
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Achieving optimal rewards in cryptocurrency stubborn mining with state transition analysis
Yiting Zhang, Minghao Zhao, Tao Li, et al.
Information Sciences (2023) Vol. 625, pp. 299-313
Closed Access | Times Cited: 7
Yiting Zhang, Minghao Zhao, Tao Li, et al.
Information Sciences (2023) Vol. 625, pp. 299-313
Closed Access | Times Cited: 7
Showing 7 citing articles:
Energy consumption by cryptocurrency: A bibliometric analysis revealing research trends and insights
V. Anandhabalaji, M. Babu, R. Brintha
Energy Nexus (2024) Vol. 13, pp. 100274-100274
Open Access | Times Cited: 10
V. Anandhabalaji, M. Babu, R. Brintha
Energy Nexus (2024) Vol. 13, pp. 100274-100274
Open Access | Times Cited: 10
Hieraledger: Towards malicious gateways in appendable-block blockchain constructions for IoT
Arthur Sandor Voundi Koe, Shan Ai, Qi Chen, et al.
Information Sciences (2023) Vol. 632, pp. 87-104
Closed Access | Times Cited: 10
Arthur Sandor Voundi Koe, Shan Ai, Qi Chen, et al.
Information Sciences (2023) Vol. 632, pp. 87-104
Closed Access | Times Cited: 10
A Detection Method Against Selfish Mining-Like Attacks Based on Ensemble Deep Learning in IoT
Yilei Wang, Chunmei Li, Yiting Zhang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 19564-19574
Closed Access | Times Cited: 2
Yilei Wang, Chunmei Li, Yiting Zhang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 19564-19574
Closed Access | Times Cited: 2
Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-Like Blockchains? Quantitative Analysis
Haoran Zhu, Xiaolin Chang, Jelena Mišić, et al.
IEEE Transactions on Services Computing (2024) Vol. 17, Iss. 5, pp. 2488-2501
Open Access | Times Cited: 1
Haoran Zhu, Xiaolin Chang, Jelena Mišić, et al.
IEEE Transactions on Services Computing (2024) Vol. 17, Iss. 5, pp. 2488-2501
Open Access | Times Cited: 1
Researcheson Security Issues of L-Stubborn Strategies in the Blockchain System
超 黄
Modeling and Simulation (2024) Vol. 13, Iss. 01, pp. 576-587
Closed Access
超 黄
Modeling and Simulation (2024) Vol. 13, Iss. 01, pp. 576-587
Closed Access
Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption
Ming Liu, Mingyue Zhang, Guangshun Li, et al.
Lecture notes in computer science (2024), pp. 107-125
Closed Access
Ming Liu, Mingyue Zhang, Guangshun Li, et al.
Lecture notes in computer science (2024), pp. 107-125
Closed Access
Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network
Haoran Zhu, Xiaolin Chang, Jelena Mišić, et al.
IEEE Transactions on Network Science and Engineering (2023) Vol. 11, Iss. 3, pp. 2586-2595
Open Access
Haoran Zhu, Xiaolin Chang, Jelena Mišić, et al.
IEEE Transactions on Network Science and Engineering (2023) Vol. 11, Iss. 3, pp. 2586-2595
Open Access