[12] Abraham, I., & Malkhi, D. (2017). The blockchain consensus layer and BFT. Bulletin of EATCS, 3(123).
[13] Cachin, C., & Vukolić, M. (2017). Blockchain consensus protocols in the wild. arXiv preprint arXiv:1707.01873
[14] A. H. H. Kabla et al., "Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review," in IEEE Access, vol. 10, pp. 71632-71655, 2022, doi: 10.1109/ACCESS.2022.3188637.
[15] Vyzovitis, D., Napora, Y., McCormick, D., Dias, D., & Psaras, Y. (2020). GossipSub: Attack-Resilient Message Propagation in the Filecoin and ETH2.0 Networks. arXiv. https://doi.org/10.48550/arXiv.2007.02754
[16] M. Cortes-Goicoechea and L. Bautista-Gomez, "Discovering the Ethereum2 P2P Network," 2021 Third International Conference on Blockchain Computing and Applications (BCCA), 2021, pp. 81-88, doi: 10.1109/BCCA53669.2021.9657041.
[17] Guangquan Xu, Bingjiang Guo, Chunhua Su, Xi Zheng, Kaitai Liang, Duncan S. Wong, Hao Wang, Am I eclipsed? A smart detector of eclipse attacks for Ethereum, Computers & Security, Volume 88, 2020,101604, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2019.101604.