Ransomware protection using the moving target defense perspective S Lee, HK Kim, K Kim Computers & Electrical Engineering 78, 288-299, 2019 | 39 | 2019 |
Countering block withholding attack efficiently S Lee, S Kim IEEE INFOCOM 2019 Workshop: The 2nd Workshop on Cryptocurrencies and …, 2019 | 22 | 2019 |
Short selling attack: A self-destructive but profitable 51% attack on pos blockchains S Lee, S Kim Cryptology ePrint Archive, 2020 | 19 | 2020 |
Blockchain as a cyber defense: opportunities, applications, and challenges S Lee, S Kim IEEE Access 10, 2602-2618, 2021 | 17 | 2021 |
Proof-of-stake at stake: predatory, destructive attack on PoS cryptocurrencies S Lee, S Kim MobiCom 2020 Workshop:The 3rd Workshop on Cryptocurrencies and Blockchains …, 2020 | 10 | 2020 |
Pooled mining makes selfish mining tricky S Lee, S Kim Cryptology ePrint Archive, 2018 | 8 | 2018 |
Rethinking selfish mining under pooled mining S Lee, S Kim ICT Express 9 (3), 356-361, 2023 | 7 | 2023 |
Detective mining: Selfish mining becomes unrealistic under mining pool environment S Lee, S Kim Cryptology ePrint Archive, 2019 | 6 | 2019 |
Hiding in the Crowd: Ransomware Protection by Adopting Camouflage and Hiding Strategy With the Link File S Lee, S Lee, J Park, K Kim, K Lee IEEE Access, 2023 | 5 | 2023 |
Shorting attack: Predatory, destructive short selling on Proof‐of‐Stake cryptocurrencies S Lee, S Kim Concurrency and Computation: Practice and Experience 35 (16), e6585, 2023 | 2 | 2023 |
Block Double-Submission Attack: Block Withholding Can Be Self-Destructive S Lee, D Lee, S Kim AFT '22: Proceedings of the 4th ACM Conference on Advances in Financial …, 2022 | 1 | 2022 |
A Tip for IOTA Privacy: IOTA Light Node Deanonymization via Tip Selection H Yang, S Lee, S Kim ICBC '24: The IEEE International Conference on Blockchain and Cryptocurrency …, 2024 | | 2024 |
Do You Really Need to Disguise Normal Servers as Honeypots? S Lee, K Cho, S Kim MILCOM 2022: The IEEE Military Communications Conference (MILCOM) 2022, 166-172, 2022 | | 2022 |