Login / Signup
Blockchain System Defensive Overview for Double-Spend and Selfish Mining Attacks: A Systematic Approach.
Kervins Nicolas
Yi Wang
George C. Giakos
Bingyang Wei
Hongda Shen
Published in:
IEEE Access (2021)
Keyphrases
</>
mining algorithm
text mining
data mining algorithms
computer security
data mining applications
association rule mining
knowledge discovery
web mining
pattern mining
countermeasures
data mining
itemsets
frequent itemsets
data sets
resource allocation
website
machine learning
watermarking scheme