Securing majority-attack in blockchain using machine learning and algorithmic game theory: A proof of work
S Dey - 2018 10th computer science and electronic …, 2018 - ieeexplore.ieee.org
Recently we could see several institutions coming together to create consortium based
blockchain networks such as Hyperledger. Although for applications of blockchain such as …
blockchain networks such as Hyperledger. Although for applications of blockchain such as …
A proof of work: Securing majority-attack in blockchain using machine learning and algorithmic game theory
S Dey - International Journal of Wireless and Microwave …, 2018 - repository.essex.ac.uk
Blockchain's vast applications in different industries have drawn several researchers to
pursue extensive research in securing blockchain technologies. In recent times we could …
pursue extensive research in securing blockchain technologies. In recent times we could …
[PDF][PDF] An overview of advantages and security challenges of cloud computing
N Zhang - Int J Comput Sci Mob Comput, 2021 - researchgate.net
Cloud computing brings for higher educational institution a wide range of benefits with new
capabilities to incorporate in the educational process. However, the cloud services are …
capabilities to incorporate in the educational process. However, the cloud services are …
[PDF][PDF] An Introduction to Computer & Network Security Threats
N Zhang - International Journal of Advance Research in …, 2020 - researchgate.net
Modern organizations depend heavily on their information systems and large investments
are made on them annually. These systems are now computerized and networking has …
are made on them annually. These systems are now computerized and networking has …
[PDF][PDF] RTCA: Real-time Communication Application on Android Platform
L Li - International Journal of Advance Research in …, 2018 - researchgate.net
In today's world, communication is extremely vital and kee** this communication real-time
is essential as our lives have become more fast paced. Kee** this is mind, a …
is essential as our lives have become more fast paced. Kee** this is mind, a …
[PDF][PDF] Modeling and Analysis on a DTN Based WirelessSensor Network Topology Control
L Li - International Journal of Computer Network and …, 2009 - Citeseer
Wireless sensor networks (WSNs) have unlimited and extensive potential application in
different areas. Due to WSNs' work environments and nodes behavior, intermitted network …
different areas. Due to WSNs' work environments and nodes behavior, intermitted network …
[PDF][PDF] LSIA Algo: Symbol Detection Assistance Based Interference Alignment (IA)
N Zhang - researchgate.net
Interference Alignment (IA), as an impedance scratch-off strategy, successfully wipes out the
impacts of meddling sign by compacting the meddling sign into a space random to the ideal …
impacts of meddling sign by compacting the meddling sign into a space random to the ideal …
[PDF][PDF] DPMS: Develo** a Programming Module to Securely cope with vulnerabilities
L Li - 2019 - researchgate.net
Even in today's security conscious world, secure code is something that still eludes many
developers. It is apparent that many graduates are leaving colleges and universities without …
developers. It is apparent that many graduates are leaving colleges and universities without …
[PDF][PDF] EEB: A Heuristic Approach for Energy Efficient Broadcasting in Ad-Hoc Wireless Networks
N Zhang - researchgate.net
Ad hoc wireless networks are usually composed of autonomous nodes, which are battery
powered only. The energy-efficiency is perhaps one of the most important factors for each …
powered only. The energy-efficiency is perhaps one of the most important factors for each …
[PDF][PDF] MADTN: The Modeling and Analysis on a DTN Based Wireless Sensor Network Topology Control
L Li - researchgate.net
Wireless sensor networks (WSNs) have unlimited and extensive potential application in
different areas. Due to WSNs' work environments and nodes behavior, intermitted network …
different areas. Due to WSNs' work environments and nodes behavior, intermitted network …