{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T22:16:50Z","timestamp":1775341010242,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662447734","type":"print"},{"value":"9783662447741","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44774-1_6","type":"book-chapter","created":{"date-parts":[[2014,10,7]],"date-time":"2014-10-07T12:50:47Z","timestamp":1412686247000},"page":"72-86","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":135,"title":["Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools"],"prefix":"10.1007","author":[{"given":"Benjamin","family":"Johnson","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aron","family":"Laszka","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jens","family":"Grossklags","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marie","family":"Vasek","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tyler","family":"Moore","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,10,8]]},"reference":[{"key":"6_CR1","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. http:\/\/bitcoin.org\/bitcoin.pdf (2008)"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/0-387-34799-2_25","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"D Chaum","year":"1990","unstructured":"Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319\u2013327. Springer, Heidelberg (1990)"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-642-32946-3_29","volume-title":"Financial Cryptography and Data Security","author":"S Barber","year":"2012","unstructured":"Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better \u2014 how to make Bitcoin a better currency. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 399\u2013414. Springer, Heidelberg (2012)"},{"issue":"420","key":"6_CR4","doi-asserted-by":"publisher","first-page":"1180","DOI":"10.2307\/2234244","volume":"103","author":"K Dowd","year":"1993","unstructured":"Dowd, K., Greenaway, D.: Currency competition, network externalities and switching costs: towards an alternative view of optimum currency areas. Econ. J. 103(420), 1180\u20131189 (1993)","journal-title":"Econ. J."},{"key":"6_CR5","unstructured":"Plohmann, D., Gerhards-Padilla, E.: Case study of the miner botnet. In: Proceedings of the 4th International Conference on Cyber Conflict (CYCON), pp. 345\u2013360 (2012)"},{"key":"6_CR6","series-title":"LNCS","first-page":"57","volume-title":"FC 2014 Workshops","author":"M Vasek","year":"2014","unstructured":"Vasek, M., Thornton, M., Moore, T.: Empirical analysis of Denial-of-Service attacks in the Bitcoin ecosystem. In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014 Workshops. LNCS, vol. 8438, pp. 57\u201371. Springer, Heidelberg (2014)"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-39884-1_3","volume-title":"Financial Cryptography and Data Security","author":"T Moore","year":"2013","unstructured":"Moore, T., Christin, N.: Beware the middleman: empirical analysis of Bitcoin-exchange risk. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 25\u201333. Springer, Heidelberg (2013)"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-642-03549-4_10","volume-title":"Financial Cryptography and Data Security","author":"N Fultz","year":"2009","unstructured":"Fultz, N., Grossklags, J.: Blue versus red: towards a model of distributed security attacks. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 167\u2013183. Springer, Heidelberg (2009)"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Grossklags, J., Christin, N., Chuang, J.: Secure or insure? a game-theoretic analysis of information security games. In: Proceedings of the 2008 World Wide Web Conference (WWW\u201908), Beijing, China, April 2008, pp. 209\u2013218 (2008)","DOI":"10.1145\/1367497.1367526"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/978-3-642-14577-3_37","volume-title":"Financial Cryptography and Data Security","author":"J Grossklags","year":"2010","unstructured":"Grossklags, J., Johnson, B., Christin, N.: When information improves information security. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 416\u2013423. Springer, Heidelberg (2010)"},{"key":"6_CR11","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/1-4020-8090-5_1","volume-title":"Economics of Information Security","author":"H Varian","year":"2004","unstructured":"Varian, H.: System reliability and free riding. In: Camp, L., Lewis, S. (eds.) Economics of Information Security. Advances in Information Security, vol. 12, pp. 1\u201315. Kluwer, Dordrecht (2004)"},{"issue":"3","key":"6_CR12","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1177\/0022002707300320","volume":"51","author":"D Clark","year":"2007","unstructured":"Clark, D., Konrad, K.: Asymmetric conflict: weakest link against best shot. J. Conflict Resolut. 51(3), 457\u2013469 (2007)","journal-title":"J. Conflict Resolut."