Aron Laszka
TitleCited byYear
Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
B Johnson, A Laszka, J Grossklags, M Vasek, T Moore
1st Workshop on Bitcoin Research (BITCOIN 2014), 2014
1222014
A Survey of Interdependent Information Security Games
A Laszka, M Felegyhazi, L Buttyan
ACM Computing Surveys 47 (2), 23:1 - 23:38, 2014
992014
When Bitcoin Mining Pools Run Dry: A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools
A Laszka, B Johnson, J Grossklags
2nd Workshop on Bitcoin Research (BITCOIN 2015), 2015
60*2015
FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources
A Laszka, G Horvath, M Felegyhazi, L Buttyan
5th Conference on Decision and Game Theory for Security (GameSec 2014), 2014
502014
Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach
A Mavridou, A Laszka
22nd International Conference on Financial Cryptography and Data Security …, 2018
472018
Providing Privacy, Safety, and Security in IoT-Based Transactive Energy Systems using Distributed Ledgers
A Laszka, M Walker, A Dubey, D Schmidt
7th International Conference on the Internet of Things (IoT 2017), 2017
472017
Mitigating Covert Compromises: A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks
A Laszka, B Johnson, J Grossklags
9th Conference on Web and Internet Economics (WINE 2013), 319-332, 2013
34*2013
A Survey of Interdependent Security Games
A Laszka, M Felegyhazi, L Buttyán
CrySyS Lab Technical Report, 2012
332012
SURE: A Modeling and Simulation Integration Platform for Evaluation of SecUre and REsilient Cyber–Physical Systems
X Koutsoukos, G Karsai, A Laszka, H Neema, B Potteiger, P Volgyesi, ...
Proceedings of the IEEE 106 (1), 93-112, 2018
272018
Vulnerability of Transportation Networks to Traffic-Signal Tampering
A Laszka, B Potteiger, Y Vorobeychik, S Amin, X Koutsoukos
7th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS 2016), 2016
272016
Optimal Personalized Filtering Against Spear-Phishing Attacks
A Laszka, Y Vorobeychik, X Koutsoukos
29th AAAI Conference on Artificial Intelligence (AAAI-15), 2015
272015
Mitigation of Targeted and Non-Targeted Covert Attacks as a Timing Game
A Laszka, B Johnson, J Grossklags
4th Conference on Decision and Game Theory for Security (GameSec 2013), 175-191, 2013
272013
Multi-Defender Strategic Filtering Against Spear-Phishing Attacks
A Laszka, J Lou, Y Vorobeychik
30th AAAI Conference on Artificial Intelligence (AAAI-16), 2016
252016
Optimal Thresholds for Intrusion Detection Systems
A Laszka, W Abbas, SS Sastry, Y Vorobeychik, X Koutsoukos
3rd Annual Symposium and Bootcamp on the Science of Security (HotSoS 2016), 2016
242016
Estimating Systematic Risk in Real-World Networks
A Laszka, B Johnson, J Grossklags, M Felegyhazi
18th International Conference on Financial Cryptography and Data Security …, 2014
232014
PlaTIBART: a platform for transactive IoT blockchain applications with repeatable testing
MA Walker, A Dubey, A Laszka, DC Schmidt
4th Workshop on Middleware and Applications for the Internet of Things …, 2017
222017
Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments
A Ghafouri, W Abbas, A Laszka, Y Vorobeychik, X Koutsoukos
7th Conference on Decision and Game Theory for Security (GameSec 2016), 2016
222016
Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts
A Mavridou, A Laszka
7th International Conference on Principles of Security and Trust (POST 2018), 2018
212018
Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms
A Laszka, M Zhao, J Grossklags
21st European Symposium on Research in Computer Security (ESORICS 2016), 2016
212016
Should Cyber-Insurance Providers Invest in Software Security?
A Laszka, J Grossklags
20th European Symposium on Research in Computer Security (ESORICS 2015), 2015
212015
The system can't perform the operation now. Try again later.
Articles 1–20