|
[1]
|
Lamport, L., Shostak, R. and Pease, M. (2019) The Byzantine Generals Problem. In: Concurrency: The Works of Leslie Lamport, Association for Computing Machinery, 203-226.
|
|
[2]
|
Nguyen, C.T., Hoang, D.T., Nguyen, D.N., Niyato, D., Nguyen, H.T. and Dutkiewicz, E. (2019) Proof-of-Stake Consensus Mechanisms for Future Blockchain Networks: Fundamentals, Applications and Opportunities. IEEE Access, 7, 85727-85745. [Google Scholar] [CrossRef]
|
|
[3]
|
Yan, C., Zhang, C., Lu, Z., Wang, Z., Liu, Y. and Liu, B. (2022) Blockchain Abnormal Behavior Awareness Methods: A Survey. Cybersecurity, 5, Article No. 5. [Google Scholar] [CrossRef]
|
|
[4]
|
Lin, I.C. and Liao, T.C. (2017) A Survey of Blockchain Security Issues and Challenges. International Journal of Network Security, 19, 653-659.
|
|
[5]
|
Salman, T., Zolanvari, M., Erbad, A., Jain, R. and Samaka, M. (2019) Security Services Using Blockchains: A State of the Art Survey. IEEE Communications Surveys & Tutorials, 21, 858-880. [Google Scholar] [CrossRef]
|
|
[6]
|
Conti, M., Sandeep Kumar, E., Lal, C. and Ruj, S. (2018) A Survey on Security and Privacy Issues of Bitcoin. IEEE Communications Surveys & Tutorials, 20, 3416-3452. [Google Scholar] [CrossRef]
|
|
[7]
|
Li, X., Jiang, P., Chen, T., Luo, X. and Wen, Q. (2020) A Survey on the Security of Blockchain Systems. Future Generation Computer Systems, 107, 841-853. [Google Scholar] [CrossRef]
|
|
[8]
|
Xu, G., Guo, B., Su, C., Zheng, X., Liang, K., Wong, D.S., et al. (2020) Am I Eclipsed? A Smart Detector of Eclipse Attacks for Ethereum. Computers & Security, 88, Article 101604. [Google Scholar] [CrossRef]
|
|
[9]
|
Ostapowicz, M. and Żbikowski, K. (2019) Detecting Fraudulent Accounts on Blockchain: A Supervised Approach. In: Lecture Notes in Computer Science, Springer, 18-31. [Google Scholar] [CrossRef]
|
|
[10]
|
Tan, R., Tan, Q., Zhang, P. and Li, Z. (2021) Graph Neural Network for Ethereum Fraud Detection. 2021 IEEE International Conference on Big Knowledge (ICBK), Auckland, 7-8 December 2021, 78-85. [Google Scholar] [CrossRef]
|
|
[11]
|
Elmougy, Y. and Manzi, O. (2021) Anomaly Detection on Bitcoin, Ethereum Networks Using GPU-Accelerated Machine Learning Methods. 2021 31st International Conference on Computer Theory and Applications (ICCTA), Alexandria, 11-13 December 2021, 166-171. [Google Scholar] [CrossRef]
|
|
[12]
|
Kumar, N., Singh, A., Handa, A. and Shukla, S.K. (2020) Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning. In: Lecture Notes in Computer Science, Springer, 94-109. [Google Scholar] [CrossRef]
|
|
[13]
|
Dahiya, M., Mishra, N. and Singh, R. (2023) Neural Network Based Approach for Ethereum Fraud Detection. 2023 4th International Conference on Intelligent Engineering and Management (ICIEM), London, 9-11 May 2023, 1-4. [Google Scholar] [CrossRef]
|
|
[14]
|
Farrugia, S., Ellul, J. and Azzopardi, G. (2020) Detection of Illicit Accounts over the Ethereum Blockchain. Expert Systems with Applications, 150, Article 113318. [Google Scholar] [CrossRef]
|
|
[15]
|
Akbar, N.A., Muneer, A., ElHakim, N. and Fati, S.M. (2021) Distributed Hybrid Double-Spending Attack Prevention Mechanism for Proof-of-Work and Proof-of-Stake Blockchain Consensuses. Future Internet, 13, Article 285. [Google Scholar] [CrossRef]
|
|
[16]
|
Tas, E.N., Tse, D., Yu, F., et al. (2022) Babylon: Reusing Bitcoin Mining to Enhance Proof-of-Stake Security.
|
|
[17]
|
Sanda, O., Pavlidis, M., Seraj, S. and Polatidis, N. (2023) Long-Range Attack Detection on Permissionless Blockchains Using Deep Learning. Expert Systems with Applications, 218, Article 119606. [Google Scholar] [CrossRef]
|
|
[18]
|
Fukushima, K. (1980) Neocognitron: A Self-Organizing Neural Network Model for a Mechanism of Pattern Recognition Unaffected by Shift in Position. Biological Cybernetics, 36, 193-202. [Google Scholar] [CrossRef] [PubMed]
|
|
[19]
|
Lecun, Y., Bottou, L., Bengio, Y. and Haffner, P. (1998) Gradient-Based Learning Applied to Document Recognition. Proceedings of the IEEE, 86, 2278-2324. [Google Scholar] [CrossRef]
|
|
[20]
|
Hochreiter, S. and Schmidhuber, J. (1997) Long Short-Term Memory. Neural Computation, 9, 1735-1780. [Google Scholar] [CrossRef] [PubMed]
|