1. Evaluating suitability of applying blockchain;Lo,2017
2. A user authentication scheme of IoT devices using blockchain-enabled fog nodes;Almadhoun,2018
3. Combating deepfake videos using blockchain and smart contracts;Hasan;IEEE Access,2019
4. Blockchain-based application security risks: asystematic literature review;Iqbal,2019
5. Information security economics–and beyond;Anderson,2007