1. (2021): Average time to mine a block in minutes.. Available at
  2. (2021): Bitcoin Monitoring.. Available at
  3. Tesnim Abdellatif & Kei-Leo Brousmiche (2018): Formal verification of smart contracts based on users and blockchain behaviors models. In: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE, pp. 1–5, doi:10.1109/NTMS.2018.8328737.
  4. Abhishta Abhishta, Roland van Rijswijk-Deij & Lambert JM Nieuwenhuis (2019): Measuring the impact of a successful DDoS attack on the customer behaviour of managed DNS service providers. ACM SIGCOMM Computer Communication Review 48(5), pp. 70–76, doi:10.1145/3310165.3310175.
  5. Gervais Arthur, Hubert Ritzdorf, Ghassan Karame & Srdjan Capkun (2015): Tampering with the delivery of blocks and transactions in bitcoin. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 692–705, doi:10.1145/2810103.2813655.
  6. Christel Baier & Joost-Pieter Katoen (2008): Principles of model checking. MIT press.
  7. Hsing-Chung Chen, Bambang Irawan, Chieh-Yang Shih, Cahya Damarjati, Zon-Yin Shae & Fengming Chang (2019): A Smart Contract to Facilitate Goods Purchasing Based on Online Haggle. In: International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. Springer, pp. 618–628, doi:10.1007/978-3-030-22263-5_58.
  8. Ivan Fedotov & Anton Khritankov (2021): SBIP models.
  9. Thomas Hérault, Richard Lassaigne, Frédéric Magniette & Sylvain Peyronnet (2004): Approximate probabilistic model checking. In: International Workshop on Verification, Model Checking, and Abstract Interpretation. Springer, pp. 73–84, doi:10.1007/978-3-319-06880-0_2.
  10. Amir Herzberg & Haya Shulman (2013): DNSSEC: Security and availability challenges. In: 2013 IEEE Conference on Communications and Network Security (CNS). IEEE, pp. 365–366, doi:10.1109/CNS.2013.6682730.
  11. Nicolas Houy (2014): The economics of Bitcoin transaction fees. GATE WP 1407, doi:10.2139/ssrn.2400519.
  12. Marie Huillet (2019): Report: Record-Breaking Coincheck Hack Perpetrated by Virus Tied to Russian Hackers. Available at
  13. Adnan Imeri, Nazim Agoulmine & Djamel Khadraoui (2020): Smart Contract modeling and verification techniques: A survey. In: 8th International Workshop on ADVANCEs in ICT Infrastructures and Services (ADVANCE 2020), pp. 1–8.
  14. Ghassan O Karame, Elli Androulaki & Srdjan Capkun (2012): Double-spending fast payments in bitcoin. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 906–917, doi:10.1145/2382196.2382292.
  15. Ron Koymans (1990): Specifying real-time properties with metric temporal logic. Real-Time Systems 2(4), pp. 255–299, doi:10.1007/BF01995674.
  16. Axel Legay, Benoît Delahaye & Saddek Bensalem (2010): Statistical model checking: An overview. In: International Conference on Runtime Verification. Springer, pp. 122–135, doi:10.1007/978-3-642-16612-9_11.
  17. D.B. Maksimov, I.A. Yakimov & Kuznetsov A.S. (2020): Statistical model checking for blockchain-based applications. In: IOP Conference Series: Materials Science and Engineering 734. IOP Publishing, pp. 012152, doi:10.1088/1757-899X/734/1/012152.
  18. Braham Lotfi Mediouni, Ayoub Nouri, Marius Bozga, Mahieddine Dellabani, Axel Legay & Saddek Bensalem (2018): SBIP 2.0: Statistical Model Checking Stochastic Real-Time Systems. In: International Symposium on Automated Technology for Verification and Analysis. Springer, pp. 536–542, doi:10.1007/978-3-030-01090-4_33.
  19. Satoshi Nakamoto (2008): Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, pp. 21260.
  20. Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Kevin Kwiat & Aziz Mohaisen (2019): Shocking Blockchains Memory with Unconfirmed Transactions: New DDoS Attacks and Countermeasures. Blockchain for Distributed Systems Security, pp. 205, doi:10.1002/9781119519621.ch10.
  21. Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang & Aziz Mohaisen (2019): Exploring the attack surface of blockchain: A systematic overview. arXiv preprint arXiv:1904.03487, doi:10.1109/COMST.2020.2975999.
  22. Rajeev Sobti & Ganesan Geetha (2012): Cryptographic hash functions: a review. International Journal of Computer Science Issues (IJCSI) 9(2), pp. 461.
  23. Joe Stewart (2005): DNS Cache Poisoning The Next Generation. Technical Report. Portland State University. Available at

Comments and questions to:
For website issues: