1. Back A, Corallo M, Dashjr L, Friedenbach M, Maxwell G, Miller A, Poelstra A, Timón J, Wuille P Enabling blockchain innovations with pegged sidechains, http://www.opensciencereview.com/papers/123/enablingblockchain-innovations-with-pegged-sidechainshttp://www.opensciencereview.com/papers/123/enablingblockchain-innovations-with-pegged-sidechains
2. Li Z, Kang J, Yu R, Ye D, Deng Q, Zhang Y (2018) Consortium blockchain for secure energy trading in industrial internet of things, IEEE Transactions on Industrial Informatics
3. Signorini M, Pontecorvi M, Kanoun W, Di Pietro R (2018) Bad: blockchain anomaly detection. arXiv:1807.03833
4. Mbarek B, Jabeur N et al (2018) Ecass: an encryption compression aggregation security scheme for secure data transmission in ambient assisted living systems. Personal and Ubiquitous Computing
5. Wray K, Thompson B (2014) An application of multiagent learning in highly dynamic environments. In: AAAI workshop on multiagent interaction without prior coordination