共 27 条
[1]
SHEN X, PEI Q Q, LIU X F., Survey of block chain, Chinese Journal of Network and Information Security, 2, 11, pp. 11-20, (2016)
[2]
STEPHEN R, ALEX A., A review on blockchain security, IOP Conference Series: Materials Science and Engineering, (2018)
[3]
HAN X, YUAN Y, WANG F Y., Security problems on blockchain: the state of the art and future trends, Acta Automatica Sinica, 45, 1, pp. 206-225, (2019)
[4]
JIANG P P, WANG Q, CHEN Y J, Et al., Securing guarantee of the blockchain network: attacks and countermeasures, Journal on Communications, 42, 1, pp. 151-162, (2021)
[5]
TRAMER F, BONEH D, PATERSON K G., Remote side-channel attacks on anonymous transactions, Proceedings of the 29th USE-NIX Conference on Security Symposium, pp. 2739-2756, (2020)
[6]
YE C C, LI G Q, CAI H M, Et al., Security detection model of blockchain, Journal of Software, 29, 5, pp. 1348-1359, (2018)
[7]
ZENG S Q, HUO R, HUANG T, Et al., Survey of blockchain: principle, progress and application, Journal on Communications, 41, 1, pp. 134-151, (2020)
[8]
HASSAN M U, REHMANI M H, CHEN J., Anomaly detection in blockchain networks: a comprehensive survey, (2021)
[9]
KIM J, NAKASHIMA M, FAN W J, Et al., Anomaly detection based on traffic monitoring for secure blockchain networking, Proceedings of 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1-9, (2021)
[10]
SYARIF I, ZALUSKA E, PRUGEL-BENNETT A, Et al., Application of bagging, boosting and stacking to intrusion detection, Proceedings of International Workshop on Machine Learning and Data Mining in Pattern Recognition, pp. 593-602, (2012)