Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
- B. Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, T. Moore
- Computer Science
- Financial Cryptography Workshops
- 3 March 2014
TLDR
A Survey of Interdependent Information Security Games
- Aron Laszka, M. Félegyházi, L. Buttyán
- Computer Science
- ACM Comput. Surv.
- 29 August 2014
TLDR
Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach
- A. Mavridou, Aron Laszka
- Computer Science
- Financial Cryptography
- 26 November 2017
TLDR
Mitigating Covert Compromises - A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks
- Aron Laszka, B. Johnson, Jens Grossklags
- Engineering, Computer Science
- WINE
- 11 December 2013
TLDR
VeriSolid: Correct-by-Design Smart Contracts for Ethereum
- A. Mavridou, Aron Laszka, Emmanouela Stachtiari, A. Dubey
- Computer Science
- Financial Cryptography
- 4 January 2019
TLDR
Optimal Personalized Filtering Against Spear-Phishing Attacks
- Aron Laszka, Y. Vorobeychik, X. Koutsoukos
- Computer Science
- AAAI
- 25 January 2015
TLDR
Privacy-Preserving Platform for Transactive Energy Systems
- Karla Kvaternik, Aron Laszka, +4 authors A. Dubey
- Computer Science
- ArXiv
- 27 September 2017
TLDR
A Survey of Interdependent Security Games Working paper
Interdependence of information systems is a fundamental property that shapes the problems in information security. The risks faced by system operators and users is not only determined by their own… Expand
- 14
- 3
- PDF
On the design of communication and transaction anonymity in blockchain-based transactive microgrids
- J. Bergquist, Aron Laszka, M. Sturm, A. Dubey
- Computer Science, Business
- SERIAL@Middleware
- 27 September 2017
TLDR
Optimal thresholds for intrusion detection systems
- Aron Laszka, W. Abbas, S. Sastry, Y. Vorobeychik, X. Koutsoukos
- Computer Science
- HotSoS
- 19 April 2016
TLDR