Aron Laszka
Aron Laszka
Assistant Professor, University of Houston
Bestätigte E-Mail-Adresse bei uh.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
B Johnson, A Laszka, J Grossklags, M Vasek, T Moore
1st Workshop on Bitcoin Research (BITCOIN 2014), 2014
1812014
A Survey of Interdependent Information Security Games
A Laszka, M Felegyhazi, L Buttyan
ACM Computing Surveys 47 (2), 23:1 - 23:38, 2014
1262014
Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach
A Mavridou, A Laszka
22nd International Conference on Financial Cryptography and Data Security …, 2018
1092018
When Bitcoin Mining Pools Run Dry: A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools
A Laszka, B Johnson, J Grossklags
2nd Workshop on Bitcoin Research (BITCOIN 2015), 2015
78*2015
Providing Privacy, Safety, and Security in IoT-Based Transactive Energy Systems using Distributed Ledgers
A Laszka, M Walker, A Dubey, D Schmidt
7th International Conference on the Internet of Things (IoT 2017), 2017
732017
FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources
A Laszka, G Horvath, M Felegyhazi, L Buttyan
5th Conference on Decision and Game Theory for Security (GameSec 2014), 2014
712014
Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts
A Mavridou, A Laszka
7th International Conference on Principles of Security and Trust (POST 2018), 2018
522018
SURE: A Modeling and Simulation Integration Platform for Evaluation of SecUre and REsilient Cyber–Physical Systems
X Koutsoukos, G Karsai, A Laszka, H Neema, B Potteiger, P Volgyesi, ...
Proceedings of the IEEE 106 (1), 93-112, 2018
482018
VeriSolid: Correct-by-Design Smart Contracts for Ethereum
A Mavridou, A Laszka, E Stachtiari, A Dubey
23rd International Conference on Financial Cryptography and Data Security …, 2019
432019
Vulnerability of Transportation Networks to Traffic-Signal Tampering
A Laszka, B Potteiger, Y Vorobeychik, S Amin, X Koutsoukos
7th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS 2016), 2016
422016
PlaTIBART: a platform for transactive IoT blockchain applications with repeatable testing
MA Walker, A Dubey, A Laszka, DC Schmidt
4th Workshop on Middleware and Applications for the Internet of Things …, 2017
372017
Mitigating Covert Compromises: A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks
A Laszka, B Johnson, J Grossklags
9th Conference on Web and Internet Economics (WINE 2013), 319-332, 2013
37*2013
Optimal Personalized Filtering Against Spear-Phishing Attacks
A Laszka, Y Vorobeychik, X Koutsoukos
29th AAAI Conference on Artificial Intelligence (AAAI-15), 2015
362015
Multi-Defender Strategic Filtering Against Spear-Phishing Attacks
A Laszka, J Lou, Y Vorobeychik
30th AAAI Conference on Artificial Intelligence (AAAI-16), 2016
342016
Improving network connectivity and robustness using trusted nodes with application to resilient consensus
W Abbas, A Laszka, X Koutsoukos
IEEE Transactions on Control of Network Systems 5 (4), 2036-2048, 2018
322018
A Survey of Interdependent Security Games
A Laszka, M Felegyhazi, L Buttyán
CrySyS Lab Technical Report, 2012
312012
On the design of communication and transaction anonymity in blockchain-based transactive microgrids
J Bergquist, A Laszka, M Sturm, A Dubey
Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures …, 2017
302017
Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms
A Laszka, M Zhao, J Grossklags
21st European Symposium on Research in Computer Security (ESORICS 2016), 2016
302016
Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments
A Ghafouri, W Abbas, A Laszka, Y Vorobeychik, X Koutsoukos
7th Conference on Decision and Game Theory for Security (GameSec 2016), 2016
292016
Optimal Thresholds for Intrusion Detection Systems
A Laszka, W Abbas, SS Sastry, Y Vorobeychik, X Koutsoukos
3rd Annual Symposium and Bootcamp on the Science of Security (HotSoS 2016), 2016
282016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20