Aron Laszka
Cited by
Cited by
Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach
A Mavridou, A Laszka
22nd International Conference on Financial Cryptography and Data Security …, 2018
Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
B Johnson, A Laszka, J Grossklags, M Vasek, T Moore
1st Workshop on Bitcoin Research (BITCOIN 2014), 2014
VeriSolid: Correct-by-Design Smart Contracts for Ethereum
A Mavridou, A Laszka, E Stachtiari, A Dubey
23rd International Conference on Financial Cryptography and Data Security …, 2019
A Survey of Interdependent Information Security Games
A Laszka, M Felegyhazi, L Buttyan
ACM Computing Surveys 47 (2), 23:1 - 23:38, 2014
Providing Privacy, Safety, and Security in IoT-Based Transactive Energy Systems using Distributed Ledgers
A Laszka, M Walker, A Dubey, D Schmidt
7th International Conference on the Internet of Things (IoT 2017), 2017
Impact of COVID-19 on Public Transit Accessibility and Ridership
M Wilbur, A Ayman, A Sivagnanam, A Ouyang, V Poon, R Kabir, A Vadali, ...
Transportation Research Record, 03611981231160531, 2020
When Bitcoin Mining Pools Run Dry: A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools
A Laszka, B Johnson, J Grossklags
2nd Workshop on Bitcoin Research (BITCOIN 2015), 2015
Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts
A Mavridou, A Laszka
7th International Conference on Principles of Security and Trust (POST 2018), 2018
FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources
A Laszka, G Horvath, M Felegyhazi, L Buttyan
5th Conference on Decision and Game Theory for Security (GameSec 2014), 2014
SURE: A Modeling and Simulation Integration Platform for Evaluation of SecUre and REsilient Cyber–Physical Systems
X Koutsoukos, G Karsai, A Laszka, H Neema, B Potteiger, P Volgyesi, ...
Proceedings of the IEEE 106 (1), 93-112, 2018
Vulnerability of Transportation Networks to Traffic-Signal Tampering
A Laszka, B Potteiger, Y Vorobeychik, S Amin, X Koutsoukos
7th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS 2016), 2016
Improving network connectivity and robustness using trusted nodes with application to resilient consensus
W Abbas, A Laszka, X Koutsoukos
IEEE Transactions on Control of Network Systems 5 (4), 2036-2048, 2018
Devising Effective Policies for Bug-Bounty Platforms and Security Vulnerability Discovery
M Zhao, A Laszka, J Grossklags
Journal of Information Policy 7, 372-418, 2017
A Privacy-preserving Mobile and Fog Computing Framework to Trace and Prevent COVID-19 Community Transmission
M Whaiduzzaman, M Hossain, AR Shovon, S Roy, A Laszka, R Buyya, ...
IEEE Journal of Biomedical and Health Informatics 24 (12), 2020
On the Economics of Ransomware
A Laszka, S Farhang, J Grossklags
8th Conference on Decision and Game Theory for Security (GameSec 2017), 2017
PlaTIBART: a platform for transactive IoT blockchain applications with repeatable testing
MA Walker, A Dubey, A Laszka, DC Schmidt
4th Workshop on Middleware and Applications for the Internet of Things …, 2017
TRANSAX: A Blockchain-based Decentralized Forward-Trading Energy Exchange for Transactive Microgrids
A Laszka, S Eisele, A Dubey, G Karsai
24th IEEE International Conference on Parallel and Distributed Systems …, 2018
A Review and Outlook of Energy Consumption Estimation Models for Electric Vehicles
Y Chen, G Wu, R Sun, A Dubey, A Laszka, P Pugliese
arXiv preprint arXiv:2003.12873, 2020
On the design of communication and transaction anonymity in blockchain-based transactive microgrids
J Bergquist, A Laszka, M Sturm, A Dubey
1st Workshop on Scalable and Resilient Infrastructures for Distributed …, 2017
Optimal Personalized Filtering Against Spear-Phishing Attacks
A Laszka, Y Vorobeychik, X Koutsoukos
29th AAAI Conference on Artificial Intelligence (AAAI-15), 2015
The system can't perform the operation now. Try again later.
Articles 1–20