Author:
Nacer Mohamed Ikbal,Prakoonwit Simant,Alarab Ismail
Publisher
Springer International Publishing
Reference81 articles.
1. Agrawal, R., Imieliński, T., & Swami, A. (1993). Mining association rules between sets of items in large databases. In Proceedings of the 1993 ACM SIGMOD international conference on management of data (pp. 207–216).
2. Ali, A., Latif, S., Qadir, J., Kanhere, S., Singh, J., Crowcroft, J., et al. (2019). Blockchain and the future of the internet: A comprehensive review. arXiv preprint arXiv:1904.00733.
3. Amir, Y., Coan, B., Kirsch, J., & Lane, J. (2010). Prime: Byzantine replication under attack. IEEE Transactions on Dependable and Secure Computing, 8(4), 564–577.
4. Back, A., et al. (2002). Hashcash-a denial of service counter-measure computer science.
5. Bag, S., Ruj, S., & Sakurai, K. (2016). Bitcoin block withholding attack: Analysis and mitigation. IEEE Transactions on Information Forensics and Security, 12(8), 1967–1978.