] Nofer, M.; Gomber, P.; Hinz, O.; Schiereck, D. “Blockchain ”; BIS 2017, 59, 183-187.
[2] Gupta, S. “Blockchain”; IBM Online (http://www. IBM. COM), 2017.
[3] Zheng, Z.; Xie, S.; Dai, H. N.; Chen, X.; Wang, H. “Blockchain Challenges and Opportunities: A Survey”; Int. J. Web. Grid. Serv. 2018, 14, 352-375.
[4] Nakamoto, S. “Bitcoin P2P E-Cash Paper”; The Cryptography Mailing List, 2008.
[5] Franco, P. “Understanding Bitcoin”; Wiley, 2014.
[6] Hopwood, D.; Bowe, S.; Hornby, T.; Wilcox, N. “Zcash Protocol Specification”; GitHub: San Francisco, CA, USA, 2016.
[7] Wood, G. “Ethereum: A Secure Decentralised Generalised Transaction Ledger”; Ethereum Project Yellow Paper, 2014, 151, 1-32.
[8] Cachin, C. “Architecture of the Hyperledger Blockchain Fabric”; DCCL 2016, 310, 4.
[9] Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Yellick, J. ”Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains”; Proc. Thirteenth EuroSy .Conf. 2018, 1-15.
[10] Olson, K.; Bowman, M.; Mitchell, J.; Amundson, S.; Middleton, D.; Montgomery, C. “Sawtooth: An Introduction”; The Linux Foundation, 2018.
[11] Dhillon, V.; Metcalf, D.; Hooper, M. “The Hyperledger Project”; Blockchain Enabled Applications, Apress, Berkeley, CA 2017, 139-149.
[12] Ashoor, A. S.; Gore, S. “Importance of Intrusion Detection System (IDS)”; J. Sci. Eng. Res. 2011, 2, 1–4.
[13] Sabahi, F.; Movaghar, A.; “Intrusion Detection: A Survey”; Third Int. Conf. Commun. Syst. Netw. 2008, 23–26.
[14] Caswell, B.; Beale, J. “Snort 2.1 Intrusion Detection”; Elsevier, 2004.
[15] Arboleda, A. F.; Bedón, C. E. “SnortTM Diagrams for Developers”; Universidad Del Cauca-Colombia, 2005.
[16] Ujjan, R. M. A.; Pervez, Z.; Dahal, K. “Snort Based Collaborative Intrusion Detection System Using Blockchain in SDN”; 13th Int. Con. Softw. Knowl. Inf. Manag. Appl. 2019, 1-8.
[17] Alexopoulos, N.; Vasilomanolakis, E.; Ivánkó, N. R.; Mühlhäuser, M. “Towards Blockchain-Based Collaborative Intrusion Detection Systems”; Int. Con. Criti. Inf. Infrastruct. Secur. 2017, 107-118.
[18] Li, W.; Wang, Y.; Li, J.; Au, M. H. “Toward a Blockchain-Based Framework for Challenge-Based Collaborative Intrusion Detection”; Int. J. Inf. Secur. 2020, 1-13.
[19] Putra, G. D.; Dedeoglu, V.; Kanhere, S. S.; Jurdak, R. “Towards Scalable and Trustworthy Decentralized Collaborative Intrusion Detection System for IoT”; IEEE/ACM Fifth Int. Con. Internet-of-Things Des. and Implement 2020, 256-257.
[20] Meng, W.; Tischhauser, E. W.; Wang, Q.; Wang, Y.; Han, J. “When Intrusion Detection Meets Blockchain Technology: A Review”; IEEE Access 2018, 6, 10179-10188.