Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. Nicholas Roth, an Architectural Assessment of Bitcoin Using the Systems Modeling Language 2015 Conference on Systems Engineering Research, Procedia Computer Science 44 ( 2015 ) 527 – 536
    2. https://decryptionary.com/what-iscryptocurrency/introduction-to-cryptocurrency/
    3. https://blockgeeks.com/guides/what-iscryptocurrency/
    4. https://resources.infosecinstitute.com/futureinformation-security/
    5. https://blocksdecoded.com/cryptocurrency-hacks/ 6. https://www.liteforex.com/blog/forinvestors/cryptocurrency-attacks-types-ofvulnerabilities-risks-and-results/
    6. Yujin Kwon, Dohyun Kim, Yunmok Son,,Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin,CCS‘17, October 30- November 3, 2017, Dallas, TX, USA
    7. https://www.cloudflare.com/learning/ddos/cryptocurr ency-ddos-attacks/
    8. Christian Decker, Roger Wattenhofer,Information Propagation in the Bitcoin Network,13-th IEEE International Conference on Peer-to-Peer Computing
    9. Aaron Zimba, Zhaoshun Wang & Mwenge Mulenga (2019) Crypto jacking injection: A paradigm shift to crypto currency-based web-centric internet attacks, Journal of Organizational Computing and Electronic Commerce, 29:1, 40-59
    10. Qi Feng, Debiao He, Sherali Zeadally, Muhammad Khurram Khan, Neeraj Kumar,A Survey on Privacy Protection in Blockchain System,Journal of Network and Computer Applications (2018)
    11. Faheem Ullah, Matthew Edwards, Rajiv Ramdhany, Ruzanna Chitchyan, M. Ali Babar, Awais Rashid,Data Exfiltration: A Review of External Attack Vectors and Countermeasures, Journal of Network and Computer Applications
    12. https://www.csoonline.com/article/3253572/what-iscryptojacking-how-to-prevent-detect-and-recoverfrom-it.html
    13. Maria Apostolaki,Aviv Zohar,Laurent VanbeverHijacking Bitcoin: Routing Attacks on Cryptocurrencies,Security and Privacy (SP), 2017 IEEE Symposium

Recent Article