mirror of
https://github.com/Ownercz/ssme-thesis.git
synced 2025-03-02 07:31:08 +01:00
Literature sources update
This commit is contained in:
parent
ee354f52e7
commit
22b5c61d76
66
Thesis.bib
66
Thesis.bib
@ -1,6 +1,6 @@
|
||||
@online{moneroprojectgithub,
|
||||
author = {Monero-project},
|
||||
title = {{Monero}: the secure, private, untraceable cryptocurrency},
|
||||
title = {{Monero}: the Secure, Private, Untraceable Cryptocurrency},
|
||||
year = 2016,
|
||||
url = {https://github.com/monero-project/monero},
|
||||
urldate = {2018-07-02}
|
||||
@ -59,7 +59,7 @@ isbn="978-3-319-66399-9"
|
||||
|
||||
@online{bitmonero,
|
||||
author = {Thankful\_for\_today},
|
||||
title = {{Bitmonero} release},
|
||||
title = {{Bitmonero} Release},
|
||||
year = 2014,
|
||||
url = {https://github.com/monero-project/monero/commit/1a8f5ce89a990e54ec757affff01f27d449640bc},
|
||||
urldate = {2018-07-02}
|
||||
@ -86,7 +86,7 @@ isbn="978-3-319-66399-9"
|
||||
@online{cryptonotemerkletree,
|
||||
author = {
|
||||
Cryptonotefoundation},
|
||||
title = {CryptoC-3: fix for Merkle tree root issue},
|
||||
title = {CryptoC-3: Fix for Merkle Tree Root Issue},
|
||||
year = 2014,
|
||||
url = {https://github.com/cryptonotefoundation/cryptonote/commit/6be8153a8bddf7be43aca1efb829ba719409787a},
|
||||
urldate = {2018-07-04}
|
||||
@ -132,7 +132,7 @@ Protocol
|
||||
|
||||
@online{moneroalternativeaeon,
|
||||
author = {Aeon Team},
|
||||
title = {AEON - AEON source code (post May 2018 rebase)},
|
||||
title = {AEON - AEON Source Code (post May 2018 Rebase)},
|
||||
year = 2018,
|
||||
url = {https://github.com/aeonix/aeon},
|
||||
urldate = {2018-07-11}
|
||||
@ -140,7 +140,7 @@ Protocol
|
||||
|
||||
@online{moneroalternativebytecoin,
|
||||
author = {Amjuarez},
|
||||
title = {Bytecoin - CryptoNote protocol implementation},
|
||||
title = {Bytecoin - CryptoNote Protocol Implementation},
|
||||
year = 2018,
|
||||
url = {https://github.com/amjuarez/bytecoin},
|
||||
urldate = {2018-07-12}
|
||||
@ -149,7 +149,7 @@ Protocol
|
||||
|
||||
@online{moneroalternativepivx,
|
||||
author = {PIVX-Project},
|
||||
title = {PIVX Core integration/staging repository},
|
||||
title = {PIVX Core Integration/Staging Repository},
|
||||
year = 2018,
|
||||
url = {https://github.com/PIVX-Project/PIVX},
|
||||
urldate = {2018-07-12}
|
||||
@ -183,7 +183,7 @@ Protocol
|
||||
}
|
||||
|
||||
@online{farell2015analysis,
|
||||
title={An analysis of the cryptocurrency industry},
|
||||
title={An Analysis of the Cryptocurrency Industry},
|
||||
author={Farell, Ryan},
|
||||
year={2015},
|
||||
url={https://repository.upenn.edu/cgi/viewcontent.cgi?article=1133&context=wharton_research_scholars},
|
||||
@ -191,7 +191,7 @@ Protocol
|
||||
}
|
||||
|
||||
@incollection{mccorry2017atomically,
|
||||
title={Atomically trading with roger: Gambling on the success of a hardfork},
|
||||
title={Atomically trading with Roger: Gambling on the Success of a Hardfork},
|
||||
author={McCorry, Patrick and Heilman, Ethan and Miller, Andrew},
|
||||
booktitle={Data Privacy Management, Cryptocurrencies and Blockchain Technology},
|
||||
pages={334--353},
|
||||
@ -199,13 +199,13 @@ Protocol
|
||||
publisher={Springer}
|
||||
}
|
||||
@article{iwamura2014bitcoin,
|
||||
title={Is bitcoin the only cryptocurrency in the town? economics of cryptocurrency and friedrich a. hayek},
|
||||
