Author of the publication

Temporary Censorship Attacks in the Presence of Rational Miners.

, , and . EuroS&P Workshops, page 357-366. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantitative Analysis of Multiagent Systems Through Statistical Model Checking., , , and . EMAS@AAMAS, volume 9318 of Lecture Notes in Computer Science, page 109-130. Springer, (2015)MC2MABS: A Monte Carlo Model Checker for Multiagent-Based Simulations., , , and . MABS, volume 9568 of Lecture Notes in Computer Science, page 37-54. Springer, (2015)Statistical runtime verification of agent-based simulations.. King's College London, UK, (2015)British Library, EThOS.Monitoring Hierarchical Agent-based Simulation Traces., , , and . AAMAS, page 463-471. ACM, (2015)Quantitative analysis of multi-agent systems through statistical verification of simulation traces., , , and . IJAOSE, 6 (2): 156-186 (2018)Compositional transient reachability analysis for agent-based simulations., , , and . Stud. Inform. Univ., 10 (3): 87-118 (2012)Verification and Validation of Agent-Based Simulations Using Approximate Model Checking., , , and . MABS, volume 8235 of Lecture Notes in Computer Science, page 53-70. Springer, (2013)Temporary Censorship Attacks in the Presence of Rational Miners., , and . EuroS&P Workshops, page 357-366. IEEE, (2019)Detecting Causal Relationships in Simulation Models Using Intervention-based Counterfactual Analysis., and . ACM Trans. Intell. Syst. Technol., 10 (5): 47:1-47:25 (2019)