The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for extortion with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1996-2008 (15) 2009-2018 (16) 2019-2021 (15) 2022-2024 (8)
Publication types (Num. hits)
article(30) inproceedings(24)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 20 occurrences of 17 keywords

Results
Found 54 publication records. Showing 54 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
81Paul Harrenstein, Felix Brandt 0001, Felix A. Fischer Commitment and extortion. Search on Bibsonomy AAMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF extortion, game theory, multiagent systems, commitment
54Adam L. Young, Moti Yung Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF deniable password snatching, evasive electronic espionage, cryptovirology, active viral attacks, extortion attacks, electronic warfare, electronic espionage, cryptotrojan, public information, secure receiver-anonymous channel, espionage attacks, public key cryptography, passwords, malware, information resources, computer viruses, probabilistic encryption
48Adam L. Young Cryptoviral extortion using Microsoft's Crypto API. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptovirus, Cryptographic API, RSA, Public key cryptography, Hybrid encryption
48Adam L. Young, Moti Yung Cryptovirology: Extortion-Based Security Threats and Countermeasures. Search on Bibsonomy S&P The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
27Tom Meurs, Edward J. Cartwright, Anna Cartwright 0001, Marianne Junger, Abhishta Abhishta Deception in double extortion ransomware attacks: An analysis of profitability and credibility. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
27Richard Derbyshire, Benjamin Green 0001, Charl van der Walt, David Hutchison 0001 Dead Man's PLC: Towards Viable Cyber Extortion for Operational Technology. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Alpesh Bhudia, Anna Cartwright 0001, Edward J. Cartwright, Darren Hurley-Smith, Julio C. Hernandez-Castro Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Masoudeh Keshavarzi, Hamid Reza Ghaffary An ontology-driven framework for knowledge representation of digital extortion attacks. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Alpesh Bhudia, Anna Cartwright 0001, Edward J. Cartwright, Darren Hurley-Smith, Julio C. Hernandez-Castro Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators. Search on Bibsonomy ARES The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Kay-Yut Chen, Jingguo Wang, Yan Lang Coping with Digital Extortion: An Experimental Study of Benefit Appeals and Normative Appeals. Search on Bibsonomy Manag. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Alpesh Bhudia, Anna Cartwright 0001, Edward J. Cartwright, Julio C. Hernandez-Castro, Darren Hurley-Smith Identifying Incentives for Extortion in Proof of Stake Consensus Protocols. Search on Bibsonomy DBB The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Alpesh Bhudia, Anna Cartwright 0001, Edward J. Cartwright, Julio C. Hernandez-Castro, Darren Hurley-Smith Extortion of a Staking Pool in a Proof-of-Stake Consensus Mechanism. Search on Bibsonomy COINS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Yuhuan Jin, Sheng Zhang, Jochen Bigus 'Anti-extortion' mechanism of indigenous innovation by technologically backward firms: evidence from China. Search on Bibsonomy Technol. Anal. Strateg. Manag. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Jianfeng Lu 0002, Yun Xin, Zhao Zhang 0002, Shaojie Tang 0001, Changbing Tang, Shaohua Wan 0001 Extortion and Cooperation in Rating Protocol Design for Competitive Crowdsourcing. Search on Bibsonomy IEEE Trans. Comput. Soc. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Amir Kafshdar Goharshady Irrationality, Extortion, or Trusted Third-parties: Why it is Impossible to Buy and Sell Physical Goods Securely on the Blockchain. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
27Alejandro Platas-López, Alejandro Guerra-Hernández, Francisco Grimaldo 0001 On the Macroeconomic Effect of Extortion: An Agent-Based Approach. Search on Bibsonomy J. Artif. Soc. Soc. Simul. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Ji Quan, Yawen Zhou, Xiaojian Ma, Xianjia Wang, Jian-Bo Yang Integrating emotion-imitating into strategy learning improves cooperation in social dilemmas with extortion. Search on Bibsonomy Knowl. Based Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Amir Kafshdar Goharshady Irrationality, Extortion, or Trusted Third-parties: Why it is Impossible to Buy and Sell Physical Goods Securely on the Blockchain. Search on Bibsonomy Blockchain The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Shaila Sharmeen, Yahye Abukar Ahmed, Md. Shamsul Huda, Baris Koçer, Mohammad Mehedi Hassan Avoiding Future Digital Extortion Through Robust Protection Against Ransomware Threats Using Deep Learning Based Adaptive Approaches. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Masoudeh Keshavarzi, Hamid Reza Ghaffary I2CE3: A dedicated and separated attack chain for ransomware offenses as the most infamous cyber extortion. Search on Bibsonomy Comput. Sci. Rev. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Shahrooz Pouryousef, Muhammad Daniyal Dar, Suleman Ahmad, Phillipa Gill, Rishab Nithyanand Extortion or Expansion? An Investigation into the Costs and Consequences of ICANN's gTLD Experiments. Search on Bibsonomy PAM The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Yajun Mao, Qian Zhao, Zhihai Rong Extortion Strategies with Mutation Promote Cooperation on High Clustered Scale-Free Networks. Search on Bibsonomy ISCAS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Ian Goslin Cyber extortion is threatening Industry 4.0. Search on Bibsonomy Netw. Secur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Xiongrui Xu, Zhihai Rong, Zhihong Tian, Zhi-Xi Wu Timescale diversity facilitates the emergence of cooperation-extortion alliances in networked systems. Search on Bibsonomy Neurocomputing The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Michal Ptaszynski, Pawel Lempa, Fumito Masui, Yasutomo Kimura, Rafal Rzepka, Kenji Araki, Michal Wroczynski, Gniewosz Leliwa Brute - Force Sentence Pattern Extortion from Harmful Messages for Cyberbullying Detection. Search on Bibsonomy J. Assoc. Inf. Syst. The full citation details ... 2019 DBLP  BibTeX  RDF
