Login / Signup
Profiling of Malicious Users Using Simple Honeypots on the Ethereum Blockchain Network.
Kazuki Hara
Teppei Sato
Mitsuyoshi Imamura
Kazumasa Omote
Published in:
IEEE ICBC (2020)
Keyphrases
</>
malicious users
wireless sensor networks
network structure
peer to peer
forensic analysis
information sources
network intrusion