[1]
“Designing Robust Security Protocols for Securing Distributed Ledger Technologies Against Cyber Attacks”, ISCSITR-IJET, vol. 6, no. 6, pp. 8–14, Dec. 2025, Accessed: Mar. 24, 2026. [Online]. Available: https://iscsitr.in/index.php/ISCSITR-IJET/article/view/ISCSITR-IJET_2025_06_06_002