Tesnim Abdellatif & Kei-Leo Brousmiche (2018):
Formal verification of smart contracts based on users and blockchain behaviors models.
In: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS).
IEEE,
pp. 1–5,
doi:10.1109/NTMS.2018.8328737.
Abhishta Abhishta, Roland van Rijswijk-Deij & Lambert JM Nieuwenhuis (2019):
Measuring the impact of a successful DDoS attack on the customer behaviour of managed DNS service providers.
ACM SIGCOMM Computer Communication Review 48(5),
pp. 70–76,
doi:10.1145/3310165.3310175.
Gervais Arthur, Hubert Ritzdorf, Ghassan Karame & Srdjan Capkun (2015):
Tampering with the delivery of blocks and transactions in bitcoin.
In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security,
pp. 692–705,
doi:10.1145/2810103.2813655.
Christel Baier & Joost-Pieter Katoen (2008):
Principles of model checking.
MIT press.
Hsing-Chung Chen, Bambang Irawan, Chieh-Yang Shih, Cahya Damarjati, Zon-Yin Shae & Fengming Chang (2019):
A Smart Contract to Facilitate Goods Purchasing Based on Online Haggle.
In: International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
Springer,
pp. 618–628,
doi:10.1007/978-3-030-22263-5_58.
Ivan Fedotov & Anton Khritankov (2021):
SBIP models.
https://github.com/1vanan/SBIP_models.
Thomas Hérault, Richard Lassaigne, Frédéric Magniette & Sylvain Peyronnet (2004):
Approximate probabilistic model checking.
In: International Workshop on Verification, Model Checking, and Abstract Interpretation.
Springer,
pp. 73–84,
doi:10.1007/978-3-319-06880-0_2.
Amir Herzberg & Haya Shulman (2013):
DNSSEC: Security and availability challenges.
In: 2013 IEEE Conference on Communications and Network Security (CNS).
IEEE,
pp. 365–366,
doi:10.1109/CNS.2013.6682730.
Nicolas Houy (2014):
The economics of Bitcoin transaction fees.
GATE WP 1407,
doi:10.2139/ssrn.2400519.
Adnan Imeri, Nazim Agoulmine & Djamel Khadraoui (2020):
Smart Contract modeling and verification techniques: A survey.
In: 8th International Workshop on ADVANCEs in ICT Infrastructures and Services (ADVANCE 2020),
pp. 1–8.
Ghassan O Karame, Elli Androulaki & Srdjan Capkun (2012):
Double-spending fast payments in bitcoin.
In: Proceedings of the 2012 ACM Conference on Computer and Communications Security,
pp. 906–917,
doi:10.1145/2382196.2382292.
Ron Koymans (1990):
Specifying real-time properties with metric temporal logic.
Real-Time Systems 2(4),
pp. 255–299,
doi:10.1007/BF01995674.
Axel Legay, Benoît Delahaye & Saddek Bensalem (2010):
Statistical model checking: An overview.
In: International Conference on Runtime Verification.
Springer,
pp. 122–135,
doi:10.1007/978-3-642-16612-9_11.
D.B. Maksimov, I.A. Yakimov & Kuznetsov A.S. (2020):
Statistical model checking for blockchain-based applications.
In: IOP Conference Series: Materials Science and Engineering 734.
IOP Publishing,
pp. 012152,
doi:10.1088/1757-899X/734/1/012152.
Braham Lotfi Mediouni, Ayoub Nouri, Marius Bozga, Mahieddine Dellabani, Axel Legay & Saddek Bensalem (2018):
SBIP 2.0: Statistical Model Checking Stochastic Real-Time Systems.
In: International Symposium on Automated Technology for Verification and Analysis.
Springer,
pp. 536–542,
doi:10.1007/978-3-030-01090-4_33.
Satoshi Nakamoto (2008):
Bitcoin: A peer-to-peer electronic cash system.
Decentralized Business Review,
pp. 21260.
Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Kevin Kwiat & Aziz Mohaisen (2019):
Shocking Blockchains Memory with Unconfirmed Transactions: New DDoS Attacks and Countermeasures.
Blockchain for Distributed Systems Security,
pp. 205,
doi:10.1002/9781119519621.ch10.
Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang & Aziz Mohaisen (2019):
Exploring the attack surface of blockchain: A systematic overview.
arXiv preprint arXiv:1904.03487,
doi:10.1109/COMST.2020.2975999.
Rajeev Sobti & Ganesan Geetha (2012):
Cryptographic hash functions: a review.
International Journal of Computer Science Issues (IJCSI) 9(2),
pp. 461.