References
- Alone, S., Capstone, O., & Model, C. (2006, February 1–22). Technical Reference.
- Appel, A. W. (2015). Verification of a cryptographic primitive: SHA-256 (abstract). In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI) (Vols. 2015-June, Issue 2). https://doi.org/https://doi.org/10.1145/2737924.2774972
- Aung, Y. N., & Tantidham, T. (2017). Review of Ethereum: Smart home case study. Proceeding of 2017 2nd International Conference on Information Technology, INCIT 2017, 2018-Janua, 1–4. https://doi.org/https://doi.org/10.1109/INCIT.2017.8257877
- Bach, L. M., Mihaljevic, B., & Zagar, M. (2018). Comparative analysis of blockchain consensus algorithms. 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2018 – Proceedings (pp. 1545–1550). https://doi.org/https://doi.org/10.23919/MIPRO.2018.8400278
- Badrinath, N., Gopinath, G., Ravichandran, K. S., & Soundhar, R. G. (2016). Estimation of automatic detection of erythemato-squamous diseases through AdaBoost and its hybrid classifiers. Artificial Intelligence Review, 45(4), 471–488. https://doi.org/https://doi.org/10.1007/s10462-015-9436-8
- Bartoletti, M., Lande, S., & Podda, A. S. (2017). A proof-of-stake protocol for consensus on bitcoin subchains. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10323 LNCS (pp. 568–584). https://doi.org/https://doi.org/10.1007/978-3-319-70278-0_36
- Bentov, I., Gabizon, A., & Mizrahi, A. (2016). Cryptocurrencies without proof of work. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9604 LNCS (240258) (pp. 142–157). https://doi.org/https://doi.org/10.1007/978-3-662-53357-4_10
- Castro, M., & Liskov, B. (2002). Practical Byzantine Fault Tolerance and Proactive Recovery. ACM Transactions on Computer Systems, 20(4), 398–461. https://doi.org/https://doi.org/10.1145/571637.571640
- Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the Internet of Things. IEEE Access, 4(1), 2292–2303. https://doi.org/https://doi.org/10.1109/ACCESS.2016.2566339
- Courtois, N. T. (2014). On the longest chain rule and programmed self-destruction of crypto currencies. 11(1), 1–89. http://arxiv.org/abs/1405.0534
- Dagar, R., Som, S., & Khatri, S. K. (2018). Smart farming - IoT in agriculture. Proceedings of the International Conference on Inventive Research in Computing Applications, ICIRCA 2018, Icirca (pp. 1052–1056). https://doi.org/https://doi.org/10.1109/ICIRCA.2018.8597264
- Du, M., Ma, X., Zhang, Z., Wang, X., & Chen, Q. (2017). A review on consensus algorithm of blockchain. 2017 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2017, 2017-Janua (pp. 2567–2572). https://doi.org/https://doi.org/10.1109/SMC.2017.8123011
- Fumera, G., & Roli, F. (2005). A theoretical and experimental analysis of linear combiners for multiple classifier systems. IEEE Transactions on Pattern Analysis and Machine Intelligence, 27(6), 942–956. https://doi.org/https://doi.org/10.1109/TPAMI.2005.109
- Gao, Y., & Nobuhara, H. (2017). A Proof Of Stake Sharding Protocol For Scalable Blockchains. Proceedings of the Asia-Pacific Advanced Network, 44(1), 13–16. https://journals.sfu.ca/apan/index.php/apan/article/view/225
- Gartner. (2018). Gartner Says Worldwide IoT Security Spending Will Reach $1.5 Billion in 2018. Gartner Newsroom. https://www.gartner.com/newsroom/id/3869181
- Gomes, H. M., Barddal, J. P., Enembreck, A. F., & Bifet, A. (2017). A survey on ensemble learning for data stream classification. ACM Computing Surveys, 50(2), 1–36. https://doi.org/https://doi.org/10.1145/3054925
- Haller, S., Karnouskos, S., & Schroth, C. (2009). The Internet of things in an enterprise context. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5468, pp, 14–28). https://doi.org/https://doi.org/10.1007/978-3-642-00985-3_2
- Heimerdinger, W. L., & Weinstock, C. B. (1992, October). A conceptual framework for system fault tolerance (Technical Report CMU/SEI-92-TR-33, ESC-TR-92-033). Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania.
- Huang, F., Xie, G., & Xiao, R. (2009). Research on ensemble learning. 2009 International Conference on Artificial Intelligence and Computational Intelligence, AICI 2009 (Vol. 3, pp. 249–252). https://doi.org/https://doi.org/10.1109/AICI.2009.235
- Hyperledger. (2019) . Hyperledger – Open source blockchain technologies.
