P Pourtahmasbi, M Nojoumian - Blockchain: Research and Applications, 2022 - Elsevier
Since the introduction of Bitcoin, numerous studies on Bitcoin mining attacks have been conducted, and as a result, many countermeasures to these attacks have been proposed …
Consensus algorithms are the building block of any decentralized network where the risk of malicious users is high. These algorithms are required to be robust, scalable, and secure in …
In this research, a new reputation-based model is utilized to disincentivize collusion of defenders and attackers in Software Defined Networks (SDN), and also, to disincentivize …
Security games are mainly designed and used to model interaction between attackers and defenders [1, 2]. In these models, two-player games—extendable to any number of players …