin Gün Sirer,et al. Majority is not enough , 2013, Financial Cryptography.
[27] Borja Bordel,et al. A Blockchain-Based Authorization System for Trustworthy Resource Monitoring and Trading in Smart Communities , 2018, Sensors.
[28] Victoria L. Lemieux,et al. Trusting records: is Blockchain technology the answer? , 2016 .
[29] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[30] Christian Decker,et al. BlueWallet: The Secure Bitcoin Wallet , 2014, STM.
[31] Dan Boneh,et al. Using Level-1 Homomorphic Encryption to Improve Threshold DSA Signatures for Bitcoin Wallet Security , 2017, LATINCRYPT.
[32] E. Hultink,et al. The Circular Economy - A New Sustainability Paradigm? , 2017 .
[33] Bimal Kumar Mishra,et al. Mathematical model on the transmission of worms in wireless sensor network , 2013 .
[34] Corina Sas,et al. Design for Trust: An Exploration of the Challenges and Opportunities of Bitcoin Users , 2017, CHI.
[35] Bruno Sericola,et al. Safety analysis of Bitcoin improvement proposals , 2016, 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA).
[36] Manuel Díaz,et al. On blockchain and its integration with IoT. Challenges and opportunities , 2018, Future Gener. Comput. Syst..
[37] Giacomo Colle,et al. A Blockchain Implementation Prototype for the Electronic Open Source Traceability of Wood along the Whole Supply Chain , 2018, Sensors.
[38] Praveen Gauravaram,et al. Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[39] Michael Naehrig,et al. Elliptic Curve Cryptography in Practice , 2014, Financial Cryptography.
[40] Jagdeep Sidhu,et al. Syscoin: A Peer-to-Peer Electronic Cash System with Blockchain-Based Services for E-Business , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).
[41] Jeremy Clark,et al. Mixcoin: Anonymity for Bitcoin with Accountable Mixes , 2014, Financial Cryptography.
[42] Sarah Underwood,et al. Blockchain beyond bitcoin , 2016, Commun. ACM.
[43] Borja Bordel,et al. Cyber-physical systems: Extending pervasive sensing from control theory to the Internet of Things , 2017, Pervasive Mob. Comput..