共 55 条
[2]
ZombieCoin: Powering Next-Generation Botnets with Bitcoin
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015),
2015, 8976
:34-48
[3]
Reliable Recon in Adversarial Peer-to-Peer Botnets
[J].
IMC'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INTERNET MEASUREMENT CONFERENCE,
2015,
:129-140
[4]
Andriesse D, 2013, PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE: THE AMERICAS (MALWARE), P116, DOI 10.1109/MALWARE.2013.6703693
[5]
[Anonymous], 2018, TWITTER IS SWEEPING
[6]
Antonakakis M., 2012, P 21 USENIX SEC S US, P491
[7]
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[8]
Asghari H, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P1
[9]
A Survey of Attacks on Ethereum Smart Contracts (SoK)
[J].
PRINCIPLES OF SECURITY AND TRUST (POST 2017),
2017, 10204
:164-186
[10]
Bartoletti Massimo, 2017, Financial Cryptography and Data Security. FC 2017 International Workshops WAHC, BITCOIN, VOTING, WTSC, and TA. Revised Selected Papers: LNCS 10323, P218, DOI 10.1007/978-3-319-70278-0_14