1. Mirko Bez , Giacomo Fornari , and Tullio Vardanega . 2019 . The Scalability Challenge of Ethereum: An Initial Quantitative Analysis. In 2019 IEEE International Conference on Service-Oriented System Engineering (SOSE). 167–176 . https://doi.org/10.1109/SOSE.2019.00031 10.1109/SOSE.2019.00031 Mirko Bez, Giacomo Fornari, and Tullio Vardanega. 2019. The Scalability Challenge of Ethereum: An Initial Quantitative Analysis. In 2019 IEEE International Conference on Service-Oriented System Engineering (SOSE). 167–176. https://doi.org/10.1109/SOSE.2019.00031
2. Thibault Cholez , Isabelle Chrisment , Olivier Festor , and Guillaume Doyen . 2012. Detection and Mitigation of Localized Attacks in a Widely Deployed P2P Network. Peer-to-Peer Networking and Applications 6 (June 2012 ). https://doi.org/10.1007/s12083-012-0137-7 10.1007/s12083-012-0137-7 Thibault Cholez, Isabelle Chrisment, Olivier Festor, and Guillaume Doyen. 2012. Detection and Mitigation of Localized Attacks in a Widely Deployed P2P Network. Peer-to-Peer Networking and Applications 6 (June 2012). https://doi.org/10.1007/s12083-012-0137-7
3. Resource Analysis of Ethereum 2.0 Clients
4. John R. Douceur . 2002. The Sybil Attack . In Peer-to-Peer Systems(Lecture Notes in Computer Science) , Peter Druschel, Frans Kaashoek, and Antony Rowstron (Eds.). Springer , Berlin, Heidelberg , 251–260. https://doi.org/10.1007/3-540-45748-8_24 10.1007/3-540-45748-8_24 John R. Douceur. 2002. The Sybil Attack. In Peer-to-Peer Systems(Lecture Notes in Computer Science), Peter Druschel, Frans Kaashoek, and Antony Rowstron (Eds.). Springer, Berlin, Heidelberg, 251–260. https://doi.org/10.1007/3-540-45748-8_24
5. Ethereum’s Peer-to-Peer Network Monitoring and Sybil Attack Prevention