- Kakavand, H., Kost De Sevres, N., & Chilton, B. (2017). The blockchain revolution: An analysis of regulation and technology related to distributed ledger technologies. SSRN Electronic Journal, 1–27. https://doi.org/https://doi.org/10.2139/ssrn.2849251
- Kassab, M., Defranco, J. F., & Voas, J. (2018). Smarter Education. IT Professional, 20(5), 20–24. https://doi.org/https://doi.org/10.1109/MITP.2018.053891333
- Kaushal, P. K., Bagga, A., & Sobti, R. (2017). Evolution of bitcoin and security risk in bitcoin wallets. 2017 International Conference on Computer, Communications and Electronics, COMPTELIX 2017 (pp. 172–177). https://doi.org/https://doi.org/10.1109/COMPTELIX.2017.8003959
- Kilicoglu, A. G., Bahali, K., Canpolat, N., Bilgic, A., Mutlu, C., Yalçın, Ö., Pehlivan, G., & Sever, L. (2016). Impact of end-stage renal disease on psychological status and quality of life. Pediatrics International, 58(12), 1316–1321. https://doi.org/https://doi.org/10.1111/ped.13026
- Kornmesser, S. (2008). Theoretizität im logischen empirismus und im strukturalismus - Erläutert am fallbeispiel des neurobiologischen konstruktivismus. Journal for General Philosophy of Science, 39(1), 53–67. https://doi.org/https://doi.org/10.1007/s10838-008-9062-0
- Korytkowski, M., Rutkowski, L., & Scherer, R. (2016). Fast image classification by boosting fuzzy classifiers. Information Sciences, 327(1), 175–182. https://doi.org/https://doi.org/10.1016/j.ins.2015.08.030
- Kshetri, N. (2017). Can blockchain strengthen the Internet of Things? IT Professional, 19(4), 68–72. https://doi.org/https://doi.org/10.1109/MITP.2017.3051335
- Kumar, N. (2018). IoT architecture and system design for healthcare systems. Proceedings of the 2017 international conference on smart technology for smart nation, SmartTechCon 2017 (pp. 1118–1123). https://doi.org/https://doi.org/10.1109/SmartTechCon.2017.8358543
- Kumar, N. M., Goel, S., & Mallick, P. K. (2018). Smart cities in India: Features, policies, current status, and challenges. International conference on technologies for smart city energy security and power: Smart solutions for smart cities, ICSESP 2018 - Proceedings, 2018-Janua (pp. 1–4). https://doi.org/https://doi.org/10.1109/ICSESP.2018.8376669
- Kuncheva, L. I., & Rodríguez, J. J. (2014). A weighted voting framework for classifiers ensembles. Knowledge and Information Systems, 38(2), 259–275. https://doi.org/https://doi.org/10.1007/s10115-012-0586-6
- Lamport, L. (1983). The weak byzantine generals problem. Journal of the ACM (JACM), 30(3), 668–676. https://doi.org/https://doi.org/10.1145/2402.322398
- Lamport, L., Shostak, R., & Pease, M. (1982). The byzantine generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS), 4(3), 382–401. https://doi.org/https://doi.org/10.1145/357172.357176
- Lee, C. H., & Kim, K. H. (2018). Implementation of IoT system using block chain with authentication and data protection. International conference on information networking, 2018-Janua (pp. 936–940). https://doi.org/https://doi.org/10.1109/ICOIN.2018.8343261
- Leo, M., Battisti, F., Carli, M., & Neri, A. (2014). A federated architecture approach for Internet of Things security. 2014 Euro med telco conference - From network infrastructures to network fabric: Revolution at the Edges, EMTC 2014. https://doi.org/https://doi.org/10.1109/EMTC.2014.6996632
- Li, R., & Wang, X. (2017). Self-adaptive weighted majority vote algorithm based on entropy. 2017 2nd Asia-Pacific Conference on Intelligent Robot Systems, ACIRS 2017 (pp. 73–77). https://doi.org/https://doi.org/10.1109/ACIRS.2017.7986068
- Littlestone, N., & Warmuth, M. K. (1994). The weighted majority algorithm. Information and Computation, 108(2), 212–261. https://doi.org/https://doi.org/10.1006/inco.1994.1009
- Liu, N., & Wang, H. (2010). Ensemble based extreme learning machine. IEEE Signal Processing Letters, 17(8), 754–757. https://doi.org/https://doi.org/10.1109/LSP.2010.2053356
