Comprehensive Overview of Selfish Mining and Double Spending Attack Countermeasures | IEEE Conference Publication | IEEE Xplore