title={Is Bitcoin the only Cryptocurrency in the Town? Economics of Cryptocurrency and Friedrich A. Hayek},
|
||||
author={Iwamura, Mitsuru and Kitamura, Yukinobu and Matsumoto, Tsutomu},
|
||||
year={2014}
|
||||
}
|
||||
|
||||
@article{elbahrawy2017evolutionary,
|
||||
title={Evolutionary dynamics of the cryptocurrency market},
|
||||
title={Evolutionary Dynamics of the Cryptocurrency Market},
|
||||
author={ElBahrawy, Abeer and Alessandretti, Laura and Kandler, Anne and Pastor-Satorras, Romualdo and Baronchelli, Andrea},
|
||||
journal={Royal Society open science},
|
||||
volume={4},
|
||||
@ -216,7 +216,7 @@ Protocol
|
||||
}
|
||||
|
||||
@article{conti2018survey,
|
||||
title={A survey on security and privacy issues of bitcoin},
|
||||
title={A Survey on Security and Privacy Issues of Bitcoin},
|
||||
author={Conti, Mauro and Kumar, Sandeep and Lal, Chhagan and Ruj, Sushmita},
|
||||
journal={IEEE Communications Surveys \& Tutorials},
|
||||
year={2018},
|
||||
@ -224,7 +224,7 @@ Protocol
|
||||
}
|
||||
|
||||
@online{domingues2018allvor,
|
||||
title={Allvor: cryptocurrency for e-commerce powered by the XRP Ledger},
|
||||
title={Allvor: Cryptocurrency for E-commerce powered by the XRP Ledger},
|
||||
author={Domingues, Cleyton},
|
||||
year={2018},
|
||||
url={https://allvor.org/wp-content/uploads/2018/03/Allvor_White_Paper.pdf},
|
||||
@ -269,7 +269,7 @@ Protocol
|
||||
}
|
||||
|
||||
@inproceedings{sun2017ringct,
|
||||
title={RingCT 2.0: a compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero},
|
||||
title={RingCT 2.0: a compact accumulator-based (linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero},
|
||||
author={Sun, Shi-Feng and Au, Man Ho and Liu, Joseph K and Yuen, Tsz Hon},
|
||||
booktitle={European Symposium on Research in Computer Security},
|
||||
pages={456--474},
|
||||
@ -286,10 +286,10 @@ Protocol
|
||||
}
|
||||
|
||||
@online{seguias2018monero,
|
||||
title={Monero’s Building Blocks Part 10 of 10--Stealth addresses},
|
||||
title={Monero’s Building Blocks Part 10 of 10--Stealth Addresses},
|
||||
author={Seguias, Bassam El Khoury},
|
||||
year={2018},
|
||||
url = {https://delfr.com/wp-content/uploads/2018/05/Monero_Building_Blocks_Part.10pdf},
|
||||
url = {https://delfr.com/wp-content/uploads/2018/05/Monero_Building_Blocks_Part10.pdf},
|
||||
urldate = {2018-07-22}
|
||||
}
|
||||
|
||||
@ -302,7 +302,7 @@ Protocol
|
||||
}
|
||||
|
||||
@online{seguias2018moneroa,
|
||||
title={Monero’s Building Blocks Part 9 of 10--RingCT and anatomy of Monero transactions},
|
||||
title={Monero’s Building Blocks Part 9 of 10--RingCT and Anatomy of Monero Transactions},
|
||||
author={Seguias, Bassam El Khoury},
|
||||
year={2018},
|
||||
url = {https://delfr.com/wp-content/uploads/2018/05/Monero_Building_Blocks_Part9.pdf},
|
||||
@ -342,14 +342,14 @@ isbn={978-989-758-209-7},
|
||||
|
||||
@online{ledgermonero,
|
||||
author = {LedgerHQ},
|
||||
title = {Monero wallet application for Ledger},
|
||||
title = {Monero Wallet Application for Ledger},
|
||||
year = 2018,
|
||||
url = {https://github.com/LedgerHQ/blue-app-monero},
|
||||
urldate = {2018-07-29}
|
||||
}
|
||||
|
||||
@inproceedings{schaupp2018cryptocurrency,
|
||||
title={Cryptocurrency adoption and the road to regulation},
|
||||
title={Cryptocurrency Adoption and the Road to Regulation},
|
||||
author={Schaupp, Ludwig Christian and Festa, Mackenzie},
|
||||
booktitle={Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age},