27Vincent A. Knight, Marc Harper, Nikoleta E. Glynatsi, Jonathan W. Gillard Recognising and evaluating the effectiveness of extortion in the Iterated Prisoner's Dilemma. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
27Masahiro Kinugawa, Daisuke Fujimoto, Yu-ichi Hayashi Electromagnetic Information Extortion from Electronic Devices Using Interceptor and Its Countermeasure. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Garret Ridinger Cultural Transmission and Extortion. Search on Bibsonomy Games The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Silivanxay Phetsouvanh, Frédérique E. Oggier, Anwitaman Datta EGRET: Extortion Graph Exploration Techniques in the Bitcoin Network. Search on Bibsonomy ICDM Workshops The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Jianfeng Lu 0002, Yun Xin, Zhao Zhang 0002, Shaojie Tang 0001, Songyuan Yan, Changbing Tang Rating Protocol Design for Extortion and Cooperation in the Crowdsourcing Contest Dilemma. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
27Morvareed Bidgoli, Jens Grossklags "Hello. This is the IRS calling.": A case study on scams, extortion, impersonation, and phone spoofing. Search on Bibsonomy eCrime The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Corinna Elsenbroich, Jennifer M. Badham The Extortion Relationship: A Computational Analysis. Search on Bibsonomy J. Artif. Soc. Soc. Simul. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Yajun Mao, Zhihai Rong, Xiongrui Xu, Chi Kong Tse The influence of extortion diversity on the evolution of cooperation in scale-free networks. Search on Bibsonomy ISCAS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Klaus G. Troitzsch Extortion Racket Systems as targets for Agent-Based Simulation Models. Comparing Competing Simulation Models and Emprical Data. Search on Bibsonomy Adv. Complex Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27 Ransomware: A Rising Threat of new age Digital Extortion. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
27Attila Szolnoki, Matjaz Perc Evolution of extortion in structured populations. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
27Attila Szolnoki, Matjaz Perc Defection and extortion as unexpected catalysts of unconditional cooperation in structured populations. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
27Elie Bursztein, Borbala Benko, Daniel Margolis, Tadek Pietraszek, Andy Archer, Allan Aquino, Andreas Pitsillidis, Stefan Savage Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
27Lars Roemheld Evolutionary Extortion and Mischief: Zero Determinant strategies in iterated 2x2 games. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
27Michael T. Goodrich, Florian Kerschbaum Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions Search on Bibsonomy CoRR The full citation details ... 2011 DBLP  BibTeX  RDF
27Michael T. Goodrich, Florian Kerschbaum Privacy-enhanced reputation-feedback methods to reduce feedback extortion in online auctions. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Audun Jøsang Trust Extortion on the Internet. Search on Bibsonomy STM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Bill Hancock Extortion Going Online. Search on Bibsonomy Comput. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
27Brian Boyce Cyber extortion - The corporate response. Search on Bibsonomy Comput. Secur. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
27Holger Peterson, Guillaume Poupard Efficient scalable fair cash with off-line extortion prevention. Search on Bibsonomy ICICS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
21Maarten Lambers, Cor J. Veenman Forensic Authorship Attribution Using Compression Distances to Prototypes. Search on Bibsonomy IWCF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. Search on Bibsonomy ACM Trans. Web The full citation details ... 2008 DBLP  DOI  BibTeX  RDF client transparency, game theory, Web servers, DoS Attacks
21Rick Wash Incentive design for home computer security. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2007 DBLP  DOI  BibTeX  RDF botnets
21Nicholas Huber, Katina Michael Minimizing Product Shrinkage across the Supply Chain using Radio Frequency Identification: a Case Study on a Major Australian Retailer. Search on Bibsonomy ICMB The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 A Middleware System for Protecting Against Application Level Denial of Service Attacks. Search on Bibsonomy Middleware The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Stefan Savage Scalable internet threat monitoring. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Michael Vrable, Justin Ma, Jay Chen, David Moore 0001, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage Scalability, fidelity, and containment in the potemkin virtual honeyfarm. Search on Bibsonomy SOSP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF honeyfarm, malware, honeypot, virtual machine monitor, copy-on-write
21Adam L. Young Building a Cryptovirus Using Microsoft's Cryptographic API. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Richard D. Pethia Bugs in the programs. Search on Bibsonomy SIGSOFT FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #54 of 54 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license