- Milutinovic, M., He, W., Wu, H., & Kanwal, M. (2016). Proof of Luck: An efficient blockchain consensus protocol. SysTEX 2016-1st Workshop on System Software for Trusted Execution, Colocated with ACM/IFIP/USENIX Middleware 2016 (pp. 2–7). https://doi.org/https://doi.org/10.1145/3007788.3007790
- Mohammad, R. M. (2016). An ensemble self-structuring neural network approach to solving classification problems with virtual concept drift and its application to phishing websites. The University of Huddersfield, UK. http://eprints.hud.ac.uk/id/eprint/30188/
- Mohammad, R. M. A. (2019). An enhanced multiclass support vector machine model and its application to classifying file systems affected by a digital crime. Journal of King Saud University - Computer and Information Sciences, 1–12. https://doi.org/https://doi.org/10.1016/j.jksuci.2019.10.010
- Mohammad, R. M. A. (2020). An improved multi-class classification algorithm based on association classification approach and its application to spam emails. IAENG International Journal of Computer Science, 47(2), 187–198. http://www.iaeng.org/IJCS/issues_v47/issue_2/IJCS_47_2_07.pdf
- Mohammad, R. M. A., & Alqahtani, M. (2019). A comparison of machine learning techniques for file system forensics analysis. Journal of Information Security and Applications, 46(1), 53–61. https://doi.org/https://doi.org/10.1016/j.jisa.2019.02.009
- Naidu, V., Mudliar, K., Naik, A., & Bhavathankar, P. (2018). A fully observable supply chain management system using block chain and IOT. 2018 3rd international conference for convergence in technology, I2CT 2018 (pp. 1–4). https://doi.org/https://doi.org/10.1109/I2CT.2018.8529725
- Nguyen, G. T., & Kim, K. (2018). A survey about consensus algorithms used in Blockchain. Journal of Information Processing Systems, 14(1), 101–128. https://doi.org/https://doi.org/10.3745/JIPS.01.0024
- Niranjanamurthy, M., Nithya, B. N., & Jagannatha, S. (2019). Analysis of Blockchain technology: Pros, cons and SWOT. Cluster Computing, 22(2), 14743–14757. https://doi.org/https://doi.org/10.1007/s10586-018-2387-5
- Pahlajani, S., Kshirsagar, A., & Pachghare, V. (2019). Survey on private blockchain consensus algorithms. Proceedings of 1st International Conference on Innovations in Information and Communication Technology, ICIICT 2019 (pp. 1–6). https://doi.org/https://doi.org/10.1109/ICIICT1.2019.8741353
- Pascual Espada, J., Sanjuán Martínez, O., Pelayo G-Bustelo, B. C., & Cueva Lovelle, J. M. (2011). Virtual objects on the Internet of Things. International Journal of Interactive Multimedia and Artificial Intelligence, 1(4), 23. https://doi.org/https://doi.org/10.9781/ijimai.2011.144
- Quiroz, R., Doros, G., Shaw, P., Liang, C. S., Gauthier, D. F., & Sam, F. (2014). Comparison of characteristics and outcomes of patients with heart failure preserved ejection fraction versus reduced left ventricular ejection fraction in an urban cohort. American Journal of Cardiology, 113(4), 691–696. https://doi.org/https://doi.org/10.1016/j.amjcard.2013.11.014
- Rajsbaum, S. (2003). ACM SIGACT news distributed computing column 13. ACM SIGACT News, 34(4), 53–56. https://doi.org/https://doi.org/10.1145/954092.954102
- Reed, B., & Junqueira, F. P. (2009). A simple totally ordered broadcast protocol. ACM International Conference Proceeding Series, 341(2), 305–320. https://doi.org/https://doi.org/10.1145/1529974.1529978
- Sayeed, S., & Marco-Gisbert, H. (2019). Assessing blockchain consensus and security mechanisms against the 51% attack. Applied Sciences (Switzerland), 9(9), 9. https://doi.org/https://doi.org/10.3390/app9091788
- Schwartz, D., Youngs, N., & Britto, A. (2014). The Ripple protocol consensus algorithm. Ripple Labs Inc White Paper, 1–8. http://www.naation.com/ripple-consensus-whitepaper.pdf
- Shahaab, A., Lidgey, B., Hewage, C., & Khan, I. (2019). Applicability and appropriateness of distributed ledgers consensus protocols in public and private sectors: A systematic review. IEEE Access, 7(1), 43622–43636. https://doi.org/https://doi.org/10.1109/ACCESS.2019.2904181
