Login / Signup
On-Off Attack on a Blockchain-based IoT System.
Fereidoun Moradi
Ali Sedaghatbaf
Sara Abbaspour Asadollah
Aida Causevic
Marjan Sirjani
Published in:
ETFA (2019)
Keyphrases
</>
management system
countermeasures
cloud computing
malicious attacks
secret key
data corruption
data mining
wireless sensor networks
data processing
mobile computing
security problems
attack graph
abstract argumentation
malicious users