Ransomware protection using the moving target defense perspective S Lee, HK Kim, K Kim Computers & Electrical Engineering 78, 288-299, 2019 | 28 | 2019 |
Countering block withholding attack efficiently S Lee, S Kim IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops …, 2019 | 19 | 2019 |
Short selling attack: A self-destructive but profitable 51% attack on pos blockchains S Lee, S Kim Cryptology ePrint Archive, 2020 | 16 | 2020 |
Proof-of-stake at stake: predatory, destructive attack on PoS cryptocurrencies S Lee, S Kim Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for …, 2020 | 8 | 2020 |
Blockchain as a cyber defense: opportunities, applications, and challenges S Lee, S Kim IEEE Access 10, 2602-2618, 2021 | 7 | 2021 |
Pooled mining makes selfish mining tricky S Lee, S Kim Cryptology ePrint Archive, 2018 | 7 | 2018 |
Detective mining: Selfish mining becomes unrealistic under mining pool environment S Lee, S Kim Cryptology ePrint Archive, 2019 | 6 | 2019 |
Rethinking selfish mining under pooled mining S Lee, S Kim ICT Express 9 (3), 356-361, 2023 | 4 | 2023 |
Shorting attack: Predatory, destructive short selling on Proof‐of‐Stake cryptocurrencies S Lee, S Kim Concurrency and Computation: Practice and Experience, e6585, 2021 | 1 | 2021 |
Do You Really Need to Disguise Normal Servers as Honeypots? S Lee, K Cho, S Kim MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM), 166-172, 2022 | | 2022 |
Block Double-Submission Attack: Block Withholding Can Be Self-Destructive S Lee, D Lee, S Kim AFT '22: Proceedings of the 4th ACM Conference on Advances in Financial …, 2022 | | 2022 |