-
Notifications
You must be signed in to change notification settings - Fork 4
/
references.bib
1032 lines (928 loc) · 60.5 KB
/
references.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
@misc{noauthor_gdb_nodate,
title = {{GDB}},
}
@misc{alexander_kornbrust_oracle_nodate,
address = {Black Hat 2006 USA},
title = {Oracle {Rootkits} 2.0},
author = {{Alexander Kornbrust}},
month = aug,
file = {Backdoor - Oracle Rootkits 2.0.pdf:/home/opsxcq/Zotero/storage/G9QP7HBF/Backdoor - Oracle Rootkits 2.0.pdf:application/pdf},
}
@inproceedings{haugh_testing_2003,
title = {Testing {C} {Programs} for {Buffer} {Overflow} {Vulnerabilities}.},
booktitle = {{NDSS}},
author = {Haugh, Eric and Bishop, Matt},
year = {2003},
file = {Exploit - Bishop 2003 Testing C programs for buffer overflow vulnerabilities.pdf:/home/opsxcq/Zotero/storage/AVBA5MMT/Exploit - Bishop 2003 Testing C programs for buffer overflow vulnerabilities.pdf:application/pdf},
}
@misc{matt_bishop_how_2001,
title = {How {Attackers} {Break} {Programs}, and {How} {To} {Write} {Programs} {More} {Securely}},
author = {{Matt Bishop}},
year = {2001},
file = {Exploit - Bishop 2001 how attackers break programs and how to write programs more securely.pdf:/home/opsxcq/Zotero/storage/F2PGZJSA/Exploit - Bishop 2001 how attackers break programs and how to write programs more securely.pdf:application/pdf},
}
@misc{matt_bishop_unix_1996,
title = {{UNIX} {Security}: {Writing} {Secure} {Programs}},
author = {{Matt Bishop}},
year = {1996},
file = {Exploit - Bishop 1996 writing secure programs.pdf:/home/opsxcq/Zotero/storage/XK4R9GFV/Exploit - Bishop 1996 writing secure programs.pdf:application/pdf},
}
@misc{alexei_bulazel_reverse_2018,
title = {Reverse {Engineering} {Windows} {Defender}’s {JavaScript} {Engine}},
author = {{Alexei Bulazel}},
year = {2018},
file = {RECON-BRX-2018-Reverse-Engineering-Windows-Defender-s-JavaScript-Engine.pdf:/home/opsxcq/Zotero/storage/3V3NV7T7/RECON-BRX-2018-Reverse-Engineering-Windows-Defender-s-JavaScript-Engine.pdf:application/pdf},
}
@misc{noauthor_inside_nodate,
title = {The {Inside} {Story} {Behind} {MS08}-067},
url = {https://blogs.technet.microsoft.com/johnla/2015/09/26/the-inside-story-behind-ms08-067/},
publisher = {26 september 2015},
file = {MS08-067.pdf:/home/opsxcq/Zotero/storage/WIS6FSN9/MS08-067.pdf:application/pdf},
}
@misc{noauthor_mysql_nodate,
title = {Mysql {UDF} {Exploitation}},
file = {mysql-udf-exploitation.pdf:/home/opsxcq/Zotero/storage/5RW8DA6T/mysql-udf-exploitation.pdf:application/pdf},
}
@misc{noauthor_android_nodate,
title = {Android exploitation from {APK} to network},
file = {from-apk-to-golden-ticket.pdf:/home/opsxcq/Zotero/storage/ZH93UGR3/from-apk-to-golden-ticket.pdf:application/pdf},
}
@misc{noauthor_guide_nodate,
title = {A guide to {Linux} {Privilege} {Escalation}},
file = {linux-local-privilege-escalation-examples-01.pdf:/home/opsxcq/Zotero/storage/IA5QSM5B/linux-local-privilege-escalation-examples-01.pdf:application/pdf},
}
@misc{aleksandr_matrosov_senior_virus_researcher_stuxnet_nodate,
title = {Stuxnet under microscope},
publisher = {ESET},
author = {{Aleksandr Matrosov, Senior Virus Researcher} and {Eugene Rodionov, Rootkit Analyst} and {David Harley, Senior Research Fellow} and {Juraj Malcho, Head of Virus Laboratory}},
file = {Stuxnet Under the Microscope.pdf:/home/opsxcq/Zotero/storage/Z2H5UVTA/Stuxnet Under the Microscope.pdf:application/pdf},
}
@inproceedings{gura_comparing_2004,
title = {Comparing elliptic curve cryptography and {RSA} on 8-bit {CPUs}},
volume = {4},
booktitle = {{CHES}},
publisher = {Springer},
author = {Gura, Nils and Patel, Arun and Wander, Arvinderpal and Eberle, Hans and Shantz, Sheueling Chang},
year = {2004},
pages = {119--132},
file = {2004 - Gura - Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs.pdf:/home/opsxcq/Zotero/storage/R2WDNK8P/2004 - Gura - Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs.pdf:application/pdf},
}
@article{diffie_new_1976,
title = {New directions in cryptography},
volume = {22},
number = {6},
journal = {IEEE transactions on Information Theory},
author = {Diffie, Whitfield and Hellman, Martin},
year = {1976},
pages = {644--654},
file = {1976 - New Directions in Cryptography - Diffie Hellman.pdf:/home/opsxcq/Zotero/storage/5TBK6S9S/1976 - New Directions in Cryptography - Diffie Hellman.pdf:application/pdf},
}
@article{rivest_method_1978,
title = {A method for obtaining digital signatures and public-key cryptosystems},
volume = {21},
number = {2},
journal = {Communications of the ACM},
author = {Rivest, Ronald L and Shamir, Adi and Adleman, Leonard},
year = {1978},
pages = {120--126},
file = {1978 - RIvest - Original RSA Paper - A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.pdf:/home/opsxcq/Zotero/storage/KIZECVHM/1978 - RIvest - Original RSA Paper - A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.pdf:application/pdf},
}
@article{gaj_facts_2003,
title = {Facts and myths of enigma: {Breaking} stereotypes},
journal = {Advances in Cryptology—EUROCRYPT 2003},
author = {Gaj, Kris and Or{\textbackslash}lowski, Arkadiusz},
year = {2003},
pages = {643--643},
file = {2003 - Gaj - Facts and Myths of Enigma - Breaking Stereotypes.pdf:/home/opsxcq/Zotero/storage/Q4IT2UVF/2003 - Gaj - Facts and Myths of Enigma - Breaking Stereotypes.pdf:application/pdf},
}
@book{rakus-andersson_brains_2003,
title = {The brains behind the enigma code breaking before the second world war},
publisher = {Springer},
author = {Rakus-Andersson, Elisabeth},
year = {2003},
file = {2003 - The Brains behind the Enigma Code Breaking before the Second World War.pdf:/home/opsxcq/Zotero/storage/QI35SPDX/2003 - The Brains behind the Enigma Code Breaking before the Second World War.pdf:application/pdf},
}
@inproceedings{goldwasser__1984,
title = {A" paradoxical" solution to the signature problem},
booktitle = {Foundations of {Computer} {Science}, 1984. 25th {Annual} {Symposium} on},
publisher = {IEEE},
author = {Goldwasser, Shafi and Micali, Silvio and Rivest, Ronald L},
year = {1984},
pages = {441--448},
file = {1984 - A paradoxical solution to the signature problem.pdf:/home/opsxcq/Zotero/storage/C6QFCUPM/1984 - A paradoxical solution to the signature problem.pdf:application/pdf},
}
@phdthesis{preneel_analysis_2003,
type = {{PhD} {Thesis}},
title = {Analysis and design of cryptographic hash functions},
school = {Katholieke Universiteit te Leuven},
author = {Preneel, Bart},
year = {2003},
file = {2003 - Analysis and Design of Cryptographic Hash Functions.pdf:/home/opsxcq/Zotero/storage/ABH2PRD5/2003 - Analysis and Design of Cryptographic Hash Functions.pdf:application/pdf},
}
@article{stevens_fast_2006,
title = {Fast {Collision} {Attack} on {MD5}.},
volume = {2006},
journal = {IACR Cryptology ePrint Archive},
author = {Stevens, Marc},
year = {2006},
pages = {104},
file = {2006 - Marc Stevens - Fast Collision Attack on MD5.pdf:/home/opsxcq/Zotero/storage/EIACJJZV/2006 - Marc Stevens - Fast Collision Attack on MD5.pdf:application/pdf},
}
@inproceedings{wang_efficient_2005,
title = {Efficient collision search attacks on {SHA}-0},
