Login / Signup
Double-Spending With a Sybil Attack in the Bitcoin Decentralized Network.
Shijie Zhang
Jong-Hyouk Lee
Published in:
IEEE Trans. Ind. Informatics (2019)
Keyphrases
</>
peer to peer
computer networks
multi agent
network traffic
wireless sensor networks
communication networks
network intrusion
distributed systems
network architecture
detection mechanism
network structure
complex networks
neural network
network topologies
forensic analysis
attack graph
buffer overflow