Author:
Panwar Arvind,Bhatnagar Vishal
Reference14 articles.
1. Kędziora M, Kozłowski P, Szczepanik M, Jóźwiak P (2020) Analysis of blockchain selfish mining attacks. Adv Intell Syst Comput 1050(January):231–240
2. Saad M et al (2020) Exploring the attack surface of blockchain: a comprehensive survey. IEEE Commun Surv Tutorials 1
3. Begum A, Tareq AH, Sultana M, Sohel MK, Rahman T, Sarwar AH (2020) Blockchain attacks, analysis and a model to solve double spending attack. Int J Mach Learn Comput 10(2)
4. Sengupta J, Ruj S, Das Bit S (2020) A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J Netw Comput Appl 149(February):102481
5. Hassan A et al (2020) A systematic literature review on the security and privacy of the blockchain and cryptocurrency. OIC-CERT J Cyber Secur 2(1):1–17
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献