booktitle = {Annual {International} {Cryptology} {Conference}},
publisher = {Springer},
author = {Wang, Xiaoyun and Yu, Hongbo and Yin, Yiqun Lisa},
year = {2005},
pages = {1--16},
file = {2005 - Wang - Efficient Collision Search Attacks on SHA-0.pdf:/home/opsxcq/Zotero/storage/5B5AI93E/2005 - Wang - Efficient Collision Search Attacks on SHA-0.pdf:application/pdf},
}
@article{stevens_first_2017,
title = {The first collision for full {SHA}-1.},
volume = {2017},
journal = {IACR Cryptology ePrint Archive},
author = {Stevens, Marc and Bursztein, Elie and Karpman, Pierre and Albertini, Ange and Markov, Yarik},
year = {2017},
pages = {190},
file = {2017 - Marc Stevens - Shattered - The first collision for full SHA-1.pdf:/home/opsxcq/Zotero/storage/TWKAZB2I/2017 - Marc Stevens - Shattered - The first collision for full SHA-1.pdf:application/pdf},
}
@inproceedings{stevens_chosen-prefix_2007,
title = {Chosen-prefix collisions for {MD5} and colliding {X}. 509 certificates for different identities},
booktitle = {Annual {International} {Conference} on the {Theory} and {Applications} of {Cryptographic} {Techniques}},
publisher = {Springer},
author = {Stevens, Marc and Lenstra, Arjen and De Weger, Benne},
year = {2007},
pages = {1--22},
file = {2007 - Marc Stevens - Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities.pdf:/home/opsxcq/Zotero/storage/ISVZP4EV/2007 - Marc Stevens - Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities.pdf:application/pdf},
}
@article{huffman_method_1952,
title = {A method for the construction of minimum-redundancy codes},
volume = {40},
number = {9},
journal = {Proceedings of the IRE},
author = {Huffman, David A},
year = {1952},
pages = {1098--1101},
file = {huffman_1952_minimum-redundancy-codes.pdf:/home/opsxcq/Zotero/storage/KCKUUUZM/huffman_1952_minimum-redundancy-codes.pdf:application/pdf},
}
@article{shannon_prediction_1951,
title = {Prediction and entropy of printed {English}},
volume = {30},
number = {1},
journal = {Bell Labs Technical Journal},
author = {Shannon, Claude E},
year = {1951},
pages = {50--64},
file = {shannon_51.pdf:/home/opsxcq/Zotero/storage/6B7G3EVC/shannon_51.pdf:application/pdf},
}
@book{shannon_mathematical_1949,
title = {The {Mathematical} {Theory} of {Communication}},
publisher = {University of Illinois Press},
author = {Shannon, Claude E. and Weaver, Warren},
year = {1949},
file = {entropy.pdf:/home/opsxcq/Zotero/storage/PMWN9D39/entropy.pdf:application/pdf},
}
@misc{alexander_abusing_nodate,
title = {Abusing delay load {DLLs} for remote code injection -},
url = {http://hatriot.github.io/blog/2017/09/19/abusing-delay-load-dll/},
urldate = {2018-04-01},
author = {Alexander, Bryan},
file = {Abusing Delay Load DLLs for Remote Code Injection.pdf:/home/opsxcq/Zotero/storage/2WQJ965N/Abusing Delay Load DLLs for Remote Code Injection.pdf:application/pdf},
}
@misc{noauthor_giving_nodate,
title = {Giving every {Tor} {Hidden} {Service} a {IPv6} address},
url = {https://blog.benjojo.co.uk/post/tor-onions-to-v6-with-iptables-proxy},
urldate = {2018-04-07},
file = {Giving every Tor Hidden Service a IPv6 address.pdf:/home/opsxcq/Zotero/storage/KEMVRURU/Giving every Tor Hidden Service a IPv6 address.pdf:application/pdf},
}
@article{lp_whatsapp_2015,
title = {{WhatsApp} {Forensics}: {Decryption} of {Encrypted} {WhatsApp} {Databases} on {Non} {Rooted} {Android} {Devices}},
volume = {5},
issn = {2165-7866},
url = {https://www.omicsonline.org/open-access/whatsapp-forensics-decryption-of-encrypted-whatsapp-databases-onnon-rooted-android-devices-2165-7866-1000147.php?aid=56205},
doi = {10.4172/2165-7866.1000147},
number = {2},
journal = {Journal of Information Technology \& Software Engineering},
author = {LP, Gudipaty and KY, Jhala},
year = {2015},
keywords = {WhatsApp analysis, Android forensics, WhatsApp forensics, WhatsApp Crypt7, WhatsApp key file, Mobile forensics, BYOD forensics},
pages = {1--4},
file = {whatsapp-forensics-decryption-of-encrypted-whatsapp-databases-onnon-rooted-android-devices.pdf:/home/opsxcq/Zotero/storage/PT4IREXB/whatsapp-forensics-decryption-of-encrypted-whatsapp-databases-onnon-rooted-android-devices.pdf:application/pdf},
}
@article{korshunova_fast_2016,
title = {Fast face-swap using convolutional neural networks},
journal = {arXiv preprint arXiv:1611.09577},
author = {Korshunova, Iryna and Shi, Wenzhe and Dambre, Joni and Theis, Lucas},
year = {2016},
file = {Korshunova_Fast_Face-Swap_Using_ICCV_2017_paper.pdf:/home/opsxcq/Zotero/storage/ZGHBHFRC/Korshunova_Fast_Face-Swap_Using_ICCV_2017_paper.pdf:application/pdf},
}
@article{dong_unsupervised_2017,
title = {Unsupervised image-to-image translation with generative adversarial networks},
journal = {arXiv preprint arXiv:1701.02676},
author = {Dong, Hao and Neekhara, Paarth and Wu, Chao and Guo, Yike},
year = {2017},
file = {1701.02676.pdf:/home/opsxcq/Zotero/storage/72U62DV6/1701.02676.pdf:application/pdf},
}
@article{nakamoto_bitcoin:_2008,
title = {Bitcoin: {A} peer-to-peer electronic cash system},
author = {Nakamoto, Satoshi},
year = {2008},
file = {bitcoin.pdf:/home/opsxcq/Zotero/storage/T9TP4UA5/bitcoin.pdf:application/pdf},
}
@article{yermack_is_2013,
title = {Is {Bitcoin} a {Real} {Currency}? {An} {Economic} {Appraisal}},
author = {Yermack, David},
year = {2013},
file = {is-bitcoin-a-real-currency.pdf:/home/opsxcq/Zotero/storage/3V6VTK24/is-bitcoin-a-real-currency.pdf:application/pdf},
}
@inproceedings{decker_information_2013,
title = {Information propagation in the {Bitcoin} network},
doi = {10.1109/P2P.2013.6688704},
booktitle = {{IEEE} {P2P} 2013 {Proceedings}},
author = {Decker, C. and Wattenhofer, R.},
month = sep,
year = {2013},
keywords = {financial data processing, foreign exchange trading, information propagation, Bitcoin network, digital currency, replicated ledger, transaction verification, multihop broadcast, blockchain forks, protocol, Peer-to-peer computing, Conferences, Protocols, Delays, History, Synchronization, Buildings},
pages = {1--10},
file = {06688704.pdf:/home/opsxcq/Zotero/storage/2CER5I5P/06688704.pdf:application/pdf},
}
@article{grinberg_bitcoin:_2012,
title = {Bitcoin: {An} innovative alternative digital currency},
volume = {4},
journal = {Hastings Sci. \& Tech. LJ},
author = {Grinberg, Reuben},
year = {2012},
pages = {159},
file = {bitcoin-by-reubengrinberg.pdf:/home/opsxcq/Zotero/storage/GZ5NZUC7/bitcoin-by-reubengrinberg.pdf:application/pdf},
}
@article{courtois_subversive_2014,
title = {On subversive miner strategies and block withholding attack in bitcoin digital currency},
journal = {arXiv preprint arXiv:1402.1718},
author = {Courtois, Nicolas T and Bahack, Lear},
year = {2014},
file = {document.pdf:/home/opsxcq/Zotero/storage/VA3QG2KU/document.pdf:application/pdf},
}
@inproceedings{bonneau_sok:_2015,
title = {Sok: {Research} perspectives and challenges for bitcoin and cryptocurrencies},
booktitle = {Security and {Privacy} ({SP}), 2015 {IEEE} {Symposium} on},
publisher = {IEEE},
author = {Bonneau, Joseph and Miller, Andrew and Clark, Jeremy and Narayanan, Arvind and Kroll, Joshua A and Felten, Edward W},
