Follow
Aron Laszka
Title
Cited by
Cited by
Year
Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
B Johnson, A Laszka, J Grossklags, M Vasek, T Moore
1st Workshop on Bitcoin Research (BITCOIN 2014), 2014
2352014
Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach
A Mavridou, A Laszka
22nd International Conference on Financial Cryptography and Data Security …, 2018
1872018
A Survey of Interdependent Information Security Games
A Laszka, M Felegyhazi, L Buttyan
ACM Computing Surveys 47 (2), 23:1 - 23:38, 2014
1382014
Providing Privacy, Safety, and Security in IoT-Based Transactive Energy Systems using Distributed Ledgers
A Laszka, M Walker, A Dubey, D Schmidt
7th International Conference on the Internet of Things (IoT 2017), 2017
1032017
When Bitcoin Mining Pools Run Dry: A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools
A Laszka, B Johnson, J Grossklags
2nd Workshop on Bitcoin Research (BITCOIN 2015), 2015
96*2015
VeriSolid: Correct-by-Design Smart Contracts for Ethereum
A Mavridou, A Laszka, E Stachtiari, A Dubey
23rd International Conference on Financial Cryptography and Data Security …, 2019
882019
Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts
A Mavridou, A Laszka
7th International Conference on Principles of Security and Trust (POST 2018), 2018
802018
FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources
A Laszka, G Horvath, M Felegyhazi, L Buttyan
5th Conference on Decision and Game Theory for Security (GameSec 2014), 2014
782014
SURE: A Modeling and Simulation Integration Platform for Evaluation of SecUre and REsilient Cyber–Physical Systems
X Koutsoukos, G Karsai, A Laszka, H Neema, B Potteiger, P Volgyesi, ...
Proceedings of the IEEE 106 (1), 93-112, 2018
702018
Vulnerability of Transportation Networks to Traffic-Signal Tampering
A Laszka, B Potteiger, Y Vorobeychik, S Amin, X Koutsoukos
7th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS 2016), 2016
592016
Impact of COVID-19 on Public Transit Accessibility and Ridership
M Wilbur, A Ayman, A Ouyang, V Poon, R Kabir, A Vadali, P Pugliese, ...
arXiv preprint arXiv:2008.02413, 2020
562020
PlaTIBART: a platform for transactive IoT blockchain applications with repeatable testing
MA Walker, A Dubey, A Laszka, DC Schmidt
4th Workshop on Middleware and Applications for the Internet of Things …, 2017
502017
On the Economics of Ransomware
A Laszka, S Farhang, J Grossklags
8th Conference on Decision and Game Theory for Security (GameSec 2017), 2017
502017
Improving network connectivity and robustness using trusted nodes with application to resilient consensus
W Abbas, A Laszka, X Koutsoukos
IEEE Transactions on Control of Network Systems 5 (4), 2036-2048, 2018
482018
Devising Effective Policies for Bug-Bounty Platforms and Security Vulnerability Discovery
M Zhao, A Laszka, J Grossklags
Journal of Information Policy 7, 372-418, 2017
472017
Optimal Personalized Filtering Against Spear-Phishing Attacks
A Laszka, Y Vorobeychik, X Koutsoukos
29th AAAI Conference on Artificial Intelligence (AAAI-15), 2015
442015
Multi-Defender Strategic Filtering Against Spear-Phishing Attacks
A Laszka, J Lou, Y Vorobeychik
30th AAAI Conference on Artificial Intelligence (AAAI-16), 2016
422016
Mitigating Covert Compromises: A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks
A Laszka, B Johnson, J Grossklags
9th Conference on Web and Internet Economics (WINE 2013), 319-332, 2013
41*2013
Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms
A Laszka, M Zhao, J Grossklags
21st European Symposium on Research in Computer Security (ESORICS 2016), 2016
402016
A Privacy-preserving Mobile and Fog Computing Framework to Trace and Prevent COVID-19 Community Transmission
M Whaiduzzaman, M Hossain, AR Shovon, S Roy, A Laszka, R Buyya, ...
IEEE Journal of Biomedical and Health Informatics 24 (12), 2020
392020
The system can't perform the operation now. Try again later.
Articles 1–20