Security Analysis of Distributed Ledgers and Blockchains through Agent-based Simulation Article Swipe
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2109.08358
In this paper we describe LUNES-Blockchain, an agent-based simulator of blockchains that relies on Parallel and Distributed Simulation (PADS) techniques to obtain high scalability. The software is organized as a multi-level simulator that permits to simulate a virtual environment, made of many nodes running the protocol of a specific Distributed Ledger Technology (DLT), such as the Bitcoin or the Ethereum blockchains. This virtual environment is executed on top of a lower-level Peer-to-Peer (P2P) network overlay, which can be structured based on different topologies and with a given number of nodes and edges. Functionalities at different levels of abstraction are managed separately, by different software modules and with different time granularity. This allows for accurate simulations, where (and when) it is needed, and enhances the simulation performance. Using LUNES-Blockchain, it is possible to simulate different types of attacks on the DLT. In this paper, we specifically focus on the P2P layer, considering the selfish mining, the 51% attack and the Sybil attack. For which concerns selfish mining and the 51% attack, our aim is to understand how much the hash-rate (i.e. a general measure of the processing power in the blockchain network) of the attacker can influence the outcome of the misbehaviour. On the other hand, in the filtering denial of service (i.e. Sybil Attack), we investigate which dissemination protocol in the underlying P2P network makes the system more resilient to a varying number of nodes that drop the messages. The results confirm the viability of the simulation-based techniques for the investigation of security aspects of DLTs.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/2109.08358
- https://arxiv.org/pdf/2109.08358
- OA Status
- green
- References
- 31
- Related Works
- 20
- OpenAlex ID
- https://openalex.org/W3199881330
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3199881330Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.2109.08358Digital Object Identifier
- Title
-
Security Analysis of Distributed Ledgers and Blockchains through Agent-based SimulationWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2021Year of publication
- Publication date
-
2021-09-17Full publication date if available
- Authors
-
Luca Serena, Gabriele D’Angelo, Stefano FerrettiList of authors in order
- Landing page
-
https://arxiv.org/abs/2109.08358Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/2109.08358Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2109.08358Direct OA link when available
- Concepts
-
Computer science, Scalability, Denial-of-service attack, Hash function, Distributed computing, Protocol (science), Peer-to-peer, Network topology, Network simulation, Software, Distributed hash table, Computer network, Computer security, Operating system, The Internet, Alternative medicine, Pathology, MedicineTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
31Number of works referenced by this work
- Related works (count)
-
20Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3199881330 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.2109.08358 |
| ids.doi | https://doi.org/10.48550/arxiv.2109.08358 |
| ids.mag | 3199881330 |
| ids.openalex | https://openalex.org/W3199881330 |
| fwci | |
| type | preprint |
| title | Security Analysis of Distributed Ledgers and Blockchains through Agent-based Simulation |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10270 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9997000098228455 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Blockchain Technology Applications and Security |
| topics[1].id | https://openalex.org/T10742 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9990000128746033 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Peer-to-Peer Network Technologies |
| topics[2].id | https://openalex.org/T10101 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9753000140190125 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Cloud Computing and Resource Management |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.787368893623352 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C48044578 |
| concepts[1].level | 2 |
| concepts[1].score | 0.7255213856697083 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q727490 |
| concepts[1].display_name | Scalability |
| concepts[2].id | https://openalex.org/C38822068 |
| concepts[2].level | 3 |
| concepts[2].score | 0.5809251666069031 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q131406 |
| concepts[2].display_name | Denial-of-service attack |
| concepts[3].id | https://openalex.org/C99138194 |
| concepts[3].level | 2 |
