Hybrid Security Framework for Blockchain Platforms
暂无分享,去创建一个
Thomas Yeboah | S. Selva Brunda | Mahendra Kumar Shrivas | T. Yeboah | M. Shrivas | S. Brunda | S. Selva Brunda
[1] Ali Selamat,et al. Systematic literature review and taxonomy for DDoS attack detection and prediction , 2019, International Journal of Digital Enterprise Technology.
[2] Yusuf Perwej. A Pervasive Review of Blockchain Technology and Its Potential Applications , 2018 .
[3] Adam Back,et al. Hashcash - A Denial of Service Counter-Measure , 2002 .
[4] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[5] Andrea Bondavalli,et al. Risk Assessment of Blockchain Technology , 2018, 2018 Eighth Latin-American Symposium on Dependable Computing (LADC).
[6] Jamal Hayat Mosakheil. Security Threats Classification in Blockchains , 2018 .
[7] Fran Casino,et al. A systematic literature review of blockchain-based applications: Current status, classification and open issues , 2019, Telematics Informatics.
[8] M. Sethumadhavan,et al. Survey of consensus protocols on blockchain applications , 2017, 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS).
[9] Mahendra Kumar Shrivas,et al. The Disruptive Blockchain: Types, Platforms and Applications , 2019, TEXILA INTERNATIONAL JOURNAL OF ACADEMIC RESEARCH.
[10] Peng Jiang,et al. A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..
[11] Fahad Saleh,et al. Blockchain Without Waste: Proof-of-Stake , 2020, The Review of Financial Studies.
[12] Zachary A. Collier,et al. Cybersecurity Standards: Managing Risk and Creating Resilience , 2014, Computer.
[13] M. Shrivas,et al. The Disruptive Blockchain Security Threats and Threat Categorization , 2020, 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T).
[14] M. Shrivas. A Crictal Review of Cryptocurrency Systems , 2017 .
[15] Mario Zagar,et al. Comparative analysis of blockchain consensus algorithms , 2018, 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[16] Gregory A. Witte,et al. Framework for Improving Critical Infrastructure Cybersecurity | NIST , 2014 .
[17] Lin Wang Helsinki. Attacks Against Peer-to-peer Networks and Countermeasures , 2006 .
[18] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[19] Arthur Gervais,et al. Ethereum Eclipse Attacks , 2016 .
[21] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[22] Iuon-Chang Lin,et al. A Survey of Blockchain Security Issues and Challenges , 2017, Int. J. Netw. Secur..
[23] Jörg Becker,et al. Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency , 2012, WEIS.
[24] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[25] Yang Lu. Blockchain: A Survey on Functions, Applications and Open Issues , 2018 .
[26] Mohammed Samaka,et al. Security Services Using Blockchains: A State of the Art Survey , 2018, IEEE Communications Surveys & Tutorials.
[27] Matthew P. Barrett,et al. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1 (Arabic translation) , 2018 .
[28] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[29] Kaiwen Zhang,et al. Towards Dependable, Scalable, and Pervasive Distributed Ledgers with Blockchains , 2018, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).
[30] 谢宗晓,et al. ISO/IEC 27001:2013概述与改版分析 , 2014 .
[31] Marko Vukolic,et al. Blockchain Consensus Protocols in the Wild , 2017, DISC.
[32] Yuliang Zheng,et al. Security of the Blockchain against Long Delay Attack , 2018, IACR Cryptol. ePrint Arch..
[33] E. Sandstrom,et al. Cyber security , 2005, International Symposium CIGRE/IEEE PES, 2005..
[34] Thomas Yeboah,et al. Migration Model for un secure Database driven Software System to Secure System using Cryptography , 2016 .