关注
Suhyeon Lee
Suhyeon Lee
在 korea.ac.kr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Ransomware protection using the moving target defense perspective
S Lee, HK Kim, K Kim
Computers & Electrical Engineering 78, 288-299, 2019
282019
Countering block withholding attack efficiently
S Lee, S Kim
IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops …, 2019
192019
Short selling attack: A self-destructive but profitable 51% attack on pos blockchains
S Lee, S Kim
Cryptology ePrint Archive, 2020
162020
Proof-of-stake at stake: predatory, destructive attack on PoS cryptocurrencies
S Lee, S Kim
Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for …, 2020
82020
Blockchain as a cyber defense: opportunities, applications, and challenges
S Lee, S Kim
IEEE Access 10, 2602-2618, 2021
72021
Pooled mining makes selfish mining tricky
S Lee, S Kim
Cryptology ePrint Archive, 2018
72018
Detective mining: Selfish mining becomes unrealistic under mining pool environment
S Lee, S Kim
Cryptology ePrint Archive, 2019
62019
Rethinking selfish mining under pooled mining
S Lee, S Kim
ICT Express 9 (3), 356-361, 2023
42023
Shorting attack: Predatory, destructive short selling on Proof‐of‐Stake cryptocurrencies
S Lee, S Kim
Concurrency and Computation: Practice and Experience, e6585, 2021
12021
Do You Really Need to Disguise Normal Servers as Honeypots?
S Lee, K Cho, S Kim
MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM), 166-172, 2022
2022
Block Double-Submission Attack: Block Withholding Can Be Self-Destructive
S Lee, D Lee, S Kim
AFT '22: Proceedings of the 4th ACM Conference on Advances in Financial …, 2022
2022
系统目前无法执行此操作,请稍后再试。
文章 1–11