},{"issue":"2","key":"6_CR13","doi-asserted-by":"publisher","first-page":"281","DOI":"10.2753\/MIS0742-1222250211","volume":"25","author":"H Cavusoglu","year":"2008","unstructured":"Cavusoglu, H., Raghunathan, S., Yue, W.: Decision-theoretic and game-theoretic approaches to IT security investment. J. Manag. Inf. Syst. 25(2), 281\u2013304 (2008)","journal-title":"J. Manag. Inf. Syst."},{"key":"6_CR14","unstructured":"Cremonini, M., Nizovtsev, D.: Understanding and influencing attackers\u2019 decisions: Implications for security investment strategies. In: Proceedings of the Fifth Annual Workshop on Economics and Information Security (WEIS), Cambridge, UK, June 2006"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-540-45126-6_9","volume-title":"Financial Cryptography","author":"SE Schechter","year":"2003","unstructured":"Schechter, S.E., Smith, M.D.: How much security is enough to stop a thief? In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 122\u2013137. Springer, Heidelberg (2003)"},{"issue":"2","key":"6_CR16","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1086\/259394","volume":"76","author":"G Becker","year":"1968","unstructured":"Becker, G.: Crime and punishment: an economic approach. J. Polit. Econ. 76(2), 169\u2013217 (1968)","journal-title":"J. Polit. Econ."},{"issue":"5799","key":"6_CR17","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1126\/science.1130992","volume":"314","author":"R Anderson","year":"2006","unstructured":"Anderson, R., Moore, T.: The economics of information security. Science 314(5799), 610\u2013613 (2006)","journal-title":"Science"},{"key":"6_CR18","unstructured":"Laszka, A., Felegyhazi, M., Butty\u00e1n, L.: A survey of interdependent security games. Technical report CRYSYS-TR-2012-11-15, CrySyS Lab, Budapest University of Technology and Economics (2012)"},{"issue":"3","key":"6_CR19","doi-asserted-by":"publisher","first-page":"25:1","DOI":"10.1145\/2480741.2480742","volume":"45","author":"M Manshaei","year":"2013","unstructured":"Manshaei, M., Zhu, Q., Alpcan, T., Bac\u015far, T., Hubaux, J.P.: Game theory meets network security and privacy. ACM Comput. Surv. 45(3), 25:1\u201325:39 (2013)","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"6_CR20","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1053283.1053288","volume":"8","author":"P Liu","year":"2005","unstructured":"Liu, P., Zang, W., Yu, M.: Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Trans. Inf. Syst. Secur. 8(1), 78\u2013118 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"6_CR21","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.cose.2013.03.014","volume":"38","author":"T Spyridopoulos","year":"2013","unstructured":"Spyridopoulos, T., Karanikas, G., Tryfonas, T., Oikonomou, G.: A game theoretic defence framework against DoS\/DDoS cyber attacks. Comput. Secur. 38, 39\u201350 (2013)","journal-title":"Comput. Secur."},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Wu, Q., Shiva, S., Roy, S., Ellis, C., Datla, V.: On modeling and simulation of game theory-based defense mechanisms against DOS and DDOS attacks. In: Proceedings of the 2010 Spring Simulation Multiconference, pp. 159:1\u2013159:8 (2010)","DOI":"10.1145\/1878537.1878703"},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-0-387-09762-6_12","volume-title":"Managing Information Risk and the Economics of Security","author":"Z Li","year":"2009","unstructured":"Li, Z., Liao, Q., Striegel, A.: Botnet economics: uncertainty matters. In: Johnson, M. (ed.) Managing Information Risk and the Economics of Security, pp. 245\u2013267. Springer, Heidelberg (2009)"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Christin, N., Grossklags, J., Chuang, J.: Near rationality and competitive equilibria in networked systems. In: Proceedings of the ACM SIGCOMM Workshop on Practice and Theory of Incentives in Networked Systems, pp. 213\u2013219 (2004)","DOI":"10.1145\/1016527.1016536"},{"key":"6_CR25","unstructured":"Kroll, J., Davey, I., Felten, E.: The economics of Bitcoin mining, or Bitcoin in the presence of adversaries. In: Proceedings of the Twelfth Annual Workshop on Economics and Information Security (WEIS), Washington, DC, June 2013"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Babaioff, M., Dobzinski, S., Oren, S., Zohar, A.: On Bitcoin and red balloons. In: Proceedings of the 13th ACM Conference on Electronic Commerce (EC), pp. 56\u201373 (2012)","DOI":"10.1145\/2229012.2229022"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44774-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T23:05:42Z","timestamp":1676415942000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-44774-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662447734","9783662447741"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44774-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"8 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}