{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:11:27Z","timestamp":1730200287539,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/bigcomp.2019.8679303","type":"proceedings-article","created":{"date-parts":[[2019,4,5]],"date-time":"2019-04-05T03:03:38Z","timestamp":1554433418000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Node Scheduling: A Blockchain-Based Node Selection Approach on Sapiens Chain"],"prefix":"10.1109","author":[{"given":"Yue","family":"Wu","sequence":"first","affiliation":[]},{"given":"Zhongru","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Ruan","sequence":"additional","affiliation":[]},{"given":"Jinyu","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Binxing","family":"Fang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"On subversive miner strategies and block withholding attack in bitcoin digital currency","year":"2014","author":"courtois","key":"ref10"},{"journal-title":"Blockchain Blueprint for a New Economy","year":"2015","author":"swan","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2321422"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.08.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2008.38"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2011.6038670"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.6.7.990-998"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660379"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5220\/0005519503090315"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3210284.3219776"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2757955"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1093\/wentk\/9780199918096.001.0001","author":"singer","year":"2014","journal-title":"Cybersecurity and Cyberwar What Everyone Needs to Know"},{"journal-title":"Sapiens chain a blockchain-based cybersecurity framework","year":"0","author":"han","key":"ref6"},{"key":"ref5","article-title":"A novel multi-link integrated factor algorithm considering node trust degree for blockchain-based communication","volume":"11","author":"li","year":"2017","journal-title":"KSII Transactions on Internet & Information Systems"},{"key":"ref8","article-title":"It's time for a hard bitcoin fork","volume":"13","author":"eyal","year":"2014","journal-title":"Hacking Distributed"},{"key":"ref7","first-page":"481","article-title":"Blockchain: the state of the art and future trends","volume":"42","author":"yuan","year":"2016","journal-title":"ACTA Automatica Sinica"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2048028"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEE.2012.373"},{"journal-title":"Analysis of bitcoin pooled mining reward systems","year":"2011","author":"rosenfeld","key":"ref9"},{"key":"ref20","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401944"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2812176"}],"event":{"name":"2019 IEEE International Conference on Big Data and Smart Computing (BigComp)","start":{"date-parts":[[2019,2,27]]},"location":"Kyoto, Japan","end":{"date-parts":[[2019,3,2]]}},"container-title":["2019 IEEE International Conference on Big Data and Smart Computing (BigComp)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8671661\/8678915\/08679303.pdf?arnumber=8679303","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:09:31Z","timestamp":1657854571000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8679303\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/bigcomp.2019.8679303","relation":{},"subject":[],"published":{"date-parts":[[2019,2]]}}}