Login / Signup
Revisiting Double-Spending Attacks on the Bitcoin Blockchain: New Findings.
Jian Zheng
Huawei Huang
Canlin Li
Zibin Zheng
Song Guo
Published in:
IWQoS (2021)
Keyphrases
</>
countermeasures
case study
empirical evidence
literature review
traffic analysis
empirical findings
denial of service attacks
malicious attacks
neural network
access control
computer security
image watermarking
security threats
trusted third party
semi structured interviews
managerial implications