1. IDC (2020, July 28). IoT Growth Demands Rethink of Long-Term Storage Strategies, Says IDC. Available online: https://www.idc.com/getdoc.jsp?containerId=prAP46737220.
2. Analysis of industrial Internet of Things security risks and exploration of protection strategies;Electron. World,2019
3. Ittay, E., Gencer, A.E., Sirer, E.G., and van Renesse, R. (2016, January 16–18). Bitcoin-NG: A scalable blockchain protocol. Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI’16), Santa Clara, CA, USA.
4. Virtualization for distributed ledger technology (VDLT);IEEE Access,2018
5. Johnson, C., Badger, L., Waltermire, D., Snyder, J., and Skorupka, C. (2016). Guide to Cyber Threat Information Sharing, NIST.