{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T13:48:26Z","timestamp":1762609706385,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T00:00:00Z","timestamp":1697760000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T00:00:00Z","timestamp":1697760000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,20]]},"DOI":"10.1109\/icct59356.2023.10419806","type":"proceedings-article","created":{"date-parts":[[2024,2,12]],"date-time":"2024-02-12T18:50:22Z","timestamp":1707763822000},"page":"1231-1236","source":"Crossref","is-referenced-by-count":2,"title":["Eclipse Attack Defense Method Based on Distributed Storage and Reference Value System"],"prefix":"10.1109","author":[{"given":"Li","family":"Lin","sequence":"first","affiliation":[{"name":"National Computer Network Emergency Response Technical, Team\/Coordination Center of China,Beijing,China"}]},{"given":"Fu","family":"Yiming","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, Beijing Information Science and Technology University,Beijing,China"}]},{"given":"Wang","family":"Tao","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, Beijing Information Science and Technology University,Beijing,China"}]},{"given":"Zhao","family":"Haili","sequence":"additional","affiliation":[{"name":"Changan Communication Technology Co., LTD,Beijing,China"}]},{"given":"Mi","family":"Rongxin","sequence":"additional","affiliation":[{"name":"National Computer Network Emergency Response Technical, Team\/Coordination Center of China,Beijing,China"}]},{"given":"Liu","family":"Zhicheng","sequence":"additional","affiliation":[{"name":"National Computer Network Emergency Response Technical, Team\/Coordination Center of China,Beijing,China"}]},{"given":"Chen","family":"Zixuan","sequence":"additional","affiliation":[{"name":"National Computer Network Emergency Response Technical, Team\/Coordination Center of China,Beijing,China"}]},{"given":"Feng","family":"Hao","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, Beijing Information Science and Technology University,Beijing,China"}]},{"given":"Xiao","family":"Yvchi","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, Beijing Information Science and Technology University,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SIN56466.2022.9970533"},{"issue":"1","key":"ref2","first-page":"206","article-title":"Security problems on blockchain: the state of the art and future trends","volume":"45","author":"Han","year":"2019","journal-title":"Acta Automatica Sinica"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2020.101284"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5152\/electrica.2020.19090"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16161-2_27"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC51069.2021.9461081"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2019.08.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-5566-4_34"},{"journal-title":"Blockchain and New Age Security Attacks You Should Know","year":"2021","author":"Aruba","key":"ref9"},{"volume-title":"Bitcoin Eclipse Attack-Statistic Analysis on Selfish Mining and Double-Spending Attack","year":"2019","author":"Mufleh","key":"ref10"},{"key":"ref11","first-page":"129","article-title":"Eclipse attacks on bitcoins peer-to-peer network","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Heilman"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345649"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2018.8556790"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101604"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2967861"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3069502"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2014.19"},{"key":"ref18","article-title":"De centralized lightweight detection of eclipse attacks on bitcoin clients","volume":"abs\/2007. 02287","author":"Alangot","year":"2020","journal-title":"CoRR"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2015.36"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00027"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.19"}],"event":{"name":"2023 IEEE 23rd International Conference on Communication Technology (ICCT)","start":{"date-parts":[[2023,10,20]]},"location":"Wuxi, China","end":{"date-parts":[[2023,10,22]]}},"container-title":["2023 IEEE 23rd International Conference on Communication Technology (ICCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10419380\/10419200\/10419806.pdf?arnumber=10419806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T00:51:37Z","timestamp":1710377497000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10419806\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,20]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icct59356.2023.10419806","relation":{},"subject":[],"published":{"date-parts":[[2023,10,20]]}}}