Configure the basic simulation parameters including network topology, node powers, and execution settings.
Add mining power values for each honest node. Total (honest + selfish) must not exceed 1. If the total is less than 1, the remaining power is split equally among all other nodes.
Fixed propagation delays in seconds between node types (h = honest, s = selfish).
Configure the mining strategy parameters that determine how the selfish miner behaves in different scenarios. The strategy is encoded by inequality constraints on the length of the private branch, for a given delta — the difference between the selfish miner's private branch length and the public chain length (delta = private − public).