Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detection
-
- Overview
-
- Research
-
- Identity
-
- Additional Document Info
-
- Other
-
- View All
-
Overview
published proceedings
-
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
author list (cited authors)
-
Fan, W., Hong, H., Kim, J., Wuthier, S., Nakashima, M., Zhou, X., Chow, C., & Chang, S.
citation count
complete list of authors
-
Fan, Wenjun||Hong, Hsiang-Jen||Kim, Jinoh||Wuthier, Simeon||Nakashima, Makiya||Zhou, Xiaobo||Chow, Ching-Hua||Chang, Sang-Yoon
publication date
publisher
published in
Research
keywords
-
Anomaly Detection
-
Bitcoin
-
Blockchain
-
Consensus Protocol
-
Cryptocurrency
-
Engines
-
Machine Learning
-
P2p Network
-
Peer-to-peer Computing
-
Prototypes
-
Statistical Analysis
-
Traffic Analysis
Identity
Digital Object Identifier (DOI)
Additional Document Info
start page
end page
volume
issue
Other
URL
-
http://dx.doi.org/10.1109/tdsc.2022.3152937