Login / Signup
Defending Against Malicious Reorgs in Tezos Proof-of-Stake.
Michael Neuder
Daniel J. Moroz
Rithvik Rao
David C. Parkes
Published in:
AFT (2020)
Keyphrases
</>
linear logic
malicious attacks
data sets
mobile robot
proof theory
databases
neural network
decision making
case study
malicious users
malicious behavior
proof planning
detect malicious