Opportunistic Algorithmic Double-Spending: How I Learned to Stop Worrying and Love the Fork | 0 | 0.34 | 2022 |
Meta-framework for Automating Static Malware Analysis | 0 | 0.34 | 2022 |
Digital Twins for Cyber-Physical Systems Security (Dagstuhl Seminar 22171). | 0 | 0.34 | 2022 |
Unnecessary Input Heuristics & PayJoin Transactions. | 0 | 0.34 | 2022 |
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies | 0 | 0.34 | 2021 |
Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies | 0 | 0.34 | 2021 |
Measuring Cookies and Web Privacy in a Post-GDPR World. | 4 | 0.40 | 2019 |
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies. | 0 | 0.34 | 2019 |
A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice - (Short Paper). | 1 | 0.36 | 2018 |
On Security Research towards Future Mobile Network Generations. | 2 | 0.40 | 2018 |
HydRand: Practical Continuous Distributed Randomness. | 0 | 0.34 | 2018 |
Blockchains, Smart Contracts and Future Applications (Dagstuhl Seminar 18152). | 0 | 0.34 | 2018 |
Botnets causing blackouts: how coordinated load attacks can destabilize the power grid. | 0 | 0.34 | 2018 |
Security Challenges in Cyber-Physical Production Systems. | 0 | 0.34 | 2018 |
Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI. | 1 | 0.35 | 2018 |
Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques. | 0 | 0.34 | 2018 |
(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice. | 0 | 0.34 | 2018 |
Agreement with Satoshi - On the Formalization of Nakamoto Consensus. | 1 | 0.35 | 2018 |
Real-Time Forensics Through Endpoint Visibility | 0 | 0.34 | 2017 |
PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks. | 0 | 0.34 | 2017 |
Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well. | 1 | 0.36 | 2017 |
Security assurance assessment methodology for hybrid clouds. | 5 | 0.45 | 2017 |
A Performance Assessment Of Network Address Shuffling In Iot Systems | 0 | 0.34 | 2017 |
Securing the Internet, One HTTP 200 OK at a Time. | 0 | 0.34 | 2017 |
Trend Analysis of Underground Marketplaces. | 0 | 0.34 | 2017 |
PeekaTorrent: Leveraging P2P hash values for digital forensics | 0 | 0.34 | 2016 |
Empirical Research and Research Ethics in Information Security | 0 | 0.34 | 2016 |
Time is on my side | 4 | 0.44 | 2016 |
IPv6 Security: Attacks and Countermeasures in a Nutshell. | 0 | 0.34 | 2014 |
A New Approach To Secure Federated Information Bases Using Agent Technology | 1 | 0.42 | 2003 |