Blockchain Network Threats: The Case of PoW and Ethereum.
Artem ShurovDaniil MalevanniyOleg IakushkinVladimir KorkhovPublished in: ICCSA (2) (2019)
Keyphrases
- security threats
- response time
- peer to peer
- network structure
- cyber attacks
- network topologies
- critical infrastructure
- communication networks
- network model
- denial of service attacks
- data mining
- small world
- network management
- countermeasures
- data flow
- information security
- complex networks
- end to end
- anomaly detection
- genetic algorithm