1. Vitalik Buterin. 2014. A Next-Generation Smart Contract and Decentralized Application Platform. (2014). https://github.com/ethereum/wiki/wiki/White-Paper Accessed: 29-May-2017. Vitalik Buterin. 2014. A Next-Generation Smart Contract and Decentralized Application Platform. (2014). https://github.com/ethereum/wiki/wiki/White-Paper Accessed: 29-May-2017.
2. Phil Daian. 2016. Analysis of the DAO exploit. (2016). http://hackingdistributed.com/2016/06/18/analysis-of-the-dao-exploit/ Accessed: 29-May-2017. Phil Daian. 2016. Analysis of the DAO exploit. (2016). http://hackingdistributed.com/2016/06/18/analysis-of-the-dao-exploit/ Accessed: 29-May-2017.
3. Elasticsearch. 2017. The Open Source Elastic Stack. (2017). https://www.elastic.co/products Accessed: 29-May-2017. Elasticsearch. 2017. The Open Source Elastic Stack. (2017). https://www.elastic.co/products Accessed: 29-May-2017.
4. Thai Pham and Steven Lee. 2016a. Anomaly Detection in Bitcoin Network Using Unsupervised Learning Methods. (2016). https://arxiv.org/abs/1611.03941 Accessed: 29-May-2017. Thai Pham and Steven Lee. 2016a. Anomaly Detection in Bitcoin Network Using Unsupervised Learning Methods. (2016). https://arxiv.org/abs/1611.03941 Accessed: 29-May-2017.
5. Thai Pham and Steven Lee. 2016b. Anomaly Detection in the Bitcoin System - A Network Perspective. (2016). https://arxiv.org/abs/1611.03942 Accessed: 29-May-2017. Thai Pham and Steven Lee. 2016b. Anomaly Detection in the Bitcoin System - A Network Perspective. (2016). https://arxiv.org/abs/1611.03942 Accessed: 29-May-2017.