|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 20 occurrences of 17 keywords
|
|
|
Results
Found 54 publication records. Showing 54 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
81 | Paul Harrenstein, Felix Brandt 0001, Felix A. Fischer |
Commitment and extortion. |
AAMAS |
2007 |
DBLP DOI BibTeX RDF |
extortion, game theory, multiagent systems, commitment |
54 | Adam L. Young, Moti Yung |
Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
deniable password snatching, evasive electronic espionage, cryptovirology, active viral attacks, extortion attacks, electronic warfare, electronic espionage, cryptotrojan, public information, secure receiver-anonymous channel, espionage attacks, public key cryptography, passwords, malware, information resources, computer viruses, probabilistic encryption |
48 | Adam L. Young |
Cryptoviral extortion using Microsoft's Crypto API. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Cryptovirus, Cryptographic API, RSA, Public key cryptography, Hybrid encryption |
48 | Adam L. Young, Moti Yung |
Cryptovirology: Extortion-Based Security Threats and Countermeasures. |
S&P |
1996 |
DBLP DOI BibTeX RDF |
|
27 | Tom Meurs, Edward J. Cartwright, Anna Cartwright 0001, Marianne Junger, Abhishta Abhishta |
Deception in double extortion ransomware attacks: An analysis of profitability and credibility. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
27 | Richard Derbyshire, Benjamin Green 0001, Charl van der Walt, David Hutchison 0001 |
Dead Man's PLC: Towards Viable Cyber Extortion for Operational Technology. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Alpesh Bhudia, Anna Cartwright 0001, Edward J. Cartwright, Darren Hurley-Smith, Julio C. Hernandez-Castro |
Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Masoudeh Keshavarzi, Hamid Reza Ghaffary |
An ontology-driven framework for knowledge representation of digital extortion attacks. |
Comput. Hum. Behav. |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Alpesh Bhudia, Anna Cartwright 0001, Edward J. Cartwright, Darren Hurley-Smith, Julio C. Hernandez-Castro |
Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators. |
ARES |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Kay-Yut Chen, Jingguo Wang, Yan Lang |
Coping with Digital Extortion: An Experimental Study of Benefit Appeals and Normative Appeals. |
Manag. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Alpesh Bhudia, Anna Cartwright 0001, Edward J. Cartwright, Julio C. Hernandez-Castro, Darren Hurley-Smith |
Identifying Incentives for Extortion in Proof of Stake Consensus Protocols. |
DBB |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Alpesh Bhudia, Anna Cartwright 0001, Edward J. Cartwright, Julio C. Hernandez-Castro, Darren Hurley-Smith |
Extortion of a Staking Pool in a Proof-of-Stake Consensus Mechanism. |
COINS |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Yuhuan Jin, Sheng Zhang, Jochen Bigus |
'Anti-extortion' mechanism of indigenous innovation by technologically backward firms: evidence from China. |
Technol. Anal. Strateg. Manag. |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Jianfeng Lu 0002, Yun Xin, Zhao Zhang 0002, Shaojie Tang 0001, Changbing Tang, Shaohua Wan 0001 |
Extortion and Cooperation in Rating Protocol Design for Competitive Crowdsourcing. |
IEEE Trans. Comput. Soc. Syst. |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Amir Kafshdar Goharshady |
Irrationality, Extortion, or Trusted Third-parties: Why it is Impossible to Buy and Sell Physical Goods Securely on the Blockchain. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
27 | Alejandro Platas-López, Alejandro Guerra-Hernández, Francisco Grimaldo 0001 |
On the Macroeconomic Effect of Extortion: An Agent-Based Approach. |
J. Artif. Soc. Soc. Simul. |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Ji Quan, Yawen Zhou, Xiaojian Ma, Xianjia Wang, Jian-Bo Yang |
Integrating emotion-imitating into strategy learning improves cooperation in social dilemmas with extortion. |
Knowl. Based Syst. |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Amir Kafshdar Goharshady |
Irrationality, Extortion, or Trusted Third-parties: Why it is Impossible to Buy and Sell Physical Goods Securely on the Blockchain. |
Blockchain |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Shaila Sharmeen, Yahye Abukar Ahmed, Md. Shamsul Huda, Baris Koçer, Mohammad Mehedi Hassan |
Avoiding Future Digital Extortion Through Robust Protection Against Ransomware Threats Using Deep Learning Based Adaptive Approaches. |
IEEE Access |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Masoudeh Keshavarzi, Hamid Reza Ghaffary |
I2CE3: A dedicated and separated attack chain for ransomware offenses as the most infamous cyber extortion. |
Comput. Sci. Rev. |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Shahrooz Pouryousef, Muhammad Daniyal Dar, Suleman Ahmad, Phillipa Gill, Rishab Nithyanand |
Extortion or Expansion? An Investigation into the Costs and Consequences of ICANN's gTLD Experiments. |
PAM |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Yajun Mao, Qian Zhao, Zhihai Rong |
Extortion Strategies with Mutation Promote Cooperation on High Clustered Scale-Free Networks. |
ISCAS |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Ian Goslin |
Cyber extortion is threatening Industry 4.0. |
Netw. Secur. |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Xiongrui Xu, Zhihai Rong, Zhihong Tian, Zhi-Xi Wu |
