[1] Rejeb A, Rejeb K, Appolloni A, Jagtap S, Iranmanesh M, Alghamdi S, Alghamdi S, Alhasawi Y and Kayikci Y 2024 Internet of Things and Cyber- Physical Systems 4 1
[2] Huang G, Wu C, Hu Y and Guo C 2021 Chin. Phys. B 30 040706 doi: 10.1088/1674-1056/abe232
[3] Silvano , Wellington F and Roderval M 2020 Future Generation Computer Systems 112 307 doi: 10.1016/j.future.2020.05.047
[4] Chen Y, Sun B, Wang Y, Qiu Z and Li Y 2024 Mathematics 12 3391 doi: 10.3390/math12213391
[5] Chen Y, Guo Y, Wang M, Xu E, Xie H and Bie R 2023 IEEE Internet of Things Journal 11 1952 doi: 10.1109/JIOT.2023.3283788
[6] Press William H and Freeman Dyson J 2012 Proc. Natl. Acad. Sci. USA 109 10409 doi: 10.1073/pnas.1206569109
[7] Hu Q, Wang S, Cheng X, Ma L and Bie R 2019 IEEE Transactions on Information Forensics and Security 15 1778 doi: 10.1109/TIFS.10206
[8] Serguei P 2018 White Paper 1 30
[9] Popov S, Saa O and Finardi P 2019 Computers & Industrial Engineering 136 160
[10] Fan C, Ghaemi S, Khazaei H, Chen Y and Musilek P 2021 ACM Transactions on Modeling and Performance Evaluation of Computing Systems 6 1
[11]
[12] Shabandri B and Maheshwari P 2019 2019 6th International conference on signal processing and integrated networks Noida, India
[13]
[14] Brighente A, Conti M, Kumar G, Ghanbari R and Saha R 2021 2021 IEEE International Conference on Blockchain (Blockchain) Melbourne, Australia
[15] Ullah I, De Roode G, Meratnia N and Havinga P 2021 Sensors 21 1834 doi: 10.3390/s21051834
[16] Li Y, Cao B, Peng M, Zhang L, Zhang L, Feng D 2020 IEEE/ACM Transactions on Networking 28 1643
[17] Cullen A, Ferraro P, King C and Shorten R 2021 IEEE Internet of Things Journal 7 7112 doi: 10.1109/JIOT.2020.2983401
[18]
[19] Bu G, Gurcan O and Potop-Butucaru M 2019 IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops Paris, France
[20] Bu G, Hana W and Potop-Butucaru M 2020 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS) Paris, France
[21] Vries L J W 2019 IOTA vulnerability: Large weight attack performed in a network (University of Twente)
[22] Mauro C, Kumar G, Nerurkar P, Saha R and Vigneri L 2022 Journal of Network and Computer Applications 203 103383 doi: 10.1016/j.jnca.2022.103383
[23] Bramas Q 2021 The 9th International Conference on Networked Systems (NETYS 2021) Marrakech, Morocco
[24] Bhandary M, Parmar M and Ambawade D 2024 2020 5th International Conference on Communication and Electronics Systems (ICCES) Coimbatore, India
[25] Madenouei N A 2024 Exploring the scalability, throughput and security characteristics of the Tangle distributed ledger technology through simulation analysis (York University) Canada
[26] Chen Y, Guo Y, Wang Y and Bie R 2022 Mathematics 10 1108 doi: 10.3390/math10071108
[27] Shi H, Wang S, Hu Q, Cheng X, Zhang J and Yu J 2021 IEEE Transactions on Dependable and Secure Computing (IEEE TDSC) 18 1580
[28] Cao M 2020 Cooperation and Optimization of Mining Pool Game Based on PoW Consensus Algorithm (Zhejiang Normal University) Hangzhou
[29] Jiang Y 2021 Research on Blockchain Cooperative Mining Strategy Based on Game Theory (Southeast University) Nanjing
[30] Ueda M 2021 Royal Society Open Science 8 202186 doi: 10.1098/rsos.202186
[31] Zhao Q 2021 Research on Zero determinant Strategies and Networked Evolutionary Game Dynamics (University of Electronic Science and Technology of China) Chengdu
[32] Taha M A and Ghoneim A 2021 Chaos, Solitons & Fractals 152 111408
[33] Axelrod R and Hamilton W D 1981 Science 211 1390 doi: 10.1126/science.7466396
[34] Liu X, Wang W, Niyato D, Zhao N and Wang P 2018 IEEE Wireless Communications Letters 7 760 doi: 10.1109/LWC.2018.2820009
[35] Hu Q, Wang S, Ma L, Bie R and Cheng X 2017 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) Atlanta, GA, USA