The following publications are possibly variants of this publication:
- SDoS: Selfish Mining-Based Denial-of-Service AttackQiuhua Wang, Tianyu Xia, Dong Wang 0019, Yizhi Ren, Gongxun Miao, Kim-Kwang Raymond Choo. tifs, 17:3335-3349, 2022. [doi]
- IPBSM: An optimal bribery selfish mining in the presence of intelligent and pure attackersGuoyu Yang, Yilei Wang, Zhaojie Wang, Youliang Tian, Xiaomei Yu, Shouzhe Li. ijis, 35(11):1735-1748, 2020. [doi]
- RandSys: Thwarting Code Injection Attacks with System Service Interface RandomizationXuxian Jiang, Helen J. Wang, Dongyan Xu, Yi-Min Wang. srds 2007: 209-218 [doi]
- Optimal Denial-of-Service Attack Scheduling With Energy ConstraintHeng Zhang, Peng Cheng, Ling Shi, Jiming Chen. tac, 60(11):3023-3028, 2015. [doi]
- Denial-of-Service Attacks on Host-Based Generic UnpackersLimin Liu, Jiang Ming, Zhi Wang, Debin Gao, Chunfu Jia. icics 2009: 241-253 [doi]