Timescale diversity facilitates the emergence of cooperation-extortion alliances in networked systems. |
Neurocomputing |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Michal Ptaszynski, Pawel Lempa, Fumito Masui, Yasutomo Kimura, Rafal Rzepka, Kenji Araki, Michal Wroczynski, Gniewosz Leliwa |
Brute - Force Sentence Pattern Extortion from Harmful Messages for Cyberbullying Detection. |
J. Assoc. Inf. Syst. |
2019 |
DBLP BibTeX RDF |
|
27 | Vincent A. Knight, Marc Harper, Nikoleta E. Glynatsi, Jonathan W. Gillard |
Recognising and evaluating the effectiveness of extortion in the Iterated Prisoner's Dilemma. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
27 | Masahiro Kinugawa, Daisuke Fujimoto, Yu-ichi Hayashi |
Electromagnetic Information Extortion from Electronic Devices Using Interceptor and Its Countermeasure. |
IACR Trans. Cryptogr. Hardw. Embed. Syst. |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Garret Ridinger |
Cultural Transmission and Extortion. |
Games |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Silivanxay Phetsouvanh, Frédérique E. Oggier, Anwitaman Datta |
EGRET: Extortion Graph Exploration Techniques in the Bitcoin Network. |
ICDM Workshops |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Jianfeng Lu 0002, Yun Xin, Zhao Zhang 0002, Shaojie Tang 0001, Songyuan Yan, Changbing Tang |
Rating Protocol Design for Extortion and Cooperation in the Crowdsourcing Contest Dilemma. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
27 | Morvareed Bidgoli, Jens Grossklags |
"Hello. This is the IRS calling.": A case study on scams, extortion, impersonation, and phone spoofing. |
eCrime |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Corinna Elsenbroich, Jennifer M. Badham |
The Extortion Relationship: A Computational Analysis. |
J. Artif. Soc. Soc. Simul. |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Yajun Mao, Zhihai Rong, Xiongrui Xu, Chi Kong Tse |
The influence of extortion diversity on the evolution of cooperation in scale-free networks. |
ISCAS |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Klaus G. Troitzsch |
Extortion Racket Systems as targets for Agent-Based Simulation Models. Comparing Competing Simulation Models and Emprical Data. |
Adv. Complex Syst. |
2015 |
DBLP DOI BibTeX RDF |
|
27 | |
Ransomware: A Rising Threat of new age Digital Extortion. |
CoRR |
2015 |
DBLP BibTeX RDF |
|
27 | Attila Szolnoki, Matjaz Perc |
Evolution of extortion in structured populations. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
27 | Attila Szolnoki, Matjaz Perc |
Defection and extortion as unexpected catalysts of unconditional cooperation in structured populations. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
27 | Elie Bursztein, Borbala Benko, Daniel Margolis, Tadek Pietraszek, Andy Archer, Allan Aquino, Andreas Pitsillidis, Stefan Savage |
Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild. |
Internet Measurement Conference |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Lars Roemheld |
Evolutionary Extortion and Mischief: Zero Determinant strategies in iterated 2x2 games. |
CoRR |
2013 |
DBLP BibTeX RDF |
|
27 | Michael T. Goodrich, Florian Kerschbaum |
Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions |
CoRR |
2011 |
DBLP BibTeX RDF |
|
27 | Michael T. Goodrich, Florian Kerschbaum |
Privacy-enhanced reputation-feedback methods to reduce feedback extortion in online auctions. |
CODASPY |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Audun Jøsang |
Trust Extortion on the Internet. |
STM |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Bill Hancock |
Extortion Going Online. |
Comput. Secur. |
2000 |
DBLP DOI BibTeX RDF |
|
27 | Brian Boyce |
Cyber extortion - The corporate response. |
Comput. Secur. |
1997 |
DBLP DOI BibTeX RDF |
|
27 | Holger Peterson, Guillaume Poupard |
Efficient scalable fair cash with off-line extortion prevention. |
ICICS |
1997 |
DBLP DOI BibTeX RDF |
|
21 | Maarten Lambers, Cor J. Veenman |
Forensic Authorship Attribution Using Compression Distances to Prototypes. |
IWCF |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 |
Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. |
ACM Trans. Web |
2008 |
DBLP DOI BibTeX RDF |
client transparency, game theory, Web servers, DoS Attacks |
21 | Rick Wash |
Incentive design for home computer security. |
CHI Extended Abstracts |
2007 |
DBLP DOI BibTeX RDF |
botnets |
21 | Nicholas Huber, Katina Michael |
Minimizing Product Shrinkage across the Supply Chain using Radio Frequency Identification: a Case Study on a Major Australian Retailer. |
ICMB |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 |
A Middleware System for Protecting Against Application Level Denial of Service Attacks. |
Middleware |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Stefan Savage |
Scalable internet threat monitoring. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Michael Vrable, Justin Ma, Jay Chen, David Moore 0001, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage |
Scalability, fidelity, and containment in the potemkin virtual honeyfarm. |
SOSP |
2005 |
DBLP DOI BibTeX RDF |
honeyfarm, malware, honeypot, virtual machine monitor, copy-on-write |
21 | Adam L. Young |
Building a Cryptovirus Using Microsoft's Cryptographic API. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Richard D. Pethia |
Bugs in the programs. |
SIGSOFT FSE |
2000 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #54 of 54 (100 per page; Change: )
|
|