|
||||
pages={78},
|
||||
@ -358,7 +358,7 @@ isbn={978-989-758-209-7},
|
||||
}
|
||||
|
||||
@article{caviglione2017covert,
|
||||
title={Covert channels in personal cloud storage services: The case of Dropbox},
|
||||
title={Covert Channels in Personal Cloud Storage Services: The Case of Dropbox},
|
||||
author={Caviglione, Luca and Podolski, Maciej and Mazurczyk, Wojciech and Ianigro, Massimo},
|
||||
journal={IEEE Transactions on Industrial Informatics},
|
||||
volume={13},
|
||||
@ -385,7 +385,7 @@ isbn={978-989-758-209-7},
|
||||
}
|
||||
|
||||
@article{higbee2018role,
|
||||
title={The role of crypto-currency in cybercrime},
|
||||
title={The role of Crypto-currency in Cybercrime},
|
||||
author={Higbee, Aaron},
|
||||
journal={Computer Fraud \& Security},
|
||||
volume={2018},
|
||||
@ -419,7 +419,7 @@ isbn={978-989-758-209-7},
|
||||
}
|
||||
|
||||
@inproceedings{wijayamonero,
|
||||
title={Monero ring attack: Recreating zero mixin transaction effect},
|
||||
title={Monero Ring Attack: Recreating Zero Mixin Transaction Effect},
|
||||
author={Wijaya, Dimaz Ankaa and Liu, Joseph and Steinfeld, Ron and Liu, Dongxi},
|
||||
booktitle={2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)},
|
||||
pages={1196--1201},
|
||||
@ -437,7 +437,7 @@ isbn={978-989-758-209-7},
|
||||
}
|
||||
|
||||
@inproceedings{krombholz2016other,
|
||||
title={The other side of the coin: User experiences with bitcoin security and privacy},
|
||||
title={The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy},
|
||||
author={Krombholz, Katharina and Judmayer, Aljosha and Gusenbauer, Matthias and Weippl, Edgar},
|
||||
booktitle={International Conference on Financial Cryptography and Data Security},
|
||||
pages={555--580},
|
||||
@ -446,7 +446,7 @@ isbn={978-989-758-209-7},
|
||||
}
|
||||
|
||||
@incollection{tarasiewicz2015cryptocurrencies,
|
||||
title={Cryptocurrencies as distributed community experiments},
|
||||
title={Cryptocurrencies as Distributed Community Experiments},
|
||||
author={Tarasiewicz, Matthias and Newman, Andrew},
|
||||
booktitle={Handbook of digital currency},
|
||||
pages={201--222},
|
||||
@ -455,7 +455,7 @@ isbn={978-989-758-209-7},
|
||||
}
|
||||
|
||||
@techreport{cong2018decentralized,
|
||||
title={Decentralized mining in centralized pools},
|
||||
title={Decentralized Mining in Centralized Pools},
|
||||
author={Cong, Lin William and He, Zhiguo and Li, Jiasun},
|
||||
year={2019},
|
||||
institution={National Bureau of Economic Research}
|
||||
@ -469,7 +469,7 @@ isbn={978-989-758-209-7},
|
||||
}
|
||||
|
||||
@inproceedings{tahir2017mining,
|
||||
title={Mining on someone else’s dime: Mitigating covert mining operations in clouds and enterprises},
|
||||
title={Mining on Someone Else’s Dime: Mitigating Covert Mining Operations in Clouds and Enterprises},
|
||||
author={Tahir, Rashid and Huzaifa, Muhammad and Das, Anupam and Ahmad, Mohammad and Gunter, Carl and Zaffar, Fareed and Caesar, Matthew and Borisov, Nikita},
|
||||
booktitle={International Symposium on Research in Attacks, Intrusions, and Defenses},
|
||||
pages={287--310},
|
||||
@ -480,14 +480,14 @@ isbn={978-989-758-209-7},
|
||||
|
||||
@online{monerolang2018,
|
||||
author = {ErCiccione},
|
||||
title = {All languages need to be updated for 0.13 - Call for translators},
|
||||
title = {All Languages Need to be Updated for 0.13 - Call for Translators},
|
||||
year = 2018,
|
||||