year = {2015},
pages = {104--121},
file = {survey1.pdf:/home/opsxcq/Zotero/storage/RZ8VVRCD/survey1.pdf:application/pdf},
}
@incollection{reid_analysis_2013,
title = {An analysis of anonymity in the bitcoin system},
booktitle = {Security and privacy in social networks},
publisher = {Springer},
author = {Reid, Fergal and Harrigan, Martin},
year = {2013},
pages = {197--223},
file = {10.1.1.222.554.pdf:/home/opsxcq/Zotero/storage/46V8SVGK/10.1.1.222.554.pdf:application/pdf},
}
@book{antonopoulos_mastering_2014,
title = {Mastering {Bitcoin}: unlocking digital cryptocurrencies},
publisher = {" O'Reilly Media, Inc."},
author = {Antonopoulos, Andreas M},
year = {2014},
}
@inproceedings{androulaki_evaluating_2013,
title = {Evaluating user privacy in bitcoin},
booktitle = {International {Conference} on {Financial} {Cryptography} and {Data} {Security}},
publisher = {Springer},
author = {Androulaki, Elli and Karame, Ghassan O and Roeschlin, Marc and Scherer, Tobias and Capkun, Srdjan},
year = {2013},
pages = {34--51},
file = {10.1.1.303.7092.pdf:/home/opsxcq/Zotero/storage/GFNZSHMQ/10.1.1.303.7092.pdf:application/pdf},
}
@inproceedings{karame_double-spending_2012,
title = {Double-spending fast payments in bitcoin},
booktitle = {Proceedings of the 2012 {ACM} conference on {Computer} and communications security},
publisher = {ACM},
author = {Karame, Ghassan O and Androulaki, Elli and Capkun, Srdjan},
year = {2012},
pages = {906--917},
file = {p9.pdf:/home/opsxcq/Zotero/storage/JTZUFIDX/p9.pdf:application/pdf},
}
@article{odwyer_bitcoin_2014,
title = {Bitcoin mining and its energy footprint},
author = {O'Dwyer, Karl J and Malone, David},
year = {2014},
file = {DM-Bitcoin.pdf:/home/opsxcq/Zotero/storage/GIMXPA79/DM-Bitcoin.pdf:application/pdf},
}
@inproceedings{sompolinsky_secure_2015,
title = {Secure high-rate transaction processing in bitcoin},
booktitle = {International {Conference} on {Financial} {Cryptography} and {Data} {Security}},
publisher = {Springer},
author = {Sompolinsky, Yonatan and Zohar, Aviv},
year = {2015},
pages = {507--527},
file = {881.pdf:/home/opsxcq/Zotero/storage/JADTXPC9/881.pdf:application/pdf},
}
@inproceedings{biryukov_deanonymisation_2014,
title = {Deanonymisation of clients in {Bitcoin} {P2P} network},
booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} {Conference} on {Computer} and {Communications} {Security}},
publisher = {ACM},
author = {Biryukov, Alex and Khovratovich, Dmitry and Pustogarov, Ivan},
year = {2014},
pages = {15--29},
file = {1405.7418.pdf:/home/opsxcq/Zotero/storage/XQUAS5CT/1405.7418.pdf:application/pdf},
}
@inproceedings{sapirshtein_optimal_2016,
title = {Optimal selfish mining strategies in bitcoin},
booktitle = {International {Conference} on {Financial} {Cryptography} and {Data} {Security}},
publisher = {Springer},
author = {Sapirshtein, Ayelet and Sompolinsky, Yonatan and Zohar, Aviv},
year = {2016},
pages = {515--532},
file = {1507.06183.pdf:/home/opsxcq/Zotero/storage/V3FQ48DX/1507.06183.pdf:application/pdf},
}
@inproceedings{johnson_game-theoretic_2014,
title = {Game-theoretic analysis of {DDoS} attacks against {Bitcoin} mining pools},
booktitle = {International {Conference} on {Financial} {Cryptography} and {Data} {Security}},
publisher = {Springer},
author = {Johnson, Benjamin and Laszka, Aron and Grossklags, Jens and Vasek, Marie and Moore, Tyler},
year = {2014},
pages = {72--86},
file = {johnson2014game.pdf:/home/opsxcq/Zotero/storage/947DZVV5/johnson2014game.pdf:application/pdf},
}
@inproceedings{biryukov_bitcoin_2015,
title = {Bitcoin over {Tor} isn't a good idea},
booktitle = {Security and {Privacy} ({SP}), 2015 {IEEE} {Symposium} on},
publisher = {IEEE},
author = {Biryukov, Alex and Pustogarov, Ivan},
year = {2015},
pages = {122--134},
file = {1410.6079.pdf:/home/opsxcq/Zotero/storage/MKUQREPQ/1410.6079.pdf:application/pdf},
}
@article{eyal_majority_2018,
title = {Majority is not enough: {Bitcoin} mining is vulnerable},
volume = {61},
number = {7},
journal = {Communications of the ACM},
author = {Eyal, Ittay and Sirer, Emin Gün},
year = {2018},
pages = {95--102},
file = {1311.0243.pdf:/home/opsxcq/Zotero/storage/N7RG6VAH/1311.0243.pdf:application/pdf},
}
@inproceedings{lewenberg_bitcoin_2015,
title = {Bitcoin mining pools: {A} cooperative game theoretic analysis},
booktitle = {Proceedings of the 2015 {International} {Conference} on {Autonomous} {Agents} and {Multiagent} {Systems}},
publisher = {International Foundation for Autonomous Agents and Multiagent Systems},
author = {Lewenberg, Yoad and Bachrach, Yoram and Sompolinsky, Yonatan and Zohar, Aviv and Rosenschein, Jeffrey S},
year = {2015},
pages = {919--927},
file = {10.1.1.695.9873.pdf:/home/opsxcq/Zotero/storage/P3WBDGXK/10.1.1.695.9873.pdf:application/pdf},
}
@article{koblitz_elliptic_1987,
title = {Elliptic curve cryptosystems},
volume = {48},
number = {177},
journal = {Mathematics of computation},
author = {Koblitz, Neal},
year = {1987},
pages = {203--209},
file = {S0025-5718-1987-0866109-5.pdf:/home/opsxcq/Zotero/storage/A7WZKPCM/S0025-5718-1987-0866109-5.pdf:application/pdf},
}
@inproceedings{miller_use_1985,
title = {Use of elliptic curves in cryptography},
booktitle = {Conference on the theory and application of cryptographic techniques},
publisher = {Springer},
author = {Miller, Victor S},
year = {1985},
pages = {417--426},
file = {Miller1986_Chapter_UseOfEllipticCurvesInCryptogra.pdf:/home/opsxcq/Zotero/storage/RGGTQVHP/Miller1986_Chapter_UseOfEllipticCurvesInCryptogra.pdf:application/pdf},
}
@article{faour_transparent_2018,
title = {Transparent {Voting} {Platform} {Based} on {Permissioned} {Blockchain}},
journal = {arXiv preprint arXiv:1802.10134},
author = {Faour, Nazim},
year = {2018},
file = {Faour.pdf:/home/opsxcq/Zotero/storage/8599SSMF/Faour.pdf:application/pdf},
}
@misc{noauthor_sans_nodate,
title = {{SANS} - {Pentest}},
file = {SANS - Pentest.pdf:/home/opsxcq/Zotero/storage/WJET4CLZ/SANS - Pentest.pdf:application/pdf},
}
@misc{vicent_yason_art_nodate,
title = {The {Art} of {Unpacking}},
author = {Vicent Yason, Mark},
file = {Vicent Yason - The Art of Unpacking.pdf:/home/opsxcq/Zotero/storage/6I4RQEKX/Vicent Yason - The Art of Unpacking.pdf:application/pdf},
}
@article{poon_bitcoin_2016,
title = {The bitcoin lightning network: {Scalable} off-chain instant payments},
journal = {See https://lightning. network/lightning-network-paper. pdf},
author = {Poon, Joseph and Dryja, Thaddeus},
year = {2016},
file = {Poon and Dryja - 2016 - The bitcoin lightning network Scalable off-chain .pdf:/home/opsxcq/Zotero/storage/PCJMBS8V/Poon and Dryja - 2016 - The bitcoin lightning network Scalable off-chain .pdf:application/pdf},
}
@inproceedings{michaelis_randomly_2013,
title = {Randomly failed! {The} state of randomness in current {Java} implementations},
booktitle = {Cryptographers’ {Track} at the {RSA} {Conference}},
publisher = {Springer},
author = {Michaelis, Kai and Meyer, Christopher and Schwenk, Jörg},
year = {2013},
pages = {129--144},
file = {Michaelis et al. - 2013 - Randomly failed! The state of randomness in curren.pdf:/home/opsxcq/Zotero/storage/E2UULD6Q/Michaelis et al. - 2013 - Randomly failed! The state of randomness in curren.pdf:application/pdf},
}
@article{sculley_machine_2014,
title = {Machine learning: {The} high interest credit card of technical debt},
author = {Sculley, D and Holt, Gary and Golovin, Daniel and Davydov, Eugene and Phillips, Todd and Ebner, Dietmar and Chaudhary, Vinay and Young, Michael},
year = {2014},
file = {Sculley et al. - 2014 - Machine learning The high interest credit card of.pdf:/home/opsxcq/Zotero/storage/D8UWNXYI/Sculley et al. - 2014 - Machine learning The high interest credit card of.pdf:application/pdf},
}
@misc{noauthor_windows_nodate,
title = {Windows {Kernel} {Exploitation} {Tutorial} {Part} 7: {Uninitialized} {Heap} {Variable}},
url = {https://rootkits.xyz/blog/2018/03/kernel-uninitialized-heap-variable/},
author = {, rootkit},
file = {Windows Kernel Exploitation Tutorial Part 7 Unini.pdf:/home/opsxcq/Zotero/storage/EN3CEB2P/Windows Kernel Exploitation Tutorial Part 7 Unini.pdf:application/pdf},
}
@article{drepper_what_2007,
title = {What every programmer should know about memory},
volume = {11},
journal = {Red Hat, Inc},
author = {Drepper, Ulrich},
year = {2007},
pages = {2007},
file = {Drepper - 2007 - What every programmer should know about memory.pdf:/home/opsxcq/Zotero/storage/K55QR654/Drepper - 2007 - What every programmer should know about memory.pdf:application/pdf},
}
@article{enzler_clean_2014,
title = {Clean {Code} {Cheat} {Sheet}},
language = {en},
author = {Enzler, Urs},
year = {2014},
pages = {4},
file = {Enzler - 2014 - Clean Code Cheat Sheet.pdf:/home/opsxcq/Zotero/storage/TD39HKYR/Enzler - 2014 - Clean Code Cheat Sheet.pdf:application/pdf},
}
@article{c-l_orgmode_nodate,
title = {{OrgMode}},
language = {en},
author = {C-l, C-c and C-l, C-c and C-o, C-c},
pages = {2},
file = {C-l et al. - Working with Code (Babel).pdf:/home/opsxcq/Zotero/storage/HKLMCWC6/C-l et al. - Working with Code (Babel).pdf:application/pdf},
}
@book{musson_attacking_2006,
title = {Attacking the {Elliptec} {Curve} {Discrete} {Logarithm} {Problem}},
publisher = {Citeseer},
author = {Musson, Matthew},
year = {2006},
file = {Musson - 2006 - Attacking the Elliptec Curve Discrete Logarithm Pr.pdf:/home/opsxcq/Zotero/storage/BLTF9PJZ/Musson - 2006 - Attacking the Elliptec Curve Discrete Logarithm Pr.pdf:application/pdf},
}
@article{upadhyay_attack_2011,
title = {Attack on rsa cryptosystem},
volume = {2},
number = {9},
journal = {International Journal of Scientific and Engineering Research (IJSER)},
author = {Upadhyay, Sachin},
year = {2011},
pages = {1--4},
file = {Upadhyay - 2011 - Attack on rsa cryptosystem.pdf:/home/opsxcq/Zotero/storage/GZJ8A2BE/Upadhyay - 2011 - Attack on rsa cryptosystem.pdf:application/pdf},
}
@inproceedings{blomer_new_2003,
title = {New partial key exposure attacks on {RSA}},
booktitle = {Annual {International} {Cryptology} {Conference}},
publisher = {Springer},
author = {Blömer, Johannes and May, Alexander},
year = {2003},
pages = {27--43},
file = {Blömer and May - 2003 - New partial key exposure attacks on RSA.pdf:/home/opsxcq/Zotero/storage/YGXNKI46/Blömer and May - 2003 - New partial key exposure attacks on RSA.pdf:application/pdf},
}
@inproceedings{paterson_padding_2004,
title = {Padding oracle attacks on the {ISO} {CBC} mode encryption standard},
booktitle = {Cryptographers’ {Track} at the {RSA} {Conference}},
publisher = {Springer},
author = {Paterson, Kenneth G and Yau, Arnold},
year = {2004},
pages = {305--323},
file = {Paterson and Yau - 2004 - Padding oracle attacks on the ISO CBC mode encrypt.pdf:/home/opsxcq/Zotero/storage/8J5GN6F7/Paterson and Yau - 2004 - Padding oracle attacks on the ISO CBC mode encrypt.pdf:application/pdf},
}
@article{everstine_partial_2001,
title = {Partial key exposure attack on low-exponent {RSA}},
journal = {Technial Report, Department of Computer Science, University of Maryland},
author = {Everstine, Eric W},
year = {2001},
file = {Everstine - 2001 - Partial key exposure attack on low-exponent RSA.pdf:/home/opsxcq/Zotero/storage/M2RHF7U5/Everstine - 2001 - Partial key exposure attack on low-exponent RSA.pdf:application/pdf},
}
@inproceedings{rizzo_practical_2010,
title = {Practical {Padding} {Oracle} {Attacks}.},
booktitle = {{WOOT}},
author = {Rizzo, Juliano and Duong, Thai},
year = {2010},
file = {Rizzo and Duong - 2010 - Practical Padding Oracle Attacks..pdf:/home/opsxcq/Zotero/storage/LWJ2UM2W/Rizzo and Duong - 2010 - Practical Padding Oracle Attacks..pdf:application/pdf},
}
@misc{noauthor_epistein_nodate,
title = {Epistein {Little} {Black} {Book}},
url = {http://thecrowhouse.com/Documents/Jeffrey_Epstein's_Little_Black_Book_unredacted.pdf},
file = {Epistein Little Black Book.pdf:/home/opsxcq/Zotero/storage/PQTDSSFS/Epistein Little Black Book.pdf:application/pdf},
}
@article{horvath_reversing_2020,
title = {Reversing age: dual species measurement of epigenetic age with a single clock},
url = {https://www.biorxiv.org/content/early/2020/05/08/2020.05.07.082917},
doi = {10.1101/2020.05.07.082917},
abstract = {Young blood plasma is known to confer beneficial effects on various organs in mice. However, it was not known whether young plasma rejuvenates cells and tissues at the epigenetic level; whether it alters the epigenetic clock, which is a highly-accurate molecular biomarker of aging. To address this question, we developed and validated six different epigenetic clocks for rat tissues that are based on DNA methylation values derived from n=593 tissue samples. As indicated by their respective names, the rat pan-tissue clock can be applied to DNA methylation profiles from all rat tissues, while the rat brain-, liver-, and blood clocks apply to the corresponding tissue types. We also developed two epigenetic clocks that apply to both human and rat tissues by adding n=850 human tissue samples to the training data. We employed these six clocks to investigate the rejuvenation effects of a plasma fraction treatment in different rat tissues. The treatment more than halved the epigenetic ages of blood, heart, and liver tissue. A less pronounced, but statistically significant, rejuvenation effect could be observed in the hypothalamus. The treatment was accompanied by progressive improvement in the function of these organs as ascertained through numerous biochemical/physiological biomarkers and behavioral responses to assess cognitive functions. Cellular senescence, which is not associated with epigenetic aging, was also considerably reduced in vital organs. Overall, this study demonstrates that a plasma-derived treatment markedly reverses aging according to epigenetic clocks and benchmark biomarkers of aging.Competing Interest StatementSeveral authors are founders, owners, employees (Harold Katcher and Akshay Sanghavi) or consultants of Nugenics Research (Steve Horvath and Agnivesh Shrivastava) which plans to commercialize the "Elixir" treatment. Other authors (Kavita Singh, Shraddha Khairnar) received financial support from Nugenics Research. The other authors do not have conflict of interest.},
journal = {bioRxiv},
author = {Horvath, Steve and Singh, Kavita and Raj, Ken and Khairnar, Shraddha and Sanghavi, Akshay and Shrivastava, Agnivesh and Zoller, Joseph A. and Li, Caesar Z. and Herenu, Claudia B. and Canatelli-Mallat, Martina and Lehmann, Marianne and Solberg Woods, Leah C. and Martinez, Angel Garcia and Wang, Tengfei and Chiavellini, Priscila and Levine, Andrew J. and Chen, Hao and Goya, Rodolfo G. and Katcher, Harold L.},
year = {2020},
note = {Publisher: Cold Spring Harbor Laboratory
\_eprint: https://www.biorxiv.org/content/early/2020/05/08/2020.05.07.082917.full.pdf},
file = {Horvath et al. - 2020 - Reversing age dual species measurement of epigene.pdf:/home/opsxcq/Zotero/storage/XJN5JHAT/Horvath et al. - 2020 - Reversing age dual species measurement of epigene.pdf:application/pdf},
}
@article{shrestha_necessity_2021,
title = {Necessity of {COVID}-19 vaccination in previously infected individuals},
url = {https://www.medrxiv.org/content/early/2021/06/05/2021.06.01.21258176},
doi = {10.1101/2021.06.01.21258176},
abstract = {Background The purpose of this study was to evaluate the necessity of COVID-19 vaccination in persons previously infected with SARS-CoV-2.Methods Employees of the Cleveland Clinic Health System working in Ohio on Dec 16, 2020, the day COVID-19 vaccination was started, were included. Any subject who tested positive for SARS-CoV-2 at least 42 days earlier was considered previously infected. One was considered vaccinated 14 days after receipt of the second dose of a SARS-CoV-2 mRNA vaccine. The cumulative incidence of SARS-CoV-2 infection over the next five months, among previously infected subjects who received the vaccine, was compared with those of previously infected subjects who remained unvaccinated, previously uninfected subjects who received the vaccine, and previously uninfected subjects who remained unvaccinated.Results Among the 52238 included employees, 1359 (53\%) of 2579 previously infected subjects remained unvaccinated, compared with 22777 (41\%) of 49659 not previously infected. The cumulative incidence of SARS-CoV-2 infection remained almost zero among previously infected unvaccinated subjects, previously infected subjects who were vaccinated, and previously uninfected subjects who were vaccinated, compared with a steady increase in cumulative incidence among previously uninfected subjects who remained unvaccinated. Not one of the 1359 previously infected subjects who remained unvaccinated had a SARS-CoV-2 infection over the duration of the study. In a Cox proportional hazards regression model, after adjusting for the phase of the epidemic, vaccination was associated with a significantly lower risk of SARS-CoV-2 infection among those not previously infected (HR 0.031, 95\% CI 0.015 to 0.061) but not among those previously infected (HR 0.313, 95\% CI 0 to Infinity).Conclusions Individuals who have had SARS-CoV-2 infection are unlikely to benefit from COVID-19 vaccination, and vaccines can be safely prioritized to those who have not been infected before.Summary Cumulative incidence of COVID-19 was examined among 52238 employees in an American healthcare system. COVID-19 did not occur in anyone over the five months of the study among 2579 individuals previously infected with COVID-19, including 1359 who did not take the vaccine.Competing Interest StatementThe authors have declared no competing interest.Funding StatementThere was no funding for this study.Author DeclarationsI confirm all relevant ethical guidelines have been followed, and any necessary IRB and/or ethics committee approvals have been obtained.YesThe details of the IRB/oversight body that provided approval or exemption for the research described are given below:The study was approved by the Cleveland Clinic Institutional Review Board. A waiver of informed consent and waiver of HIPAA authorization were approved to allow access to personal health information by the research team, with the understanding that sharing or releasing identifiable data to anyone other than the study team was not permitted without additional IRB approval.All necessary patient/participant consent has been obtained and the appropriate institutional forms have been archived.YesI understand that all clinical trials and any other prospective interventional studies must be registered with an ICMJE-approved registry, such as ClinicalTrials.gov. I confirm that any such study reported in the manuscript has been registered and the trial registration ID is provided (note: if posting a prospective study registered retrospectively, please provide a statement in the trial ID field explaining why the study was not registered in advance).YesI have followed all appropriate research reporting guidelines and uploaded the relevant EQUATOR Network research reporting checklist(s) and other pertinent material as supplementary files, if applicable.YesDe-identified subject-level data and code to reproduce the results are available on a public data repository. https://osf.io/k7wtv/},
journal = {medRxiv},
author = {Shrestha, Nabin K. and Burke, Patrick C. and Nowacki, Amy S. and Terpeluk, Paul and Gordon, Steven M.},
year = {2021},
note = {Publisher: Cold Spring Harbor Laboratory Press
\_eprint: https://www.medrxiv.org/content/early/2021/06/05/2021.06.01.21258176.full.pdf},
file = {Shrestha et al. - 2021 - Necessity of COVID-19 vaccination in previously in.pdf:/home/opsxcq/Zotero/storage/6F9AB946/Shrestha et al. - 2021 - Necessity of COVID-19 vaccination in previously in.pdf:application/pdf},
}
@article{steele_cause_2018,
title = {Cause of {Cambrian} {Explosion} - {Terrestrial} or {Cosmic}?},
volume = {136},
issn = {0079-6107},
url = {https://www.sciencedirect.com/science/article/pii/S0079610718300798},
doi = {https://doi.org/10.1016/j.pbiomolbio.2018.03.004},
abstract = {We review the salient evidence consistent with or predicted by the Hoyle-Wickramasinghe (H-W) thesis of Cometary (Cosmic) Biology. Much of this physical and biological evidence is multifactorial. One particular focus are the recent studies which date the emergence of the complex retroviruses of vertebrate lines at or just before the Cambrian Explosion of ∼500 Ma. Such viruses are known to be plausibly associated with major evolutionary genomic processes. We believe this coincidence is not fortuitous but is consistent with a key prediction of H-W theory whereby major extinction-diversification evolutionary boundaries coincide with virus-bearing cometary-bolide bombardment events. A second focus is the remarkable evolution of intelligent complexity (Cephalopods) culminating in the emergence of the Octopus. A third focus concerns the micro-organism fossil evidence contained within meteorites as well as the detection in the upper atmosphere of apparent incoming life-bearing particles from space. In our view the totality of the multifactorial data and critical analyses assembled by Fred Hoyle, Chandra Wickramasinghe and their many colleagues since the 1960s leads to a very plausible conclusion – life may have been seeded here on Earth by life-bearing comets as soon as conditions on Earth allowed it to flourish (about or just before 4.1 Billion years ago); and living organisms such as space-resistant and space-hardy bacteria, viruses, more complex eukaryotic cells, fertilised ova and seeds have been continuously delivered ever since to Earth so being one important driver of further terrestrial evolution which has resulted in considerable genetic diversity and which has led to the emergence of mankind.},
journal = {Progress in Biophysics and Molecular Biology},
author = {Steele, Edward J. and Al-Mufti, Shirwan and Augustyn, Kenneth A. and Chandrajith, Rohana and Coghlan, John P. and Coulson, S. G. and Ghosh, Sudipto and Gillman, Mark and Gorczynski, Reginald M. and Klyce, Brig and Louis, Godfrey and Mahanama, Kithsiri and Oliver, Keith R. and Padron, Julio and Qu, Jiangwen and Schuster, John A. and Smith, W. E. and Snyder, Duane P. and Steele, Julian A. and Stewart, Brent J. and Temple, Robert and Tokoro, Gensuke and Tout, Christopher A. and Unzicker, Alexander and Wainwright, Milton and Wallis, Jamie and Wallis, Daryl H. and Wallis, Max K. and Wetherall, John and Wickramasinghe, D. T. and Wickramasinghe, J. T. and Wickramasinghe, N. Chandra and Liu, Yongsheng},
year = {2018},
keywords = {Cambrian Explosion, Cosmic biology, Hypermutation \& evolution, Origin epidemics \& pandemics, Panspermia, Retroviruses},
pages = {3--23},
file = {Steele et al. - 2018 - Cause of Cambrian Explosion - Terrestrial or Cosmi.pdf:/home/opsxcq/Zotero/storage/QCDKFP25/Steele et al. - 2018 - Cause of Cambrian Explosion - Terrestrial or Cosmi.pdf:application/pdf},
}
@article{lemmermeyer_conics-poor_2003,
title = {Conics-{A} poor man's elliptic curves},
journal = {arXiv preprint math/0311306},
author = {Lemmermeyer, Franz},
year = {2003},
file = {Lemmermeyer - 2003 - Conics-A poor man's elliptic curves.pdf:/home/opsxcq/Zotero/storage/Q9VR752S/Lemmermeyer - 2003 - Conics-A poor man's elliptic curves.pdf:application/pdf},
}
@article{freund_proportions_1992,
title = {The proportions of heterosexual and homosexual pedophiles among sex offenders against children: {An} exploratory study},
volume = {18},
url = {https://doi.org/10.1080/00926239208404356},
doi = {10.1080/00926239208404356},
abstract = {Previous investigations have indicated that the ratio of sex offenders against female children vs. offenders against male children is approximately 2:1, while the ratio of gynephiles to androphiles among the general population is approximately 20:1. The present study investigated whether the etiology of preferred partner sex among pedophiles is related to the etiology of preferred partner sex among males preferring adult partners. Using phallometric test sensitivities to calculate the proportion of true pedophiles among various groups of sex offenders against children, and taking into consideration previously reported mean numbers of victims per offender group, the ratio of heterosexual to homosexual pedophiles was calculated to be approximately 11:1. This suggests that the resulting proportion of true pedophiles among persons with a homosexual erotic development is greater than that in persons who develop heterosexually. This, of course, would not indicate that androphilic males have a greater propensity to offend against children.},
number = {1},
journal = {Journal of Sex \& Marital Therapy},
author = {Freund, Kurt and Watson, Robin J.},
year = {1992},
pmid = {1556756},
note = {Publisher: Routledge
\_eprint: https://doi.org/10.1080/00926239208404356},
pages = {34--43},
file = {Freund and Watson - 1992 - The proportions of heterosexual and homosexual ped.pdf:/home/opsxcq/Zotero/storage/SRD3AFCG/Freund and Watson - 1992 - The proportions of heterosexual and homosexual ped.pdf:application/pdf},
}
@article{sandfort_pedophilia_1987,
title = {Pedophilia and the {Gay} {Movement}},
volume = {13},
url = {https://doi.org/10.1300/J082v13n02_08},
doi = {10.1300/J082v13n02_08},
abstract = {A history of literature and views existing within the COC (Cultural and Recreational Center), the major Dutch organizations of homosexual men and women, regarding pedophilia and its relationship to homosexuality are discussed, beginning with definite separation between the pedophile and homosexual identities and ending with an abolishment of oppression towards pedophilia, for which the COC is in part responsible. The article argues that the homosexual identity is by no means a ôconstantö but a fluid identity, based on societal views and conditions. By accepting pedophilia, the COC hopefully will broaden the idea of the gay identity.},
number = {2-3},
journal = {Journal of Homosexuality},
author = {Sandfort, Theo},
year = {1987},
note = {Publisher: Routledge
\_eprint: https://doi.org/10.1300/J082v13n02\_08},
pages = {89--110},
file = {Sandfort - 1987 - Pedophilia and the Gay Movement.pdf:/home/opsxcq/Zotero/storage/WEHVX65V/Sandfort - 1987 - Pedophilia and the Gay Movement.pdf:application/pdf},
}
@article{seto_is_2012,
title = {Is pedophilia a sexual orientation?},
volume = {41},
number = {1},
journal = {Archives of sexual behavior},
author = {Seto, Michael C},
year = {2012},
note = {Publisher: Springer},
pages = {231--236},
file = {Seto - 2012 - Is pedophilia a sexual orientation.pdf:/home/opsxcq/Zotero/storage/BLRJNWC8/Seto - 2012 - Is pedophilia a sexual orientation.pdf:application/pdf},
}
@article{goncalves_self-assembled_2010,
title = {Self-{Assembled} {Hydrogel} {Nanoparticles} for {Drug} {Delivery} {Applications}},
volume = {3},
issn = {1996-1944},
url = {https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5513474/},
doi = {10.3390/ma3021420},
abstract = {Hydrogel nanoparticles—also referred to as polymeric nanogels or macromolecular micelles—are emerging as promising drug carriers for therapeutic applications. These nanostructures hold versatility and properties suitable for the delivery of bioactive molecules, namely of biopharmaceuticals. This article reviews the latest developments in the use of self-assembled polymeric nanogels for drug delivery applications, including small molecular weight drugs, proteins, peptides, oligosaccharides, vaccines and nucleic acids. The materials and techniques used in the development of self-assembling nanogels are also described.},
number = {2},
urldate = {2021-07-30},
journal = {Materials},
author = {Gonçalves, Catarina and Pereira, Paula and Gama, Miguel},
month = feb,
year = {2010},
pages = {1420--1460},
file = {Gonçalves et al. - 2010 - Self-Assembled Hydrogel Nanoparticles for Drug Del.pdf:/home/opsxcq/Zotero/storage/LT8MTQN7/Gonçalves et al. - 2010 - Self-Assembled Hydrogel Nanoparticles for Drug Del.pdf:application/pdf},
}
@article{schoenfeld_how_2018,
title = {How much protein can the body use in a single meal for muscle-building? {Implications} for daily protein distribution},
volume = {15},
issn = {1550-2783},
doi = {10.1186/s12970-018-0215-1},
