A Novel Approach for Protection of Accounts’ Names against Hackers Combining Cluster Analysis and Chaotic Theory Authors: Desislav Andreev, Simona Petrakieva, Ina Taralova | Published: 2019-03-08 Clustering methodsFraudulent TransactionInitialization Method 2019.03.08 2025.05.28 Literature Database
Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory: A Proof of Work Authors: Somdip Dey | Published: 2018-06-14 CybersecurityFraudulent TransactionTaxonomy of Attacks 2018.06.14 2025.05.28 Literature Database