| concepts[3].score | 0.555382251739502 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q183427 |
| concepts[3].display_name | Hash function |
| concepts[4].id | https://openalex.org/C120314980 |
| concepts[4].level | 1 |
| concepts[4].score | 0.5546431541442871 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q180634 |
| concepts[4].display_name | Distributed computing |
| concepts[5].id | https://openalex.org/C2780385302 |
| concepts[5].level | 3 |
| concepts[5].score | 0.491150826215744 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q367158 |
| concepts[5].display_name | Protocol (science) |
| concepts[6].id | https://openalex.org/C534932454 |
| concepts[6].level | 2 |
| concepts[6].score | 0.4811362326145172 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q161410 |
| concepts[6].display_name | Peer-to-peer |
| concepts[7].id | https://openalex.org/C199845137 |
| concepts[7].level | 2 |
| concepts[7].score | 0.4426226317882538 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q145490 |
| concepts[7].display_name | Network topology |
| concepts[8].id | https://openalex.org/C139940560 |
| concepts[8].level | 2 |
| concepts[8].score | 0.43851983547210693 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q290036 |
| concepts[8].display_name | Network simulation |
| concepts[9].id | https://openalex.org/C2777904410 |
| concepts[9].level | 2 |
| concepts[9].score | 0.424391508102417 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q7397 |
| concepts[9].display_name | Software |
| concepts[10].id | https://openalex.org/C2780224649 |
| concepts[10].level | 3 |
| concepts[10].score | 0.4155791997909546 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q863506 |
| concepts[10].display_name | Distributed hash table |
| concepts[11].id | https://openalex.org/C31258907 |
| concepts[11].level | 1 |
| concepts[11].score | 0.40854060649871826 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[11].display_name | Computer network |
| concepts[12].id | https://openalex.org/C38652104 |
| concepts[12].level | 1 |
| concepts[12].score | 0.28362733125686646 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[12].display_name | Computer security |
| concepts[13].id | https://openalex.org/C111919701 |
| concepts[13].level | 1 |
| concepts[13].score | 0.18238314986228943 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[13].display_name | Operating system |
| concepts[14].id | https://openalex.org/C110875604 |
| concepts[14].level | 2 |
| concepts[14].score | 0.111898273229599 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[14].display_name | The Internet |
| concepts[15].id | https://openalex.org/C204787440 |
| concepts[15].level | 2 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q188504 |
| concepts[15].display_name | Alternative medicine |
| concepts[16].id | https://openalex.org/C142724271 |
| concepts[16].level | 1 |
| concepts[16].score | 0.0 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q7208 |
| concepts[16].display_name | Pathology |
| concepts[17].id | https://openalex.org/C71924100 |
| concepts[17].level | 0 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q11190 |
| concepts[17].display_name | Medicine |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.787368893623352 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/scalability |
| keywords[1].score | 0.7255213856697083 |
| keywords[1].display_name | Scalability |
| keywords[2].id | https://openalex.org/keywords/denial-of-service-attack |
| keywords[2].score | 0.5809251666069031 |
| keywords[2].display_name | Denial-of-service attack |
| keywords[3].id | https://openalex.org/keywords/hash-function |
| keywords[3].score | 0.555382251739502 |
| keywords[3].display_name | Hash function |
| keywords[4].id | https://openalex.org/keywords/distributed-computing |
| keywords[4].score | 0.5546431541442871 |
| keywords[4].display_name | Distributed computing |
| keywords[5].id | https://openalex.org/keywords/protocol |
| keywords[5].score | 0.491150826215744 |
| keywords[5].display_name | Protocol (science) |
| keywords[6].id | https://openalex.org/keywords/peer-to-peer |
| keywords[6].score | 0.4811362326145172 |
| keywords[6].display_name | Peer-to-peer |
| keywords[7].id | https://openalex.org/keywords/network-topology |
| keywords[7].score | 0.4426226317882538 |
| keywords[7].display_name | Network topology |
| keywords[8].id | https://openalex.org/keywords/network-simulation |
| keywords[8].score | 0.43851983547210693 |
| keywords[8].display_name | Network simulation |
| keywords[9].id | https://openalex.org/keywords/software |
| keywords[9].score | 0.424391508102417 |
| keywords[9].display_name | Software |
| keywords[10].id | https://openalex.org/keywords/distributed-hash-table |
| keywords[10].score | 0.4155791997909546 |