url = {https://github.com/monero-project/monero-gui/issues/1582},
|
||||
urldate = {2018-10-14}
|
||||
}
|
||||
|
||||
@mastersthesis{pialphapialphagammaiotaacutealphanunualpharhoovarsigma2016study,
|
||||
title={A study of penetration testing procedures using Windows PowerShell: introduction to offensive PowerShell \& assesment of PowerShell security tools},
|
||||
title={A Study of Penetration Testing Procedures using Windows PowerShell: Introduction to Offensive PowerShell \& Assesment of PowerShell Security Tools},
|
||||
author={$\Pi$$\alpha$$\pi$$\alpha$$\gamma$$\iota$$\acute{\alpha}$$\nu$$\nu$$\alpha$$\rho$o$\varsigma$, $\Gamma$$\varepsilon$$\acute{\omega}$$\rho$$\gamma$$\iota$o$\varsigma$ and Papagiannaros, Georgios},
|
||||
year={2016},
|
||||
school={$\Pi$$\alpha$$\nu$$\varepsilon$$\pi$$\iota$$\sigma$$\tau$$\acute{\eta}$$\mu$$\iota$o $\Pi$$\varepsilon$$\iota$$\rho$$\alpha$$\iota$$\acute{\omega}$$\varsigma$}
|
||||
@ -535,7 +535,7 @@ isbn={978-989-758-209-7},
|
||||
|
||||
@online{ansibleremoteps,
|
||||
author = {{Ansible - Red Hat, Inc.}},
|
||||
title = {Configure a Windows host for remote management with Ansible},
|
||||
title = {Configure a Windows Host for Remote Management with Ansible},
|
||||
year = 2018,
|
||||
url = {https://github.com/ansible/ansible/blob/devel/examples/scripts/ConfigureRemotingForAnsible.ps1},
|
||||
urldate = {2018-12-02}
|
||||
@ -573,7 +573,7 @@ isbn={978-989-758-209-7},
|
||||
|
||||
@online{xmrstakcompile,
|
||||
author = {{fireice-uk}},
|
||||
title = {Compile xmr-stak},
|
||||
title = {Compile Xmr-stak},
|
||||
year = 2018,
|
||||
url = {https://github.com/fireice-uk/xmr-stak/blob/master/doc/compile.md#build-system},
|
||||
urldate = {2018-12-03}
|
||||
@ -605,7 +605,7 @@ isbn={978-989-758-209-7},
|
||||
}
|
||||
|
||||
@inproceedings{al2014investigating,
|
||||
title={Investigating factors behind choosing a cryptocurrency},
|
||||
title={Investigating Factors behind choosing a Cryptocurrency},
|
||||
author={Al Shehhi, Aamna and Oudah, Mayada and Aung, Zeyar},
|
||||
booktitle={2014 IEEE International Conference on Industrial Engineering and Engineering Management},
|
||||
pages={1443--1447},
|
||||
@ -614,7 +614,7 @@ isbn={978-989-758-209-7},
|
||||
}
|
||||
|
||||
@inproceedings{le2018swimming,
|
||||
title={Swimming in the Monero pools},
|
||||
title={Swimming in the Monero Pools},
|
||||
author={Le Jamtel, Emilien},
|
||||
booktitle={2018 11th International Conference on IT Security Incident Management \& IT Forensics (IMF)},
|
||||
pages={110--114},
|
||||
@ -630,7 +630,7 @@ isbn={978-989-758-209-7},
|
||||
}
|
||||
|
||||
@inproceedings{eskandari2018first,
|
||||
title={A first look at browser-based Cryptojacking},
|
||||
title={A First Look at Browser-based Cryptojacking},
|
||||
author={Eskandari, Shayan and Leoutsarakos, Andreas and Mursch, Troy and Clark, Jeremy},
|
||||
booktitle={2018 IEEE European Symposium on Security and Privacy Workshops (EuroS\&PW)},
|
||||
pages={58--66},
|
||||
@ -639,7 +639,7 @@ isbn={978-989-758-209-7},
|
||||
}
|
||||
|
||||
@article{konoth2019malicious,
|
||||
title={Malicious cryptocurrency miners: Status and Outlook},
|
||||
title={Malicious Cryptocurrency Miners: Status and Outlook},
|
||||
author={Konoth, Radhesh Krishnan and van Wegberg, Rolf and Moonsamy, Veelasha and Bos, Herbert},
|
||||
year={2019},
|
||||
journal = {CoRR},
|
||||
|
Loading…
Reference in New Issue
Block a user