暂无分享,去创建一个
[1] Rok Sosic,et al. SNAP , 2016, ACM Trans. Intell. Syst. Technol..
[2] Hannes Hartenstein,et al. Timing Analysis for Inferring the Topology of the Bitcoin Peer-to-Peer Network , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).
[3] Laurent George,et al. BTCmap: Mapping Bitcoin Peer-to-Peer Network Topology , 2018, 2018 IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN).
[4] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[5] David Starobinski,et al. Churn in the Bitcoin Network: Characterization and Impact , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
[6] Aric Hagberg,et al. Exploring Network Structure, Dynamics, and Function using NetworkX , 2008, Proceedings of the Python in Science Conference.
[7] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[8] Daniel Zwillinger,et al. CRC Standard Probability and Statistics Tables and Formulae, Student Edition , 1999 .
[9] Dogecoin: A Brief Overview & Survey , 2018 .
[10] Damien Magoni,et al. Tearing down the Internet , 2003, IEEE J. Sel. Areas Commun..
[11] Ethan Heilman,et al. Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network , 2020, IACR Cryptol. ePrint Arch..
[12] Andrew Miller,et al. Measuring Ethereum Network Peers , 2018, Internet Measurement Conference.
[13] Simon Josefsson,et al. The scrypt Password-Based Key Derivation Function , 2016, RFC.
[14] Mark E. J. Newman,et al. Power-Law Distributions in Empirical Data , 2007, SIAM Rev..
[15] Ulrik Brandes,et al. What is network science? , 2013, Network Science.
[16] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[17] Aziz Mohaisen,et al. Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).
[18] Daniel Stutzbach,et al. Understanding churn in peer-to-peer networks , 2006, IMC '06.
[19] David Mohaisen,et al. Exploring the Attack Surface of Blockchain: A Comprehensive Survey , 2020, IEEE Communications Surveys & Tutorials.
[20] Krishna P. Gummadi,et al. Measurement and analysis of online social networks , 2007, IMC '07.
[21] Hannes Hartenstein,et al. Network Layer Aspects of Permissionless Blockchains , 2019, IEEE Communications Surveys & Tutorials.
[22] Cristina Pérez-Solà,et al. TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions , 2018, Financial Cryptography.
[23] B. Lewis,et al. Ethical research standards in a world of big data , 2014, F1000Research.
[24] M. Fiedler. Algebraic connectivity of graphs , 1973 .
[25] Diego Garlaschelli,et al. Patterns of link reciprocity in directed networks. , 2004, Physical review letters.
[26] Florian Tschorsch,et al. Map-Z: Exposing the Zcash Network in Times of Transition , 2019, 2019 IEEE 44th Conference on Local Computer Networks (LCN).
[27] D. Dittrich,et al. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research , 2012 .
[28] Hannes Hartenstein,et al. Exploiting Transaction Accumulation and Double Spends for Topology Inference in Bitcoin , 2018, Financial Cryptography Workshops.
[29] Jon Kleinberg,et al. The Structure of the Web , 2001, Science.
[30] Laurent Vanbever,et al. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[31] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[32] Stefan Schmid,et al. SOK: cryptocurrency networking context, state-of-the-art, challenges , 2020, ARES.
[33] Alex Biryukov,et al. Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis , 2019, 2019 IEEE European Symposium on Security and Privacy (EuroS&P).
[34] Paul J. Laurienti,et al. The Ubiquity of Small-World Networks , 2011, Brain Connect..
[35] Till Neudecker,et al. Characterization of the Bitcoin Peer-to-Peer Network (2015-2018) , 2019 .
[36] Cristina Nita-Rotaru,et al. Under the Hood of the Ethereum Gossip Protocol , 2021, Financial Cryptography.
[37] D. Plenz,et al. powerlaw: A Python Package for Analysis of Heavy-Tailed Distributions , 2013, PloS one.
[38] Min Suk Kang,et al. A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network , 2019, 2020 IEEE Symposium on Security and Privacy (SP).
[39] Alex Biryukov,et al. Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.
[40] Liang Wang,et al. Towards Better Understanding of Bitcoin Unreachable Peers , 2017, ArXiv.
[41] Joel Nothman,et al. SciPy 1.0-Fundamental Algorithms for Scientific Computing in Python , 2019, ArXiv.
[42] Hannes Hartenstein,et al. A simulation model for analysis of attacks on the Bitcoin peer-to-peer network , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[43] Vern Paxson,et al. Issues and etiquette concerning use of shared measurement data , 2007, IMC '07.
[44] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.