[1] S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf
[2] S. Singh et al., Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network, IEEE Access, vol. 9, pp. 13938–13959, 2021. [Online]. Available: https://doi.org/10.1109/ACCESS.2021.3051602
[3] C. D. Morar and D. E. Popescu, A Survey of Blockchain Applicability, Challenges, and Key Threats, Computers, vol. 13, no. 9, p. 223, Sept. 2024. [Online]. Available: https://doi.org/10.3390/computers13090223
[4] J. Liu and J. Wu, A Comprehensive Survey on Blockchain Technology and Its Applications, Highlights in Science, Engineering and Technology, vol. 85, pp. 128–138, Mar. 2024. [Online]. Available: https://doi.org/10.54097/r0ggyr24
[5] L. Wang et al., Security and Privacy Issues in Blockchain and Its Applications, IET Blockchain, vol. 3, no. 4, pp. 169–171, Dec. 2023. [Online]. Available: https://doi.org/10.1049/blc2.12051
[6] X. Li et al., Blockchain Security Threats and Collaborative Defense: A Literature Review, Computers, Materials & Continua, vol. 76, no. 3, pp. 2597–2629, 2023. [Online]. Available:
https://doi.org/10.32604/cmc.2023.040596
[7] R. Chaganti et al., A Survey on Blockchain Solutions in DDoS Attacks Mitigation: Techniques, Open Challenges and Future Directions, Computer Communications, vol. 197, pp. 96–112, Jan. 2023. [Online]. Available: https://doi.org/10.1016/j.comcom.2022.10.026
[8] M. Conti et al., A Survey on Security and Privacy Issues of Bitcoin, IEEE Communications Surveys & Tutorials, vol. 20, no. 4, pp. 3416–3452, 2018. [Online]. Available: https://doi.org/10.1109/COMST.2018.2842460
[9] R. Chaganti et al., A Comprehensive Review of Denial of Service Attacks in Blockchain Ecosystem and Open Challenges, IEEE Access, vol.10, pp. 96538–96555, 2022. [Online]. Available:
https://doi.org/10.1109/ACCESS.2022.3205019
[10] P. Kamboj et al., Detection Techniques of DDoS Attacks: A Survey, in Proc. IEEE UPCON, 2017, pp. 675–679. [Online]. Available: https://doi.org/10.1109/UPCON.2017.8251130
[11] B. Ilyas et al., Prevention of DDoS Attacks Using an Optimized Deep Learning Approach in Blockchain Technology, Trans. Emerging Telecommunications Technologies, vol. 34, no. 4, p. e4729, Apr. 2023. [Online]. Available: https://doi.org/10.1002/ett.4729
[12] R. Jmal et al., Distributed Blockchain-SDN Secure IoT System Based on ANN to Mitigate DDoS Attacks, Applied Sciences, vol. 13, no. 8, p. 4953, Apr. 2023. [Online]. Available: https://doi.org/10.3390/app13084953
[13] A. A. Abdullah and S. A. Hussein, Detection and Mitigation Distribution Denial of Service Attack Based on Blockchain Concept, Ing´enierie Des Syst`emes d’Information, vol. 29, no. 3, pp. 1043–1049, Jun. 2024. [Online]. Available: https://doi.org/10.18280/isi.290322
[14] X. Li et al., An Adaptive DDoS Detection and Classification Method in Blockchain Using an Integrated Multi-Models, Computers, Materials & Continua, vol. 77, no. 3, pp. 3265–3288, 2023. [Online]. Available: https://doi.org/10.32604/cmc.2023.045588
[15] Kavitha and Ramalakshmi, Machine Learning-Based DDOS Attack Detection and Mitigation in SDNs for IoT Environments, Journal of the Franklin Institute, vol. 361, no. 17, p. 107197, Nov. 2024. [Online]. Available: https://doi.org/10.1016/j.jfranklin.2024.107197
[16] V. Hnamte et al., DDoS Attack Detection and Mitigation Using Deep Neural Network in SDN Environment, Computers & Security, vol. 138, p. 103661, Mar. 2024. [Online]. Available: https://doi.org/10.1016/j.cose.2023.103661
[17] Z. Shah et al., Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey, Sensors, vol. 22, no. 3, p. 1094, Jan. 2022. [Online]. Available: https://doi.org/10.3390/s22031094
[18] S. Wani et al., Distributed Denial of Service (DDoS) Mitigation Using Blockchain—A Comprehensive Insight, Symmetry, vol. 13, no. 2, p. 227, Jan. 2021. [Online]. Available: https://doi.org/10.3390/sym13020227
[19] V. Jacobson, Congestion Avoidance and Control, ACM SIGCOMM Computer Communication Review, vol. 18, no. 4, pp. 314–329, Aug. 1988. [Online]. Available: https://doi.org/10.1145/52325.52356
[20] S. Ha et al., CUBIC: A New TCP-Friendly High-Speed TCP Variant, ACM SIGOPS Operating Systems Review, vol. 42, no. 5, pp. 64–74, Jul. 2008. [Online]. Available: https://doi.org/10.1145/1400097.1400105
[21] M. H. Ali and S. ¨ Ozt¨urk, Efficient Congestion Control in Communications Using Novel Weighted Ensemble Deep Reinforcement Learning, Computers and Electrical Engineering, vol. 110, p. 108811, Sep. 2023. [Online]. Available: https://doi.org/10.1016/j.compeleceng.2023.108811
[22] A. Kumar et al., Adaptive Contention Window Design Using Deep QLearning, arXiv, 2020. [Online]. Available: https://doi.org/10.48550/ARXIV.2011.09418
[23] H. K. Molia, Reinforcement Learning Based Adaptive Congestion Control for TCP over Wireless Networks, Int. J. of Computer Networks and Applications, vol. 11, no. 5, pp. 607–616, Oct. 2024. [Online]. Available: https://doi.org/10.22247/ijcna/2024/39
[24] J. Xing and M. Shahzad, A Reinforcement Learning Framework for Application-Specific TCP Congestion-Control, arXiv, 2025. [Online]. Available: https://doi.org/10.48550/ARXIV.2505.07042
[25] N. Gogoli et al., Shrew DDoS Attack Detection Based on Statistical Analysis, The ISC International Journal of Information Security, no. Online First, Jun. 2024. [Online]. Available:
https://doi.org/10.22042/isecure.2024.420803.1032
[26] B. Jang et al., Q-Learning Algorithms: A Comprehensive Classification and Applications, IEEE Access, vol. 7, pp. 133653–133667, 2019. [Online]. Available: https://doi.org/10.1109/ACCESS.2019.2941229
[27] S. Floyd and V. Jacobson, Random Early Detection Gateways for Congestion Avoidance, IEEE/ACM Trans. on Networking, vol. 1, no. 4, pp. 397–413, Aug. 1993. [Online]. Available: https://doi.org/10.1109/90.251892
[28] K. Fall and S. Floyd, Simulation-Based Comparisons of Tahoe, Reno and SACK TCP, ACM SIGCOMM Computer Communication Review, vol. 26, no. 3, pp. 5–21, Jul. 1996. [Online]. Available: https://doi.org/10.1145/235160.235162