Babylon: Reusing Bitcoin Mining to Enhance Proof-of-Stake Security.
Ertem Nusret TasDavid TseFisher YuSreeram KannanPublished in: CoRR (2022)
Keyphrases
- constraint satisfaction
- theorem prover
- web mining
- access control
- heuristic search
- preserving privacy
- security requirements
- text mining
- constraint satisfaction problems
- association rule mining
- intrusion detection
- data mining algorithms
- security issues
- data mining
- information security
- mining algorithm
- security mechanisms
- computer security
- knowledge discovery
- network security
- itemsets
- security level
- linear logic
- sequential patterns
- network monitoring
- statistical databases
- pattern mining
- frequent patterns
- data mining techniques
- website