default search action
Aron Laszka
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Salah Uddin Kadir, Subir Majumder, Anurag K. Srivastava, Ajay Dev Chhokra, Himanshu Neema, Abhishek Dubey, Aron Laszka:
Reinforcement-Learning-Based Proactive Control for Enabling Power Grid Resilience to Wildfire. IEEE Trans. Ind. Informatics 20(1): 795-805 (2024) - [c89]Taha Eghtesad, Sirui Li, Yevgeniy Vorobeychik, Aron Laszka:
Multi-Agent Reinforcement Learning for Assessing False-Data Injection Attacks on Transportation Networks. AAMAS 2024: 508-515 - [c88]Chaeeun Han, Jose Paolo Talusan, Daniel Freudberg, Ayan Mukhopadhyay, Abhishek Dubey, Aron Laszka:
Forecasting and Mitigating Disruptions in Public Bus Transit Services. AAMAS 2024: 798-806 - [c87]Ava Pettet, Yunuo Zhang, Baiting Luo, Kyle Hollins Wray, Hendrik Baier, Aron Laszka, Abhishek Dubey, Ayan Mukhopadhyay:
Decision Making in Non-Stationary Environments with Policy-Augmented Search. AAMAS 2024: 2417-2419 - [c86]Jose Paolo Talusan, Chaeeun Han, Ayan Mukhopadhyay, Aron Laszka, Daniel Freudberg, Abhishek Dubey:
An Online Approach to Solving Public Transit Stationing and Dispatch Problem. ICCPS 2024: 157-168 - [c85]Amutheezan Sivagnanam, Ava Pettet, Hunter Lee, Ayan Mukhopadhyay, Abhishek Dubey, Aron Laszka:
Multi-Agent Reinforcement Learning with Hierarchical Coordination for Emergency Responder Stationing. ICML 2024 - [c84]Sophie Pavia, David Rogers, Amutheezan Sivagnanam, Michael Wilbur, Danushka Edirimanna, Youngseo Kim, Philip Pugliese, Samitha Samaranayake, Aron Laszka, Ayan Mukhopadhyay, Abhishek Dubey:
Deploying Mobility-On-Demand for All by Optimizing Paratransit Services. IJCAI 2024: 7430-7437 - [c83]Sophie Pavia, David Rogers, Amutheezan Sivagnanam, Michael Wilbur, Danushka Edirimanna, Youngseo Kim, Ayan Mukhopadhyay, Philip Pugliese, Samitha Samaranayake, Aron Laszka, Abhishek Dubey:
SmartTransit.AI: A Dynamic Paratransit and Microtransit Application. IJCAI 2024: 8767-8770 - [i59]Ava Pettet, Yunuo Zhang, Baiting Luo, Kyle Hollins Wray, Hendrik Baier, Aron Laszka, Abhishek Dubey, Ayan Mukhopadhyay:
Decision Making in Non-Stationary Environments with Policy-Augmented Search. CoRR abs/2401.03197 (2024) - [i58]Vivek Karihaloo, Ruchi Shah, Panruo Wu, Aron Laszka:
Pipelet: Practical Streamlined Blockchain Protocol. CoRR abs/2401.07162 (2024) - [i57]Jose Paolo Talusan, Chaeeun Han, Ayan Mukhopadhyay, Aron Laszka, Daniel Freudberg, Abhishek Dubey:
An Online Approach to Solving Public Transit Stationing and Dispatch Problem. CoRR abs/2403.03339 (2024) - [i56]Chaeeun Han, Jose Paolo Talusan, Daniel Freudberg, Ayan Mukhopadhyay, Abhishek Dubey, Aron Laszka:
Forecasting and Mitigating Disruptions in Public Bus Transit Services. CoRR abs/2403.04072 (2024) - [i55]Amutheezan Sivagnanam, Ava Pettet, Hunter Lee, Ayan Mukhopadhyay, Abhishek Dubey, Aron Laszka:
Multi-Agent Reinforcement Learning with Hierarchical Coordination for Emergency Responder Stationing. CoRR abs/2405.13205 (2024) - 2023
- [j27]Shanto Roy, Nazia Sharmin, Jaime C. Acosta, Christopher Kiekintveld, Aron Laszka:
Survey and Taxonomy of Adversarial Reconnaissance Techniques. ACM Comput. Surv. 55(6): 112:1-112:38 (2023) - [j26]Keerthi Nelaturu, Anastasia Mavridou, Emmanouela Stachtiari, Andreas G. Veneris, Aron Laszka:
Correct-by-Design Interacting Smart Contracts and a Systematic Approach for Verifying ERC20 and ERC721 Contracts With VeriSolid. IEEE Trans. Dependable Secur. Comput. 20(4): 3110-3127 (2023) - [c82]Soodeh Atefi, Sakshyam Panda, Emmanouil Panaousis, Aron Laszka:
Principled Data-Driven Decision Support for Cyber-Forensic Investigations. AAAI 2023: 5010-5017 - [c81]Youngseo Kim, Danushka Edirimanna, Michael Wilbur, Philip Pugliese, Aron Laszka, Abhishek Dubey, Samitha Samaranayake:
Rolling Horizon Based Temporal Decomposition for the Offline Pickup and Delivery Problem with Time Windows. AAAI 2023: 5151-5159 - [c80]Raunak Sarbajna, Christoph F. Eick, Aron Laszka:
PhobosBC: A Blockchain-based Crowdsourced Post-disaster Mapping System and its Agent-based Simulation. GeoSim@SIGSPATIAL 2023: 10-18 - [c79]Nazia Sharmin, Shanto Roy, Aron Laszka, Jaime C. Acosta, Christopher Kiekintveld:
Bayesian Models for Node-Based Inference Techniques. SysCon 2023: 1-8 - [c78]Omer Akgul, Taha Eghtesad, Amit Elazari, Omprakash Gnawali, Jens Grossklags, Michelle L. Mazurek, Daniel Votipka, Aron Laszka:
Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem. USENIX Security Symposium 2023: 2275-2291 - [c77]Soodeh Atefi, Amutheezan Sivagnanam, Afiya Ayman, Jens Grossklags, Aron Laszka:
The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox. WWW 2023: 2209-2219 - [i54]Omer Akgul, Taha Eghtesad, Amit Elazari, Omprakash Gnawali, Jens Grossklags, Michelle L. Mazurek, Daniel Votipka, Aron Laszka:
Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem. CoRR abs/2301.04781 (2023) - [i53]Soodeh Atefi, Amutheezan Sivagnanam, Afiya Ayman, Jens Grossklags, Aron Laszka:
The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox. CoRR abs/2301.12092 (2023) - [i52]Youngseo Kim, Danushka Edirimanna, Michael Wilbur, Philip Pugliese, Aron Laszka, Abhishek Dubey, Samitha Samaranayake:
Rolling Horizon based Temporal Decomposition for the Offline Pickup and Delivery Problem with Time Windows. CoRR abs/2303.03475 (2023) - [i51]Shanto Roy, Emmanouil Panaousis, Cameron Noakes, Aron Laszka, Sakshyam Panda, George Loukas:
SoK: The MITRE ATT&CK Framework in Research and Practice. CoRR abs/2304.07411 (2023) - [i50]Shanto Roy, Nazia Sharmin, Mohammad Sujan Miah, Jaime C. Acosta, Christopher Kiekintveld, Aron Laszka:
Adversarial Reconnaissance Mitigation and Modeling. CoRR abs/2306.06769 (2023) - [i49]Michael Wilbur, Amutheezan Sivagnanam, Afiya Ayman, Samitha Samaranayake, Abhishek Dubey, Aron Laszka:
Artificial Intelligence for Smart Transportation. CoRR abs/2308.07457 (2023) - [i48]Afiya Ayman, Ayan Mukhopadhyay, Aron Laszka:
Task Grouping for Automated Multi-Task Machine Learning via Task Affinity Prediction. CoRR abs/2310.16241 (2023) - [i47]Taha Eghtesad, Sirui Li, Yevgeniy Vorobeychik, Aron Laszka:
Hierarchical Multi-Agent Reinforcement Learning for Assessing False-Data Injection Attacks on Transportation Networks. CoRR abs/2312.14625 (2023) - 2022
- [j25]Afiya Ayman, Amutheezan Sivagnanam, Michael Wilbur, Philip Pugliese, Abhishek Dubey, Aron Laszka:
Data-Driven Prediction and Optimization of Energy Use for Transit Fleets of Electric and ICE Vehicles. ACM Trans. Internet Techn. 22(1): 7:1-7:29 (2022) - [c76]Scott Eisele, Michael Wilbur, Taha Eghtesad, Kevin Silvergold, Fred Eisele, Ayan Mukhopadhyay, Aron Laszka, Abhishek Dubey:
Decentralized Computation Market for Stream Processing Applications. IC2E 2022: 36-46 - [c75]Michael Bartholic, Aron Laszka, Go Yamamoto, Eric William Burger:
A Taxonomy of Blockchain Oracles: The Truth Depends on the Question. ICBC 2022: 1-15 - [c74]Michael Wilbur, Salah Uddin Kadir, Youngseo Kim, Geoffrey Pettet, Ayan Mukhopadhyay, Philip Pugliese, Samitha Samaranayake, Aron Laszka, Abhishek Dubey:
An Online Approach to Solve the Dynamic Vehicle Routing Problem with Stochastic Trip Requests for Paratransit Services. ICCPS 2022: 147-158 - [c73]Amutheezan Sivagnanam, Salah Uddin Kadir, Ayan Mukhopadhyay, Philip Pugliese, Abhishek Dubey, Samitha Samaranayake, Aron Laszka:
Offline Vehicle Routing Problem with Online Bookings: A Novel Problem Formulation with Applications to Paratransit. IJCAI 2022: 3933-3939 - [c72]Afiya Ayman, Juan Martinez, Philip Pugliese, Abhishek Dubey, Aron Laszka:
Neural Architecture and Feature Search for Predicting the Ridership of Public Transportation Routes. SMARTCOMP 2022: 56-61 - [i46]Michael Wilbur, Salah Uddin Kadir, Youngseo Kim, Geoffrey Pettet, Ayan Mukhopadhyay, Philip Pugliese, Samitha Samaranayake, Aron Laszka, Abhishek Dubey:
An Online Approach to Solve the Dynamic Vehicle Routing Problem with Stochastic Trip Requests for Paratransit Services. CoRR abs/2203.15127 (2022) - [i45]Amutheezan Sivagnanam, Salah Uddin Kadir, Ayan Mukhopadhyay, Philip Pugliese, Abhishek Dubey, Samitha Samaranayake, Aron Laszka:
Offline Vehicle Routing Problem with Online Bookings: A Novel Problem Formulation with Applications to Paratransit. CoRR abs/2204.11992 (2022) - [i44]Soodeh Atefi, Sakshyam Panda, Manos Panaousis, Aron Laszka:
Principled Data-Driven Decision Support for Cyber-Forensic Investigations. CoRR abs/2211.13345 (2022) - 2021
- [j24]Scott Eisele, Taha Eghtesad, Keegan Campanelli, Prakhar Agrawal, Aron Laszka, Abhishek Dubey:
Safe and Private Forward-trading Platform for Transactive Microgrids. ACM Trans. Cyber Phys. Syst. 5(1): 8:1-8:29 (2021) - [j23]Antonia Nisioti, George Loukas, Aron Laszka, Emmanouil Panaousis:
Data-Driven Decision Support for Optimizing Cyber Forensic Investigations. IEEE Trans. Inf. Forensics Secur. 16: 2397-2412 (2021) - [c71]Amutheezan Sivagnanam, Afiya Ayman, Michael Wilbur, Philip Pugliese, Abhishek Dubey, Aron Laszka:
Minimizing Energy Use of Mixed-Fleet Public Transit for Fixed-Route Service. AAAI 2021: 14930-14938 - [c70]Raunak Sarbajna, Christoph F. Eick, Aron Laszka:
DEIMOSBC: A Blockchain-based System for Crowdsensing after Natural Disasters. BRAINS 2021: 17-20 - [c69]Yoko Shibuya, Go Yamamoto, Fuhito Kojima, Elaine Shi, Shin'ichiro Matsuo, Aron Laszka:
Selfish Mining Attacks Exacerbated by Elastic Hash Supply. Financial Cryptography (2) 2021: 269-276 - [c68]Shanto Roy, Salah Uddin Kadir, Yevgeniy Vorobeychik, Aron Laszka:
Strategic Remote Attestation: Testbed for Internet-of-Things Devices and Stackelberg Security Game for Optimal Strategies. GameSec 2021: 271-290 - [c67]Nicholas Troutman, Aron Laszka:
PoolParty: Efficient Blockchain-Agnostic Decentralized Mining Pool. ICBCT 2021: 20-27 - [c66]Michael Wilbur, Ayan Mukhopadhyay, Sayyed Vazirizade, Philip Pugliese, Aron Laszka, Abhishek Dubey:
Energy and Emission Prediction for Mixed-Vehicle Transit Fleets Using Multi-task and Inductive Transfer Learning. ECML/PKDD (4) 2021: 502-517 - [c65]Ruixiao Sun, Rongze Gui, Himanshu Neema, Yuche Chen, Juliette Ugirumurera, Joseph Severino, Philip Pugliese, Aron Laszka, Abhishek Dubey:
TRANSIT-GYM: A Simulation and Evaluation Engine for Analysis of Bus Transit Systems. SMARTCOMP 2021: 69-76 - [i43]Michael Wilbur, Philip Pugliese, Aron Laszka, Abhishek Dubey:
Efficient Data Management for Intelligent Urban Mobility Systems. CoRR abs/2101.09261 (2021) - [i42]Yoko Shibuya, Go Yamamoto, Fuhito Kojima, Elaine Shi, Shin'ichiro Matsuo, Aron Laszka:
Selfish Mining Attacks Exacerbated by Elastic Hash Supply. CoRR abs/2103.08007 (2021) - [i41]Shanto Roy, Nazia Sharmin, Jaime C. Acosta, Christopher Kiekintveld, Aron Laszka:
Survey and Taxonomy of Adversarial Reconnaissance Techniques. CoRR abs/2105.04749 (2021) - [i40]Ruixiao Sun, Rongze Gui, Himanshu Neema, Yuche Chen, Juliette Ugirumurera, Joseph Severino, Philip Pugliese, Aron Laszka, Abhishek Dubey:
Transit-Gym: A Simulation and Evaluation Engine for Analysis of Bus Transit Systems. CoRR abs/2107.00105 (2021) - [i39]Salah U. Kadir, Subir Majumder, Ajay Dev Chhokra, Abhishek Dubey, Himanshu Neema, Aron Laszka, Anurag K. Srivastava:
Reinforcement Learning based Proactive Control for Transmission Grid Resilience to Wildfire. CoRR abs/2107.05756 (2021) - [i38]Shanto Roy, Salah Uddin Kadir, Yevgeniy Vorobeychik, Aron Laszka:
Strategic Remote Attestation: Testbed for Internet-of-Things Devices and Stackelberg Security Game for Optimal Strategies. CoRR abs/2109.07724 (2021) - 2020
- [j22]Scott Eisele, Carlos A. Barreto, Abhishek Dubey, Xenofon D. Koutsoukos, Taha Eghtesad, Aron Laszka, Anastasia Mavridou:
Blockchains for Transactive Energy Systems: Opportunities, Challenges, and Approaches. Computer 53(9): 66-76 (2020) - [j21]Scott Eisele, Aron Laszka, Douglas C. Schmidt, Abhishek Dubey:
The Role of Blockchains in Multi-Stakeholder Transactive Energy Systems. Frontiers Blockchain 3: 593471 (2020) - [j20]Md Whaiduzzaman, Md. Razon Hossain, Ahmedur Rahman Shovon, Shanto Roy, Aron Laszka, Rajkumar Buyya, Alistair Barros:
A Privacy-Preserving Mobile and Fog Computing Framework to Trace and Prevent COVID-19 Community Transmission. IEEE J. Biomed. Health Informatics 24(12): 3564-3575 (2020) - [j19]Waseem Abbas, Aron Laszka, Mudassir Shabbir, Xenofon D. Koutsoukos:
Graph-Theoretic Approach for Increasing Participation in Networks With Assorted Resources. IEEE Trans. Netw. Sci. Eng. 7(3): 930-946 (2020) - [c64]Liang Tong, Aron Laszka, Chao Yan, Ning Zhang, Yevgeniy Vorobeychik:
Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning. AAAI 2020: 946-953 - [c63]Mudabbir Kaleem, Anastasia Mavridou, Aron Laszka:
Vyper: A Security Comparison with Solidity Based on Common Vulnerabilities. BRAINS 2020: 107-111 - [c62]Go Yamamoto, Aron Laszka, Fuhito Kojima:
Equilibrium of Blockchain Miners with Dynamic Asset Allocation. BRAINS 2020: 227-231 - [c61]Scott Eisele, Taha Eghtesad, Nicholas Troutman, Aron Laszka, Abhishek Dubey:
Mechanisms for outsourcing computation via a decentralized market. DEBS 2020: 61-72 - [c60]Afiya Ayman, Shanto Roy, Amin Alipour, Aron Laszka:
Smart Contract Development from the Perspective of Developers: Topics and Issues Discussed on Social Media. Financial Cryptography Workshops 2020: 405-422 - [c59]Taha Eghtesad, Yevgeniy Vorobeychik, Aron Laszka:
Adversarial Deep Reinforcement Learning Based Adaptive Moving Target Defense. GameSec 2020: 58-79 - [c58]Keerthi Nelaturu, Anastasia Mavridou, Andreas G. Veneris, Aron Laszka:
Verified Development and Deployment of Multiple Interacting Smart Contracts with VeriSolid. IEEE ICBC 2020: 1-9 - [c57]Carlos A. Barreto, Taha Eghtesad, Scott Eisele, Aron Laszka, Abhishek Dubey, Xenofon D. Koutsoukos:
Cyber-Attacks and Mitigation in Blockchain Based Transactive Energy Systems. ICPS 2020: 129-136 - [c56]Afiya Ayman, Michael Wilbur, Amutheezan Sivagnanam, Philip Pugliese, Abhishek Dubey, Aron Laszka:
Data-Driven Prediction of Route-Level Energy Use for Mixed-Vehicle Transit Fleets. SMARTCOMP 2020: 41-48 - [c55]Sadegh Farhang, Mehmet Bahadir Kirdan, Aron Laszka, Jens Grossklags:
An Empirical Study of Android Security Bulletins in Different Vendors. WWW 2020: 3063-3069 - [i37]Sadegh Farhang, Mehmet Bahadir Kirdan, Aron Laszka, Jens Grossklags:
An Empirical Study of Android Security Bulletins in Different Vendors. CoRR abs/2002.09629 (2020) - [i36]Madhumitha Harishankar, Dimitrios-Georgios Akestoridis, Sriram V. Iyer, Aron Laszka, Carlee Joe-Wong, Patrick Tague:
Plasma Go: A Scalable Sidechain Protocol for Flexible Payment Mechanisms in Blockchain-based Marketplaces. CoRR abs/2003.06197 (2020) - [i35]Mudabbir Kaleem, Aron Laszka:
Vyper: A Security Comparison with Solidity Based on Common Vulnerabilities. CoRR abs/2003.07435 (2020) - [i34]Yuche Chen, Guoyuan Wu, Ruixiao Sun, Abhishek Dubey, Aron Laszka, Philip Pugliese:
A Review and Outlook of Energy Consumption Estimation Models for Electric Vehicles. CoRR abs/2003.12873 (2020) - [i33]Amutheezan Sivagnanam, Afiya Ayman, Michael Wilbur, Philip Pugliese, Abhishek Dubey, Aron Laszka:
Minimizing Energy Use of Mixed-Fleet Public Transit for Fixed-Route Service. CoRR abs/2004.05146 (2020) - [i32]Afiya Ayman, Michael Wilbur, Amutheezan Sivagnanam, Philip Pugliese, Abhishek Dubey, Aron Laszka:
Data-Driven Prediction of Route-Level Energy Use for Mixed-Vehicle Transit Fleets. CoRR abs/2004.06043 (2020) - [i31]Scott Eisele, Taha Eghtesad, Nicholas Troutman, Aron Laszka, Abhishek Dubey:
Mechanisms for Outsourcing Computation via a Decentralized Market. CoRR abs/2005.11429 (2020) - [i30]Go Yamamoto, Aron Laszka, Fuhito Kojima:
Equilibrium of Blockchain Miners with Dynamic Asset Allocation. CoRR abs/2006.08016 (2020) - [i29]Md Whaiduzzaman, Md. Razon Hossain, Ahmedur Rahman Shovon, Shanto Roy, Aron Laszka, Rajkumar Buyya, Alistair Barros:
A Privacy-preserving Mobile and Fog Computing Framework to Trace and Prevent COVID-19 Community Transmission. CoRR abs/2006.13364 (2020) - [i28]Michael Wilbur, Afiya Ayman, Anna Ouyang, Vincent Poon, Riyan Kabir, Abhiram Vadali, Philip Pugliese, Daniel Freudberg, Aron Laszka, Abhishek Dubey:
Impact of COVID-19 on Public Transit Accessibility and Ridership. CoRR abs/2008.02413 (2020)
2010 – 2019
- 2019
- [j18]Amin Ghafouri, Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
A game-theoretic approach for selecting optimal time-dependent thresholds for anomaly detection. Auton. Agents Multi Agent Syst. 33(4): 430-456 (2019) - [j17]Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Detection and mitigation of attacks on transportation networks as a multi-stage security game. Comput. Secur. 87 (2019) - [j16]Sakshyam Panda, Daniel W. Woods, Aron Laszka, Andrew Fielder, Emmanouil Panaousis:
Post-incident audits on cyber insurance discounts. Comput. Secur. 87 (2019) - [j15]Chao Yan, Bo Li, Yevgeniy Vorobeychik, Aron Laszka, Daniel Fabbri, Bradley A. Malin:
Database Audit Workload Prioritization via Game Theory. ACM Trans. Priv. Secur. 22(3): 17:1-17:21 (2019) - [c54]Waseem Abbas, Aron Laszka, Xenofon D. Koutsoukos:
Diversity and Trust to Increase Structural Robustness in Networks. ACC 2019: 4043-4048 - [c53]Yue Zhang, Scott Eisele, Abhishek Dubey, Aron Laszka, Anurag K. Srivastava:
Cyber-Physical Simulation Platform for Security Assessment of Transactive Energy Systems. MSCPES@CPSIoTWeek 2019: 1-6 - [c52]Anastasia Mavridou, Aron Laszka, Emmanouela Stachtiari, Abhishek Dubey:
VeriSolid: Correct-by-Design Smart Contracts for Ethereum. Financial Cryptography 2019: 446-465 - [c51]Shreyas Ramakrishna, Abhishek Dubey, Matthew P. Burruss, Charles Hartsell, Nagabhushan Mahadevan, Saideep Nannapaneni, Aron Laszka, Gabor Karsai:
Augmenting Learning Components for Safety in Resource Constrained Autonomous Robots. ISORC 2019: 108-117 - [i27]Anastasia Mavridou, Aron Laszka, Emmanouela Stachtiari, Abhishek Dubey:
VeriSolid: Correct-by-Design Smart Contracts for Ethereum. CoRR abs/1901.01292 (2019) - [i26]Aron Laszka, Scott Eisele, Abhishek Dubey, Gabor Karsai, Karla Kvaternik:
TRANSAX: A Blockchain-based Decentralized Forward-Trading Energy Exchange for Transactive Microgrids. CoRR abs/1902.00844 (2019) - [i25]Shreyas Ramakrishna, Abhishek Dubey, Matthew P. Burruss, Charles Hartsell, Nagabhushan Mahadevan, Saideep Nannapaneni, Aron Laszka, Gabor Karsai:
Augmenting Learning Components for Safety in Resource Constrained Autonomous Robots. CoRR abs/1902.02432 (2019) - [i24]Yue Zhang, Scott Eisele, Abhishek Dubey, Aron Laszka, Anurag K. Srivastava:
Cyber-Physical Simulation Platform for Security Assessment of Transactive Energy Systems. CoRR abs/1903.01520 (2019) - [i23]Benjamin Johnson, Aron Laszka, Jens Grossklags, Tyler Moore:
Economic Analyses of Security Investments on Cryptocurrency Exchanges. CoRR abs/1904.09381 (2019) - [i22]Afiya Ayman, Amna Aziz, Amin Alipour, Aron Laszka:
Smart Contract Development in Practice: Trends, Issues, and Discussions on Stack Overflow. CoRR abs/1905.08833 (2019) - [i21]Sadegh Farhang, Mehmet Bahadir Kirdan, Aron Laszka, Jens Grossklags:
Hey Google, What Exactly Do Your Security Patches Tell Us? A Large-Scale Empirical Study on Android Patched Vulnerabilities. CoRR abs/1905.09352 (2019) - [i20]Liang Tong, Aron Laszka, Chao Yan, Ning Zhang, Yevgeniy Vorobeychik:
Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning. CoRR abs/1906.08805 (2019) - [i19]Sakshyam Panda, Daniel W. Woods, Aron Laszka, Andrew Fielder, Emmanouil Panaousis:
Post-Incident Audits on Cyber Insurance Discounts. CoRR abs/1908.04867 (2019) - [i18]Scott Eisele, Taha Eghtesad, Keegan Campanelli, Prakhar Agrawal, Aron Laszka, Abhishek Dubey:
Safe and Private Forward-Trading Platform for Transactive Microgrids. CoRR abs/1910.12579 (2019) - [i17]Taha Eghtesad, Yevgeniy Vorobeychik, Aron Laszka:
Deep Reinforcement Learning based Adaptive Moving Target Defense. CoRR abs/1911.11972 (2019) - 2018
- [j14]Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
A game-theoretic approach for integrity assurance in resource-bounded systems. Int. J. Inf. Sec. 17(2): 221-242 (2018) - [j13]Xenofon D. Koutsoukos, Gabor Karsai, Aron Laszka, Himanshu Neema, Bradley Potteiger, Péter Völgyesi, Yevgeniy Vorobeychik, Janos Sztipanovits:
SURE: A Modeling and Simulation Integration Platform for Evaluation of Secure and Resilient Cyber-Physical Systems. Proc. IEEE 106(1): 93-112 (2018) - [j12]Amin Ghafouri, Aron Laszka, Xenofon D. Koutsoukos:
Application-Aware Anomaly Detection of Sensor Measurements in Cyber-Physical Systems. Sensors 18(8): 2448 (2018) - [j11]Waseem Abbas, Aron Laszka, Xenofon D. Koutsoukos:
Improving Network Connectivity and Robustness Using Trusted Nodes With Application to Resilient Consensus. IEEE Trans. Control. Netw. Syst. 5(4): 2036-2048 (2018) - [j10]Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks. IEEE Trans. Netw. Sci. Eng. 5(1): 65-78 (2018) - [j9]Aron Laszka, Benjamin Johnson, Jens Grossklags:
On the Assessment of Systematic Risk in Networked Systems. ACM Trans. Internet Techn. 18(4): 48:1-48:28 (2018) - [c50]Sadegh Farhang, Aron Laszka, Jens Grossklags:
An Economic Study of the Effect of Android Platform Fragmentation on Security Updates. Financial Cryptography 2018: 119-137 - [c49]Aron Laszka, Mingyi Zhao, Akash Malbari, Jens Grossklags:
The Rules of Engagement for Bug Bounty Programs. Financial Cryptography 2018: 138-159 - [c48]Anastasia Mavridou, Aron Laszka:
Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach. Financial Cryptography 2018: 523-540 - [c47]Aron Laszka, Emmanouil Panaousis, Jens Grossklags:
Cyber-Insurance as a Signaling Game: Self-reporting and External Security Audits. GameSec 2018: 508-520 - [c46]Chao Yan, Bo Li, Yevgeniy Vorobeychik, Aron Laszka, Daniel Fabbri, Bradley A. Malin:
Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing. ICDE 2018: 1304-1307 - [c45]Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening. ICII 2018: 153-158 - [c44]Aron Laszka, Scott Eisele, Abhishek Dubey, Gabor Karsai, Karla Kvaternik:
TRANSAX: A Blockchain-Based Decentralized Forward-Trading Energy Exchanged for Transactive Microgrids. ICPADS 2018: 918-927 - [c43]Benjamin Johnson, Aron Laszka, Jens Grossklags, Tyler Moore:
Economic Analyses of Security Investments on Cryptocurrency Exchanges. iThings/GreenCom/CPSCom/SmartData 2018: 1253-1262 - [c42]Scott Eisele, Aron Laszka, Anastasia Mavridou, Abhishek Dubey:
SolidWorx: A Resilient and Trustworthy Transactive Platform for Smart and Connected Communities. iThings/GreenCom/CPSCom/SmartData 2018: 1263-1272 - [c41]Anastasia Mavridou, Aron Laszka:
Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts. POST 2018: 270-277 - [i16]Chao Yan, Bo Li, Yevgeniy Vorobeychik, Aron Laszka, Daniel Fabbri, Bradley A. Malin:
Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing. CoRR abs/1801.07215 (2018) - [i15]Anastasia Mavridou, Aron Laszka:
Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts. CoRR abs/1802.09949 (2018) - [i14]Scott Eisele, Aron Laszka, Anastasia Mavridou, Abhishek Dubey:
SolidWorx: A Resilient and Trustworthy Transactive Platform for Smart and Connected Communities. CoRR abs/1804.08133 (2018) - [i13]Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Detection and Mitigation of Attacks on Transportation Networks as a Multi-Stage Security Game. CoRR abs/1808.08349 (2018) - [i12]Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening. CoRR abs/1808.09090 (2018) - 2017
- [j8]Aron Laszka, Waseem Abbas, Xenofon D. Koutsoukos:
Scheduling Battery-Powered Sensor Networks for Minimizing Detection Delays. IEEE Commun. Lett. 21(4): 789-792 (2017) - [j7]Nika Haghtalab, Aron Laszka, Ariel D. Procaccia, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Monitoring stealthy diffusion. Knowl. Inf. Syst. 52(3): 657-685 (2017) - [c40]Aron Laszka, Yevgeniy Vorobeychik, Daniel Fabbri, Chao Yan, Bradley A. Malin:
A Game-Theoretic Approach for Alert Prioritization. AAAI Workshops 2017 - [c39]Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Improving network connectivity using trusted nodes and edges. ACC 2017: 328-333 - [c38]Amin Ghafouri, Aron Laszka, Abhishek Dubey, Xenofon D. Koutsoukos:
Optimal detection of faulty traffic sensors used in route planning. SCOPE@CPSWeek 2017: 1-6 - [c37]Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Synergic security for smart water networks: redundancy, diversity, and hardening. CySWATER@CPSWeek 2017: 21-24 - [c36]Waseem Abbas, Aron Laszka, Xenofon D. Koutsoukos:
Graph-Theoretic Approach for Increasing Participation in Social Sensing. SocialSens@CPSWeek 2017: 43-48 - [c35]Aron Laszka, Sadegh Farhang, Jens Grossklags:
On the Economics of Ransomware. GameSec 2017: 397-417 - [c34]Aron Laszka, Abhishek Dubey, Michael Walker, Douglas C. Schmidt:
Providing privacy, safety, and security in IoT-based transactive energy systems using distributed ledgers. IOT 2017: 13:1-13:8 - [c33]Jonatan Bergquist, Aron Laszka, Monika Sturm, Abhishek Dubey:
