When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools
暂无分享,去创建一个
[1] T. Schelling,et al. The Strategy of Conflict. , 1961 .
[2] S. Vajda,et al. The Strategy of Conflict , 1964 .
[3] Peng Liu,et al. Incentive-based modeling and inference of attacker intent, objectives, and strategies , 2003, CCS '03.
[4] Michael D. Smith,et al. How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks , 2003, Financial Cryptography.
[5] Nicolas Christin,et al. Near rationality and competitive equilibria in networked systems , 2004, PINS '04.
[6] Avi Goldfarb. The medium-term effects of unavailability , 2006 .
[7] Derek J. Clark,et al. Asymmetric Conflict , 2007 .
[8] Nicolas Christin,et al. Secure or insure?: a game-theoretic analysis of information security games , 2008, WWW.
[9] Jens Grossklags,et al. Blue versus Red: Towards a Model of Distributed Security Attacks , 2009, Financial Cryptography.
[10] Murat Kantarcioglu,et al. A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model , 2010, GameSec.
[11] Chase Qishi Wu,et al. On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks , 2010, SpringSim.
[12] Zhen Li,et al. Fighting botnets with economic uncertainty , 2011, Secur. Commun. Networks.
[13] Elmar Gerhards-Padilla,et al. Case study of the Miner Botnet , 2012, 2012 4th International Conference on Cyber Conflict (CYCON 2012).
[14] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[15] Theodore Tryfonas,et al. A game theoretic defence framework against DoS/DDoS cyber attacks , 2013, Comput. Secur..
[16] Stefan Savage,et al. Botcoin: Monetizing Stolen Cycles , 2014, NDSS.
[17] Tyler Moore,et al. Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools , 2014, Financial Cryptography Workshops.
[18] Tyler Moore,et al. Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem , 2014, Financial Cryptography Workshops.
[19] Levente Buttyán,et al. A Survey of Interdependent Information Security Games , 2014, ACM Comput. Surv..
[20] Quanyan Zhu,et al. Decision and Game Theory for Security , 2016, Lecture Notes in Computer Science.