Login / Signup
Evicting and filling attack for linking multiple network addresses of Bitcoin nodes.
Huashuang Yang
Jinqiao Shi
Yue Gao
Xuebin Wang
Yanwei Sun
Ruisheng Shi
Dongbin Wang
Published in:
Cybersecur. (2023)
Keyphrases
</>
network structure
complex networks
network model
malicious nodes
neighboring nodes
fully connected
mesh network
information networks
real world networks
network topologies
wireless sensor networks
centrality measures
hidden nodes
network nodes
countermeasures
scale free
network connectivity
information diffusion
unstructured peer to peer