Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach A Mavridou, A Laszka 22nd International Conference on Financial Cryptography and Data Security …, 2018 | 297 | 2018 |
Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools B Johnson, A Laszka, J Grossklags, M Vasek, T Moore 1st Workshop on Bitcoin Research (BITCOIN 2014), 2014 | 282 | 2014 |
VeriSolid: Correct-by-Design Smart Contracts for Ethereum A Mavridou, A Laszka, E Stachtiari, A Dubey 23rd International Conference on Financial Cryptography and Data Security …, 2019 | 165 | 2019 |
A Survey of Interdependent Information Security Games A Laszka, M Felegyhazi, L Buttyan ACM Computing Surveys 47 (2), 23:1 - 23:38, 2014 | 159 | 2014 |
Providing Privacy, Safety, and Security in IoT-Based Transactive Energy Systems using Distributed Ledgers A Laszka, M Walker, A Dubey, D Schmidt 7th International Conference on the Internet of Things (IoT 2017), 2017 | 142 | 2017 |
Impact of COVID-19 on Public Transit Accessibility and Ridership M Wilbur, A Ayman, A Sivagnanam, A Ouyang, V Poon, R Kabir, A Vadali, ... Transportation Research Record, 03611981231160531, 2020 | 129 | 2020 |
When Bitcoin Mining Pools Run Dry: A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools A Laszka, B Johnson, J Grossklags 2nd Workshop on Bitcoin Research (BITCOIN 2015), 2015 | 120 | 2015 |
Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts A Mavridou, A Laszka 7th International Conference on Principles of Security and Trust (POST 2018), 2018 | 112 | 2018 |
FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources A Laszka, G Horvath, M Felegyhazi, L Buttyan 5th Conference on Decision and Game Theory for Security (GameSec 2014), 2014 | 98 | 2014 |
SURE: A Modeling and Simulation Integration Platform for Evaluation of SecUre and REsilient Cyber–Physical Systems X Koutsoukos, G Karsai, A Laszka, H Neema, B Potteiger, P Volgyesi, ... Proceedings of the IEEE 106 (1), 93-112, 2018 | 85 | 2018 |
Improving network connectivity and robustness using trusted nodes with application to resilient consensus W Abbas, A Laszka, X Koutsoukos IEEE Transactions on Control of Network Systems 5 (4), 2036-2048, 2018 | 81 | 2018 |
Vulnerability of Transportation Networks to Traffic-Signal Tampering A Laszka, B Potteiger, Y Vorobeychik, S Amin, X Koutsoukos 7th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS 2016), 2016 | 81 | 2016 |
Devising Effective Policies for Bug-Bounty Platforms and Security Vulnerability Discovery M Zhao, A Laszka, J Grossklags Journal of Information Policy 7, 372-418, 2017 | 78 | 2017 |
A Privacy-preserving Mobile and Fog Computing Framework to Trace and Prevent COVID-19 Community Transmission M Whaiduzzaman, M Hossain, AR Shovon, S Roy, A Laszka, R Buyya, ... IEEE Journal of Biomedical and Health Informatics 24 (12), 2020 | 73 | 2020 |
On the Economics of Ransomware A Laszka, S Farhang, J Grossklags 8th Conference on Decision and Game Theory for Security (GameSec 2017), 2017 | 70 | 2017 |
PlaTIBART: a platform for transactive IoT blockchain applications with repeatable testing MA Walker, A Dubey, A Laszka, DC Schmidt 4th Workshop on Middleware and Applications for the Internet of Things …, 2017 | 66 | 2017 |
TRANSAX: A Blockchain-based Decentralized Forward-Trading Energy Exchange for Transactive Microgrids A Laszka, S Eisele, A Dubey, G Karsai 24th IEEE International Conference on Parallel and Distributed Systems …, 2018 | 61 | 2018 |
A Review and Outlook of Energy Consumption Estimation Models for Electric Vehicles Y Chen, G Wu, R Sun, A Dubey, A Laszka, P Pugliese arXiv preprint arXiv:2003.12873, 2020 | 57 | 2020 |
On the design of communication and transaction anonymity in blockchain-based transactive microgrids J Bergquist, A Laszka, M Sturm, A Dubey 1st Workshop on Scalable and Resilient Infrastructures for Distributed …, 2017 | 54 | 2017 |
Optimal Personalized Filtering Against Spear-Phishing Attacks A Laszka, Y Vorobeychik, X Koutsoukos 29th AAAI Conference on Artificial Intelligence (AAAI-15), 2015 | 52 | 2015 |