How to Pick Your Friends A Game Theoretic Approach to P2P Overlay Construction
暂无分享,去创建一个
[1] Ittay Eyal,et al. The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.
[2] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[3] Guillaume Pierre,et al. A survey of DHT security techniques , 2011, CSUR.
[4] Yuan Zhang,et al. Making eclipse attacks computationally infeasible in large-scale DHTs , 2011, 30th IEEE International Performance Computing and Communications Conference.
[5] Emin Gün Sirer,et al. Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.
[6] Jeong-Kyung Moon,et al. A security monitoring method for malicious P2P event detection , 2015, Peer-to-Peer Networking and Applications.
[7] Xiuli Shao,et al. Detecting P2P botnets by discovering flow dependency in C&C traffic , 2014, Peer-to-Peer Netw. Appl..
[8] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[9] Yuan Zhang,et al. Sybil defenses in DHT networks based on social relationships , 2015 .
[10] Arthur Gervais,et al. Ethereum Eclipse Attacks , 2016 .
[11] Iuon-Chang Lin,et al. A Survey of Blockchain Security Issues and Challenges , 2017, Int. J. Netw. Secur..
[12] Jong-Hyouk Lee,et al. Double-Spending With a Sybil Attack in the Bitcoin Decentralized Network , 2019, IEEE Transactions on Industrial Informatics.
[13] Atul Singh,et al. Eclipse Attacks on Overlay Networks: Threats and Defenses , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[14] Camilo Rocha,et al. Double-spend Attack Models with Time Advantange for Bitcoin , 2016, CLEI Selected Papers.
[15] Ahmed Serhrouchni,et al. Total Eclipse: How To Completely Isolate a Bitcoin Peer , 2018, 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC).
[16] Mauro Conti,et al. A Survey on Security and Privacy Issues of Bitcoin , 2017, IEEE Communications Surveys & Tutorials.
[17] Quanyan Zhu,et al. Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[18] Chris Hankin,et al. Game Theory Meets Information Security Management , 2014, SEC.
[19] Laurent Vanbever,et al. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[20] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[21] Min Suk Kang,et al. A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network , 2019, 2020 IEEE Symposium on Security and Privacy (SP).
[22] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[23] Can Saygin,et al. A game theory based cybersecurity assessment model for advanced manufacturing systems , 2018 .
[24] Laurent Vanbever,et al. Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies , 2016, ArXiv.
[25] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[26] Aviv Zohar,et al. Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.
[27] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[28] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[29] Mohammad Reza Meybodi,et al. A Novel Model of Sybil Attack in Cluster-Based Wireless Sensor Networks and Propose a Distributed Algorithm to Defend It , 2018, Wirel. Pers. Commun..
[30] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[31] Ethan Heilman,et al. Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network , 2020, IACR Cryptol. ePrint Arch..
[32] Stefan Schmid,et al. Survey on Cryptocurrency Networking: Context, State-of-the-Art, Challenges , 2020, ArXiv.
[33] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS.