Simeon Wuthier

Orcid: 0000-0003-4088-7518

According to our database1, Simeon Wuthier authored at least 25 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Positive Reputation Score for Bitcoin P2P Network.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detection.
IEEE Trans. Dependable Secur. Comput., 2023

Post-Quantum QUIC Protocol in Cloud Networking.
Proceedings of the 2023 Joint European Conference on Networks and Communications & 6G Summit, 2023

Version++ Protocol Demonstration for Cryptocurrency Blockchain Handshaking with Software Assurance.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

Version++: Cryptocurrency Blockchain Handshaking With Software Assurance.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
A Machine Learning Approach to Anomaly Detection Based on Traffic Monitoring for Secure Blockchain Networking.
IEEE Trans. Netw. Serv. Manag., 2022

Capture the Flag for Team Construction in Cybersecurity.
CoRR, 2022

Robust P2P networking connectivity estimation engine for permissionless Bitcoin cryptocurrency.
Comput. Networks, 2022

Post-Quantum Cipher Power Analysis in Lightweight Devices.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Lightweight Code Assurance Proof for Wireless Software.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Greedy Networking in Cryptocurrency Blockchain.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

QUIC Protocol with Post-quantum Authentication.
Proceedings of the Information Security - 25th International Conference, 2022

The Security Investigation of Ban Score and Misbehavior Tracking in Bitcoin Network.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Designing and Using Capture The Flag for Coordination and Interaction in Engineering Education.
Proceedings of the IEEE Global Engineering Education Conference, 2022

2021
Towards Securing Availability in 5G: Analyzing the Injection Attack Impact on Core Network.
Proceedings of the Silicon Valley Cybersecurity Conference - Second Conference, 2021

A Machine Learning Approach to Peer Connectivity Estimation for Reliable Blockchain Networking.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

Robust P2P Connectivity Estimation for Permissionless Bitcoin Network.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Demo: Proof-of-Work Network Simulator for Blockchain and Cryptocurrency Research.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Performance Characterization of Post-Quantum Digital Certificates.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

Anomaly Detection based on Traffic Monitoring for Secure Blockchain Networking.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Security Analyses of Misbehavior Tracking in Bitcoin Network.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Security Comparisons and Performance Analyses of Post-quantum Signature Algorithms.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
Dynamic power control for rational cryptocurrency mining.
Proceedings of the CryBlock@MOBICOM 2020: Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 2020

2019
Anti-Withholding Reward System to Secure Blockchain Mining Pools.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2019

Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners.
Proceedings of the Applied Cryptography and Network Security, 2019


  Loading...