Login / Signup

Profiling of Malicious Users Using Simple Honeypots on the Ethereum Blockchain Network.

Kazuki HaraTeppei SatoMitsuyoshi ImamuraKazumasa Omote
Published in: IEEE ICBC (2020)
Keyphrases
  • malicious users
  • wireless sensor networks
  • network structure
  • peer to peer
  • forensic analysis
  • information sources
  • network intrusion