[1] P. A. James, “Computer Security Threat Monitoring and Surveillance,” James P. Anderson Co., Fort Washington, 1980 [2] M. Padmavathi and R. M. Suresh, “Secure P2P Intelligent Network Transaction using Litecoin,” Mobile Networks and Applications, Vol. 24, No. 2, pp. 318-326, April 2019 [3] I. Bentov and R. Kumaresan, “How to Use Bitcoin to Design Fair Protocol,” inProceeding of the 34th Annual Cryptology Conference, pp. 421-439, Santa Barbara, CA, USA, August 2014 [4] P. Katsiampa, “Volatility Estimation for Bitcoin: A Comparison of GARCH Model,” Economics Letters, Vol. 158, pp. 3-6, September 2017 [5] Q. Xia, E. B. Sifah, K. O. Asamoah, J. Gao, X. Du,M. Guizani, “MeDShare: Trust-Less Medical Data Sharing among Cloud Service Providers via Blockchain,” IEEE Access, Vol. 5, No. 99, pp. 14757-14767, July 2017 [6] G. Liang, S. R. Weller, F. Luo, J. Zhao,Z. Dong, “Distributed Blockchain-based Data Protection Framework for Modern Power Systems Against Cyber Attacks,” IEEE Transactions on Smart Grid, Vol. 10, No. 3, pp. 162-173, May 2019 [7] W. Pennington and J. Evans, “Blockchain-Enabled, Subscriber-based Capital Markets Index Data Distribution,” The Journal of Index Investing, Vol. 7, No. 4, pp. 83-87, July 2017 [8] A. K.Ghosh and A. Schartzbard, “A Study in using Neural Networks for Anomaly and Misuse Detection,” inProceedings of the 8th Conference on Usenix Security Symposium, pp. 1-11, Washington, D. C., August 1999 [9] S. Nakamoto,“Bitcoin: A Peer-to-Peer Electronic Cash System,”(https://bitcoin.org/en/bitcoin-paper, 2008) [10] L. H. Chun, “Classification of P2P Networks and Analysis of Key Technologies”, Microcomputer Information, DOI 10.3969/j.issn.1008-0570.2008.09.044, 2008 [11] G. Wood, “Ethereum: a Secure Decentralised Generalised Transaction Ledger,” Ethereum Project Yellow Paper, Vol. 32, No. 10, pp. 1365-1367, October 2018 [12] EOS.IO technical white paper v2,(https://steemit.com/eos/@eosio/eos-io-technical-white-paper, 2018) [13] L. Lamport, R. Shostak,M. Pease, “The Byzantine Generals Problem,” ACM Transactions on Programming Languages and Systems, Vol. 2, No. 3, pp. 382-401, May 1982 [14] L. Lamport, “The Part-Time Parliament,” ACM Transactions on Computer Systems, Vol. 16, No. 2, pp. 133-169, May 1998 [15] M. Castro and B. Liskov, “Practical Byzantine Fault Tolerance,” in Proceedings of the Third Symposium on Operating Systems Design and Implementation, pp. 1-14, New Orleans, USA, February 1999 [16] K. Sunny,“A P2P (Peer-to-Peer) Proof of Stake Cryptocurrency,”(https://peercoin.net/whitepaper, 2013) |