1. Ye, C., Li, G., Cai, H., Gu, Y., Fukuda, A.: Analysis of security in blockchain: case study in 51%-attack detecting. In: 5th International Conference on Dependable Systems and Their Applications (DSA), pp. 15–24. IEEE (2018)
2. Chen, H., Pendleton, M., Njilla, L., Xu, S.: A survey on ethereum systems security: vulnerabilities, attacks, and defenses. ACM Comput. Surv. (CSUR) 53, 1–43 (2000)
3. Lecture Notes in Computer Science;N Atzei,2017
4. Usman, M., Jan, M.A., He, X., Chen, J.: A survey on representation learning efforts in cybersecurity domain. ACM Comput. Surv. (CSUR) 52, 1–28 (2019)
5. Sharma, A., Gaba, S., Singla, S., Kumar, S., Saxena, C., Srivastava, R.: Recent Trends in Communication and Intelligent Systems, pp. 47–54. Springer, Heidelberg (2020). https://doi.org/10.1007/978-981-19-1324-2