Short Paper: I Can't Believe It's Not Stake! Resource Exhaustion Attacks on PoS.
Sanket KanjalkarJoseph KuoYunqi LiAndrew MillerPublished in: Financial Cryptography (2019)
Keyphrases
- countermeasures
- resource allocation
- part of speech
- watermarking scheme
- malicious users
- resource selection
- resource management
- resource constraints
- malicious attacks
- wireless sensor networks
- natural language
- artificial intelligence
- security mechanisms
- linguistic features
- machine learning
- traffic analysis
- denial of service attacks
- terrorist attacks
- database