Selfish Mining Attacks Exacerbated by Elastic Hash Supply.
Yoko ShibuyaGo YamamotoFuhito KojimaElaine ShiShin'ichiro MatsuoAron LaszkaPublished in: CoRR (2021)
Keyphrases
- data mining
- countermeasures
- text mining
- frequent patterns
- resource allocation
- terrorist attacks
- malicious attacks
- itemsets
- web mining
- pattern mining
- mining algorithm
- sequential patterns
- elastic matching
- traffic analysis
- web logs
- hash functions
- information security
- data mining techniques
- multi dimensional
- knowledge discovery
- association rules
- data structure