真实环境下虚假团体的测量研究

蒋竞, 单子非, 王潇, 张莉, 代亚非 - 计算机科学技术学报, 2015 - jcst.ict.ac.cn
… In order to further improve security and defend against sybil attacks, Renren has … to avoid
detection. The inspection of information completeness increases the overhead of sybil attacks

区块链关键技术及存在问题研究综述.

刘双印, 王璐, 孙傅恒, 徐龙琴, 曹亮… - Journal of …, 2022 - search.ebscohost.com
attacks pose a greatest security threat to the blockchain system. It must be paid attention to
and prevented … 攻击者主动制造分叉进行攻击:其一是女巫攻击 (sybil attack),它是一种基于P2P

区块链共识算法及应用研究.

王群, 李馥娟, 倪雪莉, 夏玲玲… - Journal of Frontiers of …, 2022 - search.ebscohost.com
… Firstly, a general model of blockchain consensus algorithm is proposed, and the basic … 等
基本特性的同 时,其内部采用点对点(peer-to-peer,P2P)方式组织节 点之间的区块传输,验证与记账.…