Evicting and filling attack for linking multiple network addresses of Bitcoin nodes.
Huashuang YangJinqiao ShiYue GaoXuebin WangYanwei SunRuisheng ShiDongbin WangPublished in: Cybersecur. (2023)
Keyphrases
- network structure
- complex networks
- network model
- malicious nodes
- neighboring nodes
- fully connected
- mesh network
- information networks
- real world networks
- network topologies
- wireless sensor networks
- centrality measures
- hidden nodes
- network nodes
- countermeasures
- scale free
- network connectivity
- information diffusion
- unstructured peer to peer