Evicting and filling attack for linking multiple network addresses of Bitcoin nodes.
Huashuang YangJinqiao ShiYue GaoXuebin WangYanwei SunRuisheng ShiDongbin WangPublished in: Cybersecur. (2023)
Keyphrases
- network structure
- sparsely connected
- malicious nodes
- network topologies
- neighboring nodes
- network nodes
- wireless sensor networks
- shortest path
- network traffic
- computer networks
- communication networks
- small world
- information networks
- unstructured peer to peer
- hidden nodes
- centrality measures
- ddos attacks
- complex networks
- peer to peer
- intermediate nodes
- attack graphs