Assessing security of cryptocurrencies with attack-defense trees: proof of concept and future directions
From MaRDI portal
Publication:2119976
DOI10.1007/978-3-030-85315-0_13OpenAlexW3196007188WikidataQ122660071 ScholiaQ122660071MaRDI QIDQ2119976
Publication date: 31 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-85315-0_13
Cites Work
- Unnamed Item
- DAG-based attack and defense modeling: don't miss the forest for the attack trees
- Quantitative analysis of smart contracts
- On quantitative analysis of attack-defense trees with repeated labels
- Fault tree analysis: a survey of the state-of-the-art in modeling, analysis and tools
- Model Checking Exact Cost for Attack Scenarios
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Ergodic Mean-Payoff Games for the Analysis of Attacks in Crypto-Currencies
- Parametric Analyses of Attack-fault Trees*
- Information Security and Cryptology - ICISC 2005
This page was built for publication: Assessing security of cryptocurrencies with attack-defense trees: proof of concept and future directions