On the design of communication and transaction anonymity in blockchain-based transactive microgrids. SERIAL@Middleware 2017: 3:1-3:6 - [c32]Michael A. Walker, Abhishek Dubey, Aron Laszka, Douglas C. Schmidt:
PlaTIBART: a platform for transactive IoT blockchain applications with repeatable testing. M4IoT@Middleware 2017: 17-22 - [i11]Amin Ghafouri, Aron Laszka, Abhishek Dubey, Xenofon D. Koutsoukos:
Optimal Detection of Faulty Traffic Sensors Used in Route Planning. CoRR abs/1702.02628 (2017) - [i10]Aron Laszka, Sadegh Farhang, Jens Grossklags:
On the Economics of Ransomware. CoRR abs/1707.06247 (2017) - [i9]Karla Kvaternik, Aron Laszka, Michael Walker, Douglas C. Schmidt, Monika Sturm, Martin Lehofer, Abhishek Dubey:
Privacy-Preserving Platform for Transactive Energy Systems. CoRR abs/1709.09597 (2017) - [i8]Jonatan Bergquist, Aron Laszka, Monika Sturm, Abhishek Dubey:
On the Design of Communication and Transaction Anonymity in Blockchain-Based Transactive Microgrids. CoRR abs/1709.09601 (2017) - [i7]Michael A. Walker, Abhishek Dubey, Aron Laszka, Douglas C. Schmidt:
PlaTIBART: a Platform for Transactive IoT Blockchain Applications with Repeatable Testing. CoRR abs/1709.09612 (2017) - [i6]Aron Laszka, Abhishek Dubey, Michael Walker, Douglas C. Schmidt:
Providing Privacy, Safety, and Security in IoT-Based Transactive Energy Systems using Distributed Ledgers. CoRR abs/1709.09614 (2017) - [i5]Anastasia Mavridou, Aron Laszka:
Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach. CoRR abs/1711.09327 (2017) - [i4]Sadegh Farhang, Aron Laszka, Jens Grossklags:
An Economic Study of the Effect of Android Platform Fragmentation on Security Updates. CoRR abs/1712.08222 (2017) - 2016
- [c31]Aron Laszka, Jian Lou, Yevgeniy Vorobeychik:
Multi-Defender Strategic Filtering Against Spear-Phishing Attacks. AAAI 2016: 537-543 - [c30]Aron Laszka, Mingyi Zhao, Jens Grossklags:
Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms. ESORICS (2) 2016: 161-178 - [c29]Aron Laszka, Galina Schwartz:
Becoming Cybercriminals: Incentives in Networks with Interdependent Security - Incentives in Networks with Interdependent Security. GameSec 2016: 349-369 - [c28]Amin Ghafouri, Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments. GameSec 2016: 415-434 - [c27]Aron Laszka, Waseem Abbas, S. Shankar Sastry, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Optimal thresholds for intrusion detection systems. HotSoS 2016: 72-81 - [c26]Aron Laszka, Bradley Potteiger, Yevgeniy Vorobeychik, Saurabh Amin, Xenofon D. Koutsoukos:
Vulnerability of Transportation Networks to Traffic-Signal Tampering. ICCPS 2016: 16:1-16:10 - [i3]Emmanouil A. Panaousis, Aron Laszka, Johannes Pohl, Andreas Noack, Tansu Alpcan:
Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking. CoRR abs/1601.00167 (2016) - [i2]Amin Ghafouri, Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments. CoRR abs/1606.06707 (2016) - [i1]Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Scheduling Resource-Bounded Monitoring Devices for Event Detection and Isolation in Networks. CoRR abs/1608.07329 (2016) - 2015
- [j6]Aron Laszka, Assane Gueye:
Network Topology Vulnerability/Cost Trade-Off: Model, Application, and Computational Complexity. Internet Math. 11(6): 588-626 (2015) - [j5]Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, Rainer Böhme:
Adaptive Steganography and Steganalysis with Fixed-Size Embedding. Trans. Data Hiding Multim. Secur. 10: 69-91 (2015) - [c25]Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Optimal Personalized Filtering Against Spear-Phishing Attacks. AAAI 2015: 958-964 - [c24]Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems. CPS-SPC@CCS 2015: 55-66 - [c23]Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Resilient observation selection in adversarial settings. CDC 2015: 7416-7421 - [c22]Aron Laszka, Jens Grossklags:
Should Cyber-Insurance Providers Invest in Software Security? ESORICS (1) 2015: 483-502 - [c21]Aron Laszka, Benjamin Johnson, Jens Grossklags:
When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools. Financial Cryptography Workshops 2015: 63-77 - [c20]Benjamin Johnson, Aron Laszka, Jens Grossklags:
Games of Timing for Security in Dynamic Environments. GameSec 2015: 57-73 - [c19]Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Integrity assurance in resource-bounded systems through stochastic message authentication. HotSoS 2015: 1:1-1:12 - [c18]George Rontidis, Emmanouil A. Panaousis, Aron Laszka, Tasos Dagiuklas, Pasquale Malacaria, Tansu Alpcan:
A game-theoretic approach for minimizing security risks in the Internet-of-Things. ICC Workshops 2015: 2639-2644 - [c17]Nika Haghtalab, Aron Laszka, Ariel D. Procaccia, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Monitoring Stealthy Diffusion. ICDM 2015: 151-160 - [c16]Emmanouil A. Panaousis, Aron Laszka, Johannes Pohl, Andreas Noack, Tansu Alpcan:
Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking. TrustCom/BigDataSE/ISPA (1) 2015: 1006-1013 - 2014
- [b1]Aron Laszka:
Robustness Against Strategic Attacks. Budapest University of Technology and Economics, Hungary, 2014 - [j4]Aron Laszka, Márk Félegyházi, Levente Buttyán:
A Survey of Interdependent Information Security Games. ACM Comput. Surv. 47(2): 23:1-23:38 (2014) - [j3]Aron Laszka, Assane Gueye:
Quantifying all-to-one network topology robustness under budget constraints. SIGMETRICS Perform. Evaluation Rev. 41(4): 8-11 (2014) - [j2]Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme:
Secure Team Composition to Thwart Insider Threats and Cyber-Espionage. ACM Trans. Internet Techn. 14(2-3): 19:1-19:22 (2014) - [c15]Benjamin Johnson, Aron Laszka, Jens Grossklags:
How many down?: toward understanding systematic risk in networks. AsiaCCS 2014: 495-500 - [c14]Benjamin Johnson, Aron Laszka, Jens Grossklags:
The Complexity of Estimating Systematic Risk in Networks. CSF 2014: 325-336 - [c13]Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, Tyler Moore:
Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools. Financial Cryptography Workshops 2014: 72-86 - [c12]Aron Laszka, Benjamin Johnson, Jens Grossklags, Márk Félegyházi:
Estimating Systematic Risk in Real-World Networks. Financial Cryptography 2014: 417-435 - [c11]Aron Laszka, Gábor Horváth, Márk Félegyházi, Levente Buttyán:
FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources. GameSec 2014: 175-194 - 2013
- [j1]Aron Laszka, Levente Buttyán, Dávid Szeszlér:
Designing robust network topologies for wireless sensor networks in adversarial environments. Pervasive Mob. Comput. 9(4): 546-563 (2013) - [c10]Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme:
Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats. ESORICS 2013: 273-290 - [c9]Pascal Schöttle, Aron Laszka, Benjamin Johnson, Jens Grossklags, Rainer Böhme:
A game-theoretic analysis of content-adaptive steganography with independent embedding. EUSIPCO 2013: 1-5 - [c8]Aron Laszka, Assane Gueye:
Quantifying Network Topology Robustness under Budget Constraints: General Model and Computational Complexity. GameSec 2013: 154-174 - [c7]Aron Laszka, Benjamin Johnson, Jens Grossklags:
Mitigation of Targeted and Non-targeted Covert Attacks as a Timing Game. GameSec 2013: 175-191 - [c6]Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, Rainer Böhme:
Bitspotting: Detecting Optimal Adaptive Steganography. IWDW 2013: 3-18 - [c5]Aron Laszka, Benjamin Johnson, Jens Grossklags:
Mitigating Covert Compromises - A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks. WINE 2013: 319-332 - 2012
- [c4]Aron Laszka, Dávid Szeszlér, Levente Buttyán:
Game-theoretic Robustness of Many-to-one Networks. GAMENETS 2012: 88-98 - [c3]Aron Laszka, Dávid Szeszlér, Levente Buttyán:
Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link Criticality. GameSec 2012: 152-170 - 2011
- [c2]Aron Laszka, Levente Buttyán, Dávid Szeszlér:
Optimal selection of sink nodes in wireless sensor networks in adversarial environments. WOWMOM 2011: 1-6
2000 – 2009
- 2009
- [c1]Aron Laszka, Annamária R. Várkonyi-Kóczy, Gábor Pék, Péter Várlaki:
Universal autonomous robot navigation using quasi optimal path generation. ICARA 2009: 458-463
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 21:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint