CHENG Yexia, FY Jun, PENG Jin, DU Yuejin. Blockchain security analysis and security protection suggestions for cryptojacking[J]. Information and Communications Technology and Policy, 2019, 45(2): 45-51.
DARKReading. 7 ways to protect against cryptominingattacks[EB/OL]. (2018-03-22)[2018-12-01]. https://www.darkreading.com/cloud/7-ways-to- protect- against-cryptomining-attacks/d/d-id/1331301?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple&image_number=1.
[2]
CSO. What is cryptojacking? How to prevent, detect, andrecover from it [EB/OL]. (2018- 08- 29) [2018- 12- 01]. https://www.csoonline.com/article/3253572/internet/what- is- cryptojacking-how-to-prevent-detect-and-recover-from-it.html.
[3]
CSO. How to detect and prevent crypto mining malware[EB/OL]. (2018- 04- 04) [2018- 12- 01]. https://www.csoonline.com/article/3267572/encryption/how- to- detect- and- preventcrypto-mining-malware.html.