abstract = {Controversy exists about the maximum amount of protein that can be utilized for lean tissue-building purposes in a single meal for those involved in regimented resistance training. It has been proposed that muscle protein synthesis is maximized in young adults with an intake of {\textasciitilde} 20–25 g of a high-quality protein; anything above this amount is believed to be oxidized for energy or transaminated to form urea and other organic acids. However, these findings are specific to the provision of fast-digesting proteins without the addition of other macronutrients. Consumption of slower-acting protein sources, particularly when consumed in combination with other macronutrients, would delay absorption and thus conceivably enhance the utilization of the constituent amino acids. The purpose of this paper was twofold: 1) to objectively review the literature in an effort to determine an upper anabolic threshold for per-meal protein intake; 2) draw relevant conclusions based on the current data so as to elucidate guidelines for per-meal daily protein distribution to optimize lean tissue accretion. Both acute and long-term studies on the topic were evaluated and their findings placed into context with respect to per-meal utilization of protein and the associated implications to distribution of protein feedings across the course of a day. The preponderance of data indicate that while consumption of higher protein doses ({\textgreater} 20 g) results in greater AA oxidation, this is not the fate for all the additional ingested AAs as some are utilized for tissue-building purposes. Based on the current evidence, we conclude that to maximize anabolism one should consume protein at a target intake of 0.4 g/kg/meal across a minimum of four meals in order to reach a minimum of 1.6 g/kg/day. Using the upper daily intake of 2.2 g/kg/day reported in the literature spread out over the same four meals would necessitate a maximum of 0.55 g/kg/meal.},
urldate = {2021-07-30},
journal = {Journal of the International Society of Sports Nutrition},
author = {Schoenfeld, Brad Jon and Aragon, Alan Albert},
month = feb,
year = {2018},
pages = {10},
file = {Schoenfeld and Aragon - 2018 - How much protein can the body use in a single meal.pdf:/home/opsxcq/Zotero/storage/5Z6DQZ2N/Schoenfeld and Aragon - 2018 - How much protein can the body use in a single meal.pdf:application/pdf},
}
@article{ogunrin_effect_2014,
title = {Effect of vinpocetine (cognitol™) on cognitive performances of a nigerian population},
volume = {4},
issn = {2141-9248},
doi = {10.4103/2141-9248.139368},
number = {4},
urldate = {2021-07-30},
journal = {Annals of medical and health sciences research},
author = {Ogunrin, Ao},
month = jul,
year = {2014},
pages = {654--61},
file = {Ogunrin - 2014 - Effect of vinpocetine (cognitol™) on cognitive per.pdf:/home/opsxcq/Zotero/storage/3Q8IZKKT/Ogunrin - 2014 - Effect of vinpocetine (cognitol™) on cognitive per.pdf:application/pdf},
}
@article{giannoulis_hormone_2012,
title = {Hormone replacement therapy and physical function in healthy older men. {Time} to talk hormones?},
volume = {33},
issn = {0163-769X},
doi = {10.1210/er.2012-1002},
number = {3},
urldate = {2021-07-30},
journal = {Endocrine reviews},
author = {Giannoulis, Manthos G and Martin, Finbarr C and Nair, K Sreekumaran and Umpleby, A Margot and Sonksen, Peter},
month = jun,
year = {2012},
pages = {314--77},
file = {Giannoulis et al. - 2012 - Hormone replacement therapy and physical function .pdf:/home/opsxcq/Zotero/storage/6XNXZD2N/Giannoulis et al. - 2012 - Hormone replacement therapy and physical function .pdf:application/pdf},
}
@article{bonnecaze_characteristics_2020,
title = {Characteristics and {Attitudes} of {Men} {Using} {Anabolic} {Androgenic} {Steroids} ({AAS}): {A} {Survey} of 2385 {Men}},
volume = {14},
issn = {1557-9883},
doi = {10.1177/1557988320966536},
number = {6},
urldate = {2021-07-30},
journal = {American journal of men's health},
author = {Bonnecaze, Alex K and O'Connor, Thomas and Aloi, Joseph A},
year = {2020},
pages = {1557988320966536},
file = {Bonnecaze et al. - 2020 - Characteristics and Attitudes of Men Using Anaboli.pdf:/home/opsxcq/Zotero/storage/LR36BDW8/Bonnecaze et al. - 2020 - Characteristics and Attitudes of Men Using Anaboli.pdf:application/pdf},
}
@article{guo_eigen_2018,
title = {Eigen {Portfolio} {Selection}: {A} {Robust} {Approach} to {Sharpe} {Ratio} {Maximization}},
journal = {Available at SSRN 3070416},
author = {Guo, Danqiao and Boyle, Phelim P and Weng, Chengguo and Wirjanto, Tony S},
year = {2018},
file = {Guo et al. - 2018 - Eigen Portfolio Selection A Robust Approach to Sh.pdf:/home/opsxcq/Zotero/storage/BT53VDJA/Guo et al. - 2018 - Eigen Portfolio Selection A Robust Approach to Sh.pdf:application/pdf},
}
@article{goldfarb_robust_2003,
title = {Robust portfolio selection problems},
volume = {28},
number = {1},
journal = {Mathematics of operations research},
author = {Goldfarb, Donald and Iyengar, Garud},
year = {2003},
note = {Publisher: INFORMS},
pages = {1--38},
file = {Goldfarb and Iyengar - 2003 - Robust portfolio selection problems.pdf:/home/opsxcq/Zotero/storage/899Z4483/Goldfarb and Iyengar - 2003 - Robust portfolio selection problems.pdf:application/pdf},
}
@article{elton_estimating_1973,
title = {Estimating the dependence structure of share prices–implications for portfolio selection},
volume = {28},
number = {5},
journal = {The Journal of Finance},
author = {Elton, Edwin J and Gruber, Martin J},
year = {1973},
note = {Publisher: JSTOR},
pages = {1203--1232},
file = {Elton and Gruber - 1973 - Estimating the dependence structure of share price.pdf:/home/opsxcq/Zotero/storage/SDMNNU2T/Elton and Gruber - 1973 - Estimating the dependence structure of share price.pdf:application/pdf},
}
@article{chen_efficient_2016,
title = {Efficient portfolio selection in a large market},
volume = {14},
number = {3},
journal = {Journal of Financial Econometrics},
author = {Chen, Jiaqin and Yuan, Ming},
year = {2016},
note = {Publisher: Oxford University Press},
pages = {496--524},
file = {Chen and Yuan - 2016 - Efficient portfolio selection in a large market.pdf:/home/opsxcq/Zotero/storage/D3PZZ8HI/Chen and Yuan - 2016 - Efficient portfolio selection in a large market.pdf:application/pdf},
}
@article{tsagaris_robust_2012,
title = {Robust and adaptive algorithms for online portfolio selection},
volume = {12},
number = {11},
journal = {Quantitative Finance},
author = {Tsagaris, Theodoros and Jasra, Ajay and Adams, Niall},
year = {2012},
note = {Publisher: Taylor \& Francis},
pages = {1651--1662},
file = {Tsagaris et al. - 2012 - Robust and adaptive algorithms for online portfoli.pdf:/home/opsxcq/Zotero/storage/JVPQVGS9/Tsagaris et al. - 2012 - Robust and adaptive algorithms for online portfoli.pdf:application/pdf},
}
@article{frost_empirical_1986,
title = {An empirical {Bayes} approach to efficient portfolio selection},
volume = {21},
number = {3},
journal = {Journal of Financial and Quantitative Analysis},
author = {Frost, Peter A and Savarino, James E},
year = {1986},
note = {Publisher: Cambridge University Press},
