Author:
Madhushanie Nadisha,Vidanagamachchi Sugandima,Arachchilage Nalin
Publisher
Springer Science and Business Media LLC
Reference67 articles.
1. Marwa Chaieb, S., Yousfi, P., Lafourcade, Robbana, R.: Verify-your-vote: A verifiable blockchain-based online voting protocol. In Information Systems: 15th European, Mediterranean, and Middle Eastern Conference, EMCIS Limassol, Cyprus, October 4–5, 2018, Proceedings 15, pages 16–30. Springer, 2019. (2018)
2. Peterson, M., Andel, T., Benton, R.: Towards detection of selfish mining using machine learning. In International Conference on Cyber Warfare and Security, volume 17, pages 237–243, (2022)
3. Alyssa Hertig: Blockchain’s once-feared 51% attack is now becoming regular. Coindesk com., (2018)
4. Mark Nesbitt: Deep chain reorganization detected on ethereum classic (etc). Available [online].[Accessed: 1212-2019], (2019)
5. Barbara Kitchenham: Procedures for performing systematic reviews. Keele UK Keele Univ. 33(2004), 1–26 (2004)