{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:16:35Z","timestamp":1743048995511,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030878719"},{"type":"electronic","value":"9783030878726"}],"license":[{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-87872-6_1","type":"book-chapter","created":{"date-parts":[[2021,9,21]],"date-time":"2021-09-21T04:02:39Z","timestamp":1632196959000},"page":"3-12","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Fast Heterogeneous Approach to\u00a0Enhanced Blockchain Attack Resilience and Mitigation"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8732-1645","authenticated-orcid":false,"given":"Ciprian","family":"Pungila","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7133-572X","authenticated-orcid":false,"given":"Viorel","family":"Negru","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,22]]},"reference":[{"key":"1_CR1","unstructured":"Nakamoto, S.: Bitcoin whitepaper (2009). https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"1_CR2","unstructured":"CoinMarketCap. All Cryptocurrencies. https:\/\/coinmarketcap.com\/all\/views\/all\/. Accessed 15 Feb 2019"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Zile, K., Renate, S.: Blockchain use cases and their feasibility. Appl. Comput. Syst. 23(1), 12\u201320 (2018)","DOI":"10.2478\/acss-2018-0002"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Holbl, M., et al.: A systematic review of the use of blockchain in healthcare. Symmetry 10(10), 470 (2018)","DOI":"10.3390\/sym10100470"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Ko, T., et al.: Blockchain technology and manufacturing industry: real-time transparency and cost savings. Sustainability 10, 4274 (2018)","DOI":"10.3390\/su10114274"},{"key":"1_CR6","unstructured":"PwC Report: Blockchain: the next innovation to make our cities smarter (2018). https:\/\/www.pwc.in\/assets\/pdfs\/publications\/2018\/blockchain-the-next-innovation-to-make-our-cities-smarter.pdf"},{"key":"1_CR7","unstructured":"DH Network: Blockchain for the humanitarian sector: future opportunities (2016)"},{"key":"1_CR8","unstructured":"Wood, G.: Ethereum: a secure decentralized generalised transaction ledger (2015). https:\/\/gavwood.com\/paper.pdf"},{"key":"1_CR9","unstructured":"Merkle, R.: Method of providing digital signatures. Patent, Patent US4309569A (1979). https:\/\/patents.google.com\/patent\/US4309569"},{"key":"1_CR10","unstructured":"EOS: EOSIO: blockchain software architecture. https:\/\/eos.io\/. Accessed 12 Feb 2020"},{"key":"1_CR11","unstructured":"TRON: TRON\u2014Decentralize the Web. https:\/\/tron.network\/. Accessed 12 Feb 2020"},{"key":"1_CR12","unstructured":"Mirkin, M., et al.: https:\/\/arxiv.org\/ftp\/arxiv\/papers\/1912\/1912.07497.pdf. Accessed 23 Apr 2020"},{"key":"1_CR13","unstructured":"Double-spending: Double-spending digital currency. https:\/\/en.wikipedia.org\/wiki\/Double-spending. Accessed 12 Feb 2020"},{"key":"1_CR14","unstructured":"Blockchain Denial of Service: BDoS: Blockchain Denial of Service. https:\/\/medium.com\/coinmonks\/bdos-blockchain-denial-of-service-385c8c56b401. Accessed 12 Feb 2020"},{"key":"1_CR15","unstructured":"NVIDIA: NVIDIA CUDA Compute Unified Device Architecture Programming Guide, version 4.1. http:\/\/developer.download.nvidia.com\/compute\/DevZone\/ docs\/html\/C\/doc\/CUDA_C_Programming_Guide.pdf"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Pungila, C., Negru, V.: A highly-efficient memory-compression approach for GPU-accelerated virus signature matching. In: Information Security Conference (ISC) (2012)","DOI":"10.1007\/978-3-642-33383-5_22"},{"key":"1_CR17","doi-asserted-by":"publisher","unstructured":"Pungila, C., Negru, V.: Real-time polymorphic Aho-Corasick automata for heterogeneous malicious code detection. In: Herrero, \u00c1., et al. (eds.) International Joint Conference SOCO\u201913-CISIS\u201913-ICEUTE\u201913. Advances in Intelligent Systems and Computing, vol. 239, pp. 439\u2013448. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-01854-6_45","DOI":"10.1007\/978-3-319-01854-6_45"},{"key":"1_CR18","unstructured":"BloxHIVE: The BloxHIVE Project. https:\/\/bloxhive.com"}],"container-title":["Advances in Intelligent Systems and Computing","14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87872-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,22]],"date-time":"2022-01-22T07:03:09Z","timestamp":1642834989000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87872-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,22]]},"ISBN":["9783030878719","9783030878726"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87872-6_1","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2021,9,22]]},"assertion":[{"value":"22 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIS - ICEUTE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computational Intelligence in Security for Information Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bilbao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisis-spain2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.iceuteconference.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}