pages = {293--305},
file = {Frost and Savarino - 1986 - An empirical Bayes approach to efficient portfolio.pdf:/home/opsxcq/Zotero/storage/DATTYBPC/Frost and Savarino - 1986 - An empirical Bayes approach to efficient portfolio.pdf:application/pdf},
}
@incollection{kallberg_comparison_2013,
title = {Comparison of alternative utility functions in portfolio selection problems},
booktitle = {{HANDBOOK} {OF} {THE} {FUNDAMENTALS} {OF} {FINANCIAL} {DECISION} {MAKING}: {Part} {I}},
publisher = {World Scientific},
author = {Kallberg, Jerry G and Ziemba, William T},
year = {2013},
pages = {389--408},
file = {Kallberg and Ziemba - 2013 - Comparison of alternative utility functions in por.pdf:/home/opsxcq/Zotero/storage/E757JV2H/Kallberg and Ziemba - 2013 - Comparison of alternative utility functions in por.pdf:application/pdf},
}
@inproceedings{ferdousi_unsupervised_2006,
title = {Unsupervised outlier detection in time series data},
booktitle = {22nd {International} {Conference} on {Data} {Engineering} {Workshops} ({ICDEW}'06)},
publisher = {IEEE},
author = {Ferdousi, Zakia and Maeda, Akira},
year = {2006},
pages = {x121--x121},
file = {Ferdousi and Maeda - 2006 - Unsupervised outlier detection in time series data.pdf:/home/opsxcq/Zotero/storage/UW8JX96H/Ferdousi and Maeda - 2006 - Unsupervised outlier detection in time series data.pdf:application/pdf},
}
@article{wang_enhancing_2019,
title = {Enhancing intraday stock price manipulation detection by leveraging recurrent neural networks with ensemble learning},
volume = {347},
journal = {Neurocomputing},
author = {Wang, Qili and Xu, Wei and Huang, Xinting and Yang, Kunlin},
year = {2019},
note = {Publisher: Elsevier},
pages = {46--58},
file = {Wang et al. - 2019 - Enhancing intraday stock price manipulation detect.pdf:/home/opsxcq/Zotero/storage/UW9GLAZ2/Wang et al. - 2019 - Enhancing intraday stock price manipulation detect.pdf:application/pdf},
}
@article{dash_hybrid_2016,
title = {A hybrid stock trading framework integrating technical analysis with machine learning techniques},
volume = {2},
number = {1},
journal = {The Journal of Finance and Data Science},
author = {Dash, Rajashree and Dash, Pradipta Kishore},
year = {2016},
note = {Publisher: Elsevier},
pages = {42--57},
file = {Dash and Dash - 2016 - A hybrid stock trading framework integrating techn.pdf:/home/opsxcq/Zotero/storage/NAAA4U9B/Dash and Dash - 2016 - A hybrid stock trading framework integrating techn.pdf:application/pdf},
}
@article{chen_integrating_2018,
title = {Integrating principle component analysis and weighted support vector machine for stock trading signals prediction},
volume = {321},
journal = {Neurocomputing},
author = {Chen, Yingjun and Hao, Yijie},
year = {2018},
note = {Publisher: Elsevier},
pages = {381--402},
file = {Chen and Hao - 2018 - Integrating principle component analysis and weigh.pdf:/home/opsxcq/Zotero/storage/N24WQM7X/Chen and Hao - 2018 - Integrating principle component analysis and weigh.pdf:application/pdf},
}
@article{bogullu_using_2002,
title = {Using neural networks and technical indicators for generating stock trading signals},
url = {https://scholarsmine.mst.edu/engman_syseng_facwork/46/},
abstract = {Technical analysis is a common method used by financial managers and traders to predict buy and sell trading signals for individual stocks. Unfortunately, it is often the case that each trader, based on their own level of expertise, will have a different way of interpreting an indicator, or identifying the time series trend that is currently presented by the stock's price history. This study involves training feed-forward neural networks to generate buy and sell trading signals. The predictability and profitability results given by the trained neural networks (with both discrete and fuzzified technical indicators) are compared against rule-based models of the technical indicators, as well as a standard benchmark buy-and-hold strategy.},
author = {Bogullu, Vamsi Krishna and Dagli, Cihan H and Enke, David Lee},
year = {2002},
note = {Publisher: American Society of Mechanical Engineers (ASME)},
}
@inproceedings{chang_ensemble_2009,
title = {An ensemble of neural networks for stock trading decision making},
booktitle = {International {Conference} on {Intelligent} {Computing}},
publisher = {Springer},
author = {Chang, Pei-Chann and Liu, Chen-Hao and Fan, Chin-Yuan and Lin, Jun-Lin and Lai, Chih-Ming},
year = {2009},
pages = {1--10},
file = {Chang et al. - 2009 - An ensemble of neural networks for stock trading d.pdf:/home/opsxcq/Zotero/storage/WAUNJMHK/Chang et al. - 2009 - An ensemble of neural networks for stock trading d.pdf:application/pdf},
}
@article{patel_predicting_2015,
title = {Predicting stock and stock price index movement using trend deterministic data preparation and machine learning techniques},
volume = {42},
number = {1},
journal = {Expert systems with applications},
author = {Patel, Jigar and Shah, Sahil and Thakkar, Priyank and Kotecha, Ketan},
year = {2015},
note = {Publisher: Elsevier},
pages = {259--268},
file = {Patel et al. - 2015 - Predicting stock and stock price index movement us.pdf:/home/opsxcq/Zotero/storage/GNVTZ6Q9/Patel et al. - 2015 - Predicting stock and stock price index movement us.pdf:application/pdf},
}
@article{shen_stock_2012,
title = {Stock market forecasting using machine learning algorithms},
journal = {Department of Electrical Engineering, Stanford University, Stanford, CA},
author = {Shen, Shunrong and Jiang, Haomiao and Zhang, Tongda},
year = {2012},
note = {Publisher: Citeseer},
pages = {1--5},
file = {Shen et al. - 2012 - Stock market forecasting using machine learning al.pdf:/home/opsxcq/Zotero/storage/2MDW3G8T/Shen et al. - 2012 - Stock market forecasting using machine learning al.pdf:application/pdf},
}
@article{choudhry_hybrid_2008,
title = {A hybrid machine learning system for stock market forecasting},
volume = {39},
number = {3},
journal = {World Academy of Science, Engineering and Technology},
author = {Choudhry, Rohit and Garg, Kumkum},
year = {2008},
note = {Publisher: Citeseer},
pages = {315--318},
file = {Choudhry and Garg - 2008 - A hybrid machine learning system for stock market .pdf:/home/opsxcq/Zotero/storage/UL6T6CPG/Choudhry and Garg - 2008 - A hybrid machine learning system for stock market .pdf:application/pdf},
}
@inproceedings{usmani_stock_2016,
title = {Stock market prediction using machine learning techniques},
booktitle = {2016 3rd international conference on computer and information sciences ({ICCOINS})},
publisher = {IEEE},
author = {Usmani, Mehak and Adil, Syed Hasan and Raza, Kamran and Ali, Syed Saad Azhar},
year = {2016},
pages = {322--327},
file = {Usmani et al. - 2016 - Stock market prediction using machine learning tec.pdf:/home/opsxcq/Zotero/storage/7UVJ4LUJ/Usmani et al. - 2016 - Stock market prediction using machine learning tec.pdf:application/pdf},
}
@article{chatzis_forecasting_2018,
title = {Forecasting stock market crisis events using deep and statistical machine learning techniques},
volume = {