2022
DOI: 10.37622/ijaer/17.2.2022.110-124
|View full text |Cite
|
Sign up to set email alerts
|

A Unified Approach to Fraudulent Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Only a limited portion of the network, known as its "peers," are accessible to each node. Every time a node wants to add a new transaction (Filliâtre and Paskevich 2013;Dutta et al 2022) to the chain, it sends copies of the transaction to all of its contemporaries, who then send copies to all of their contemporaries, and so forth. It spreads throughout the network in this way.…”
Section: Ethereummentioning
confidence: 99%
“…Only a limited portion of the network, known as its "peers," are accessible to each node. Every time a node wants to add a new transaction (Filliâtre and Paskevich 2013;Dutta et al 2022) to the chain, it sends copies of the transaction to all of its contemporaries, who then send copies to all of their contemporaries, and so forth. It spreads throughout the network in this way.…”
Section: Ethereummentioning
confidence: 99%
“…Only a limited portion of the network, known as its "peers," are accessible to each node. Every time a node wants to add a new transaction [34] [35] to the chain, it sends copies of the transaction to all of its contemporaries, who then send copies to all of their contemporaries, and so forth. It spreads throughout the network in this way.…”
Section: Ethereummentioning
confidence: 99%