| keywords[10].display_name | Distributed hash table |
| keywords[11].id | https://openalex.org/keywords/computer-network |
| keywords[11].score | 0.40854060649871826 |
| keywords[11].display_name | Computer network |
| keywords[12].id | https://openalex.org/keywords/computer-security |
| keywords[12].score | 0.28362733125686646 |
| keywords[12].display_name | Computer security |
| keywords[13].id | https://openalex.org/keywords/operating-system |
| keywords[13].score | 0.18238314986228943 |
| keywords[13].display_name | Operating system |
| keywords[14].id | https://openalex.org/keywords/the-internet |
| keywords[14].score | 0.111898273229599 |
| keywords[14].display_name | The Internet |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:2109.08358 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | https://arxiv.org/pdf/2109.08358 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/2109.08358 |
| locations[1].id | mag:3199881330 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | arXiv (Cornell University) |
| locations[1].landing_page_url | https://arxiv.org/pdf/2109.08358.pdf |
| locations[2].id | doi:10.48550/arxiv.2109.08358 |
| locations[2].is_oa | True |
| locations[2].source.id | https://openalex.org/S4306400194 |
| locations[2].source.issn | |
| locations[2].source.type | repository |
| locations[2].source.is_oa | True |
| locations[2].source.issn_l | |
| locations[2].source.is_core | False |
| locations[2].source.is_in_doaj | False |
| locations[2].source.display_name | arXiv (Cornell University) |
| locations[2].source.host_organization | https://openalex.org/I205783295 |
| locations[2].source.host_organization_name | Cornell University |
| locations[2].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[2].license | |
| locations[2].pdf_url | |
| locations[2].version | |
| locations[2].raw_type | article |
| locations[2].license_id | |
| locations[2].is_accepted | False |
| locations[2].is_published | |
| locations[2].raw_source_name | |
| locations[2].landing_page_url | https://doi.org/10.48550/arxiv.2109.08358 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5004215838 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-7951-4682 |
| authorships[0].author.display_name | Luca Serena |
| authorships[0].countries | IT |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I9360294 |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering,, University of Bologna, Italy |
| authorships[0].institutions[0].id | https://openalex.org/I9360294 |
| authorships[0].institutions[0].ror | https://ror.org/01111rn36 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I9360294 |
| authorships[0].institutions[0].country_code | IT |
| authorships[0].institutions[0].display_name | University of Bologna |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Luca Serena |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Computer Science and Engineering,, University of Bologna, Italy |
| authorships[1].author.id | https://openalex.org/A5108167047 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-3690-6651 |
| authorships[1].author.display_name | Gabriele D’Angelo |
| authorships[1].countries | IT |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I9360294 |
| authorships[1].affiliations[0].raw_affiliation_string | University of Bologna |
| authorships[1].institutions[0].id | https://openalex.org/I9360294 |
| authorships[1].institutions[0].ror | https://ror.org/01111rn36 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I9360294 |
| authorships[1].institutions[0].country_code | IT |
| authorships[1].institutions[0].display_name | University of Bologna |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Gabriele D'Angelo |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | University of Bologna |
| authorships[2].author.id | https://openalex.org/A5075197029 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-1911-4708 |
| authorships[2].author.display_name | Stefano Ferretti |
| authorships[2].countries | IT |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I190397597 |
| authorships[2].affiliations[0].raw_affiliation_string | Department of Pure and Applied Sciences, University of Urbino Carlo Bo, Italy. |
| authorships[2].institutions[0].id | https://openalex.org/I190397597 |
| authorships[2].institutions[0].ror | https://ror.org/04q4kt073 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I190397597 |
| authorships[2].institutions[0].country_code | IT |
| authorships[2].institutions[0].display_name | University of Urbino |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | Stefano Ferretti |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Department of Pure and Applied Sciences, University of Urbino Carlo Bo, Italy. |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2109.08358 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Security Analysis of Distributed Ledgers and Blockchains through Agent-based Simulation |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T10270 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9997000098228455 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Blockchain Technology Applications and Security |
| related_works | https://openalex.org/W3199003929, https://openalex.org/W2946395961, https://openalex.org/W3011689243, https://openalex.org/W3165635758, https://openalex.org/W3188644915, https://openalex.org/W3091794339, https://openalex.org/W3195303141, https://openalex.org/W2981621566, https://openalex.org/W3114683094, https://openalex.org/W206159150, https://openalex.org/W3201056817, https://openalex.org/W158113361, https://openalex.org/W3159372789, https://openalex.org/W3175003254, https://openalex.org/W3048649243, https://openalex.org/W3182102133, https://openalex.org/W2157464603, https://openalex.org/W3204751774, https://openalex.org/W2156937700, https://openalex.org/W3022036176 |
| cited_by_count | 0 |
| locations_count | 3 |
| best_oa_location.id | pmh:oai:arXiv.org:2109.08358 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2109.08358 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2109.08358 |
| primary_location.id | pmh:oai:arXiv.org:2109.08358 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | https://arxiv.org/pdf/2109.08358 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/2109.08358 |
| publication_date | 2021-09-17 |
| publication_year | 2021 |
| referenced_works | https://openalex.org/W2942805032, https://openalex.org/W3088446467, https://openalex.org/W2125434550, https://openalex.org/W3048334253, https://openalex.org/W2911884917, https://openalex.org/W3105041957, https://openalex.org/W3102217223, https://openalex.org/W2914835534, https://openalex.org/W2624958363, https://openalex.org/W2126087831, https://openalex.org/W1593596963, https://openalex.org/W2912091418, https://openalex.org/W2803579463, https://openalex.org/W2207823432, https://openalex.org/W2527773467, https://openalex.org/W2123483967, https://openalex.org/W2127024523, https://openalex.org/W3098532907, https://openalex.org/W2114058630, https://openalex.org/W2122044952, https://openalex.org/W3203500886, https://openalex.org/W2103863878, https://openalex.org/W2614658590, https://openalex.org/W2565274562, https://openalex.org/W2536325433, https://openalex.org/W2517167682, https://openalex.org/W2057248704, https://openalex.org/W2803943559, https://openalex.org/W2119245106, https://openalex.org/W2809597196, https://openalex.org/W2943517060 |
| referenced_works_count | 31 |
| abstract_inverted_index.a | 29, 36, 47, 69, 85, 180, 230 |
| abstract_inverted_index.In | 0, 140 |
| abstract_inverted_index.On | 201 |
| abstract_inverted_index.an | 6 |
| abstract_inverted_index.as | 28, 54 |
| abstract_inverted_index.at | 93 |
| abstract_inverted_index.be | 77 |
| abstract_inverted_index.by | 101 |
| abstract_inverted_index.in | 187, 205, 219 |
| abstract_inverted_index.is | 26, 64, 119, 129, 172 |
| abstract_inverted_index.it | 118, 128 |
| abstract_inverted_index.of | 9, 40, 46, 68, 88, 96, 135, 183, 191, 198, 209, 233, 244, 251, 254 |
| abstract_inverted_index.on | 13, 66, 80, 137, 146 |
| abstract_inverted_index.or | 57 |
| abstract_inverted_index.to | 20, 34, 131, 173, 229 |
| abstract_inverted_index.we | 3, 143, 214 |
| abstract_inverted_index.51% | 155, 168 |
| abstract_inverted_index.For | 161 |
| abstract_inverted_index.P2P | 148, 222 |
| abstract_inverted_index.The | 24, 239 |
| abstract_inverted_index.aim | 171 |
| abstract_inverted_index.and | 15, 83, 90, 105, 121, 157, 166 |
| abstract_inverted_index.are | 98 |
| abstract_inverted_index.can | 76, 194 |
| abstract_inverted_index.for | 112, 248 |
| abstract_inverted_index.how | 175 |
| abstract_inverted_index.our | 170 |
| abstract_inverted_index.the | 44, 55, 58, 123, 138, 147, 151, 154, 158, 167, 177, 184, 188, 192, 196, 199, 202, 206, 220, 225, 237, 242, 245, 249 |
| abstract_inverted_index.top | 67 |
| abstract_inverted_index.(and | 116 |
| abstract_inverted_index.DLT. | 139 |
| abstract_inverted_index.This | 61, 110 |
| abstract_inverted_index.drop | 236 |
| abstract_inverted_index.high | 22 |
| abstract_inverted_index.made | 39 |
| abstract_inverted_index.many | 41 |
| abstract_inverted_index.more | 227 |
| abstract_inverted_index.much | 176 |
| abstract_inverted_index.such | 53 |
| abstract_inverted_index.that | 11, 32, 235 |
| abstract_inverted_index.this | 1, 141 |
| abstract_inverted_index.time | 108 |
| abstract_inverted_index.with | 84, 106 |
| abstract_inverted_index.(P2P) | 72 |
| abstract_inverted_index.(i.e. | 179, 211 |
| abstract_inverted_index.DLTs. | 255 |
| abstract_inverted_index.Sybil | 159, 212 |
| abstract_inverted_index.Using | 126 |
| abstract_inverted_index.based | 79 |
| abstract_inverted_index.focus | 145 |
| abstract_inverted_index.given | 86 |
| abstract_inverted_index.hand, | 204 |
| abstract_inverted_index.makes | 224 |
| abstract_inverted_index.nodes | 42, 89, 234 |
| abstract_inverted_index.other | 203 |
| abstract_inverted_index.paper | 2 |
| abstract_inverted_index.power | 186 |
| abstract_inverted_index.types | 134 |
| abstract_inverted_index.when) | 117 |
| abstract_inverted_index.where | 115 |
| abstract_inverted_index.which | 75, 162, 216 |
| abstract_inverted_index.(DLT), | 52 |
| abstract_inverted_index.(PADS) | 18 |
| abstract_inverted_index.Ledger | 50 |
| abstract_inverted_index.allows | 111 |
| abstract_inverted_index.attack | 156 |
| abstract_inverted_index.denial | 208 |
| abstract_inverted_index.edges. | 91 |
| abstract_inverted_index.layer, | 149 |
| abstract_inverted_index.levels | 95 |
| abstract_inverted_index.mining | 165 |
| abstract_inverted_index.number | 87, 232 |
| abstract_inverted_index.obtain | 21 |
| abstract_inverted_index.paper, | 142 |
| abstract_inverted_index.relies | 12 |
| abstract_inverted_index.system | 226 |
| abstract_inverted_index.Bitcoin | 56 |
| abstract_inverted_index.aspects | 253 |
| abstract_inverted_index.attack, | 169 |
| abstract_inverted_index.attack. | 160 |
| abstract_inverted_index.attacks | 136 |
| abstract_inverted_index.confirm | 241 |
| abstract_inverted_index.general | 181 |
| abstract_inverted_index.managed | 99 |
| abstract_inverted_index.measure | 182 |
| abstract_inverted_index.mining, | 153 |
| abstract_inverted_index.modules | 104 |
| abstract_inverted_index.needed, | 120 |
| abstract_inverted_index.network | 73, 223 |
| abstract_inverted_index.outcome | 197 |
| abstract_inverted_index.permits | 33 |
| abstract_inverted_index.results | 240 |
| abstract_inverted_index.running | 43 |
| abstract_inverted_index.selfish | 152, 164 |
| abstract_inverted_index.service | 210 |
| abstract_inverted_index.varying | 231 |
| abstract_inverted_index.virtual | 37, 62 |
| abstract_inverted_index.Attack), | 213 |
| abstract_inverted_index.Ethereum | 59 |
| abstract_inverted_index.Parallel | 14 |
| abstract_inverted_index.accurate | 113 |
| abstract_inverted_index.attacker | 193 |
| abstract_inverted_index.concerns | 163 |
| abstract_inverted_index.describe | 4 |
| abstract_inverted_index.enhances | 122 |
| abstract_inverted_index.executed | 65 |
| abstract_inverted_index.network) | 190 |
| abstract_inverted_index.overlay, | 74 |
| abstract_inverted_index.possible | 130 |
| abstract_inverted_index.protocol | 45, 218 |
| abstract_inverted_index.security | 252 |
| abstract_inverted_index.simulate | 35, 132 |
| abstract_inverted_index.software | 25, 103 |
| abstract_inverted_index.specific | 48 |
| abstract_inverted_index.different | 81, 94, 102, 107, 133 |
| abstract_inverted_index.filtering | 207 |
| abstract_inverted_index.hash-rate | 178 |
| abstract_inverted_index.influence | 195 |
| abstract_inverted_index.messages. | 238 |
| abstract_inverted_index.organized | 27 |
| abstract_inverted_index.resilient | 228 |
| abstract_inverted_index.simulator | 8, 31 |
| abstract_inverted_index.viability | 243 |
| abstract_inverted_index.Simulation | 17 |
| abstract_inverted_index.Technology | 51 |
| abstract_inverted_index.blockchain | 189 |
| abstract_inverted_index.processing | 185 |
| abstract_inverted_index.simulation | 124 |
| abstract_inverted_index.structured | 78 |
| abstract_inverted_index.techniques | 19, 247 |
| abstract_inverted_index.topologies | 82 |
| abstract_inverted_index.underlying | 221 |
| abstract_inverted_index.understand | 174 |
| abstract_inverted_index.Distributed | 16, 49 |
| abstract_inverted_index.abstraction | 97 |
| abstract_inverted_index.agent-based | 7 |
| abstract_inverted_index.blockchains | 10 |
| abstract_inverted_index.considering | 150 |
| abstract_inverted_index.environment | 63 |
| abstract_inverted_index.investigate | 215 |
| abstract_inverted_index.lower-level | 70 |
| abstract_inverted_index.multi-level | 30 |
| abstract_inverted_index.separately, | 100 |
| abstract_inverted_index.Peer-to-Peer | 71 |
| abstract_inverted_index.blockchains. | 60 |
| abstract_inverted_index.environment, | 38 |
| abstract_inverted_index.granularity. | 109 |
| abstract_inverted_index.performance. | 125 |
| abstract_inverted_index.scalability. | 23 |
| abstract_inverted_index.simulations, | 114 |
| abstract_inverted_index.specifically | 144 |
| abstract_inverted_index.dissemination | 217 |
| abstract_inverted_index.investigation | 250 |
| abstract_inverted_index.misbehaviour. | 200 |
| abstract_inverted_index.Functionalities | 92 |
| abstract_inverted_index.simulation-based | 246 |
| abstract_inverted_index.LUNES-Blockchain, | 5, 127 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 3 |
| citation_normalized_percentile |