Methods of identifying unauthorized customers in cryptocurrency mining of distribution networks-a review

1Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper reviews the methods to identify unauthorized cryptocurrency mining customers in distribution networks. Hence, various methods and models were compared. Also, the research conducted in the field of cryptocurrencies was evaluated in the four categories of energy, pollution, theft, and mining.

Cite

CITATION STYLE

APA

Najafzadeh, M., & Gholami, M. (2022). Methods of identifying unauthorized customers in cryptocurrency mining of distribution networks-a review. In Proceedings - 2022 8th International Iranian Conference on Signal Processing and Intelligent Systems, ICSPIS 2022. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ICSPIS56952.2022.10043878

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free