- Simhon, E., & Starobinski, D. (2014). Advance reservation games and the price of conservatism. Performance Evaluation Review, 42(3), 34–37. https://doi.org/https://doi.org/10.1145/2695533.2695545
- Singh, M., Singh, A., & Kim, S. (2018). Blockchain: A game changer for securing IoT data. IEEE world forum on Internet of Things, WF-IoT 2018 - Proceedings, 2018-Janua (pp. 51–55). https://doi.org/https://doi.org/10.1109/WF-IoT.2018.8355182
- Singhal, B., Dhameja, G., & Panda, P. S. (2018). Beginning Blockchain. In Beginning Blockchain. https://doi.org/https://doi.org/10.1007/978-1-4842-3444-0
- Symbiont.io. (2020). https://symbiont.io/
- Thin, W. Y. M. M., Dong, N., Bai, G., & Dong, J. S. (2018). Formal analysis of a proof-of-stake blockchain. Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS, 2018-Decem (pp. 197–200). https://doi.org/https://doi.org/10.1109/ICECCS2018.2018.00031
- VMware, I. (2019). Windows VM | Workstation Pro | VMware. VMware.Com. https://www.vmware.com/mena/products/workstation-pro.html
- Wang, W., Hoang, D. T., Hu, P., Xiong, Z., Niyato, D., Wang, P., Wen, Y., & Kim, D. I. (2019). A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access, 7(1), 22328–22370. https://doi.org/https://doi.org/10.1109/ACCESS.2019.2896108
- Wang, X., Feng, L., & Zhao, H. (2019). Fast image encryption algorithm based on parallel computing system. Information Sciences, 486(1), 340–358. https://doi.org/https://doi.org/10.1016/j.ins.2019.02.049
- Wang, X., & Gao, S. (2020). Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Information Sciences, 539(1), 195–214. https://doi.org/https://doi.org/10.1016/j.ins.2020.06.030
- Wang, X., Teng, L., & Qin, X. (2012). A novel colour image encryption algorithm based on chaos. Signal Processing, 92(4), 1101–1108. https://doi.org/https://doi.org/10.1016/j.sigpro.2011.10.023
- Yu, Z., Liu, X. G., & Wang, G. (2019). A survey of consensus and incentive mechanism in blockchain derived from P2P. Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS, 2018-Decem, (pp. 1010–1015). https://doi.org/https://doi.org/10.1109/PADSW.2018.8645047
- Zhang, P., Schmidt, D. C., White, J., & Dubey, A. (2019). Consensus mechanisms and information security technologies. Advances in Computers, 115(1), 181–209. https://doi.org/https://doi.org/10.1016/bs.adcom.2019.05.001
- Zhang, X., Qin, R., Yuan, Y., & Wang, F. Y. (2019). An analysis of blockchain-based bitcoin mining difficulty: Techniques and principles. Proceedings 2018 Chinese Automation Congress, CAC 2018 (pp. 1184–1189). https://doi.org/https://doi.org/10.1109/CAC.2018.8623140
- Zhang, Y. Q., & Wang, X. Y. (2014). A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Information Sciences, 273(1), 329–351. https://doi.org/https://doi.org/10.1016/j.ins.2014.02.156
- Zhang, Z., Cheng, M., Cho, Y., Wang, C., Hsu, C., Chen, C., Shieh, S., & Fellow, I. (2014). IoT Security : Ongoing Challenges and Research Opportunities. IEEE. https://doi.org/https://doi.org/10.1109/SOCA.2014.58
- Zhang, Z. K., Cho, M. C. Y., Wang, C. W., Hsu, C. W., Chen, C. K., & Shieh, S. (2014). IoT security: Ongoing challenges and research opportunities. Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014 (pp. 230–234). https://doi.org/https://doi.org/10.1109/SOCA.2014.58
- Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). An overview of blockchain technology: Architecture, consensus, and future trends. Proceedings - 2017 IEEE 6th International Congress on Big Data, BigData Congress 2017 (pp. 557–564). https://doi.org/https://doi.org/10.1109/BigDataCongress.2017.85
- Zorzo, A. F., Nunes, H. C., Lunardi, R. C., Michelin, R. A., & Kanhere, S. S. (2019). Dependable IoT using blockchain-based technology. Proceedings - 8th Latin-American Symposium on Dependable Computing, LADC 2018 (pp. 1–19). https://doi.org/https://doi.org/10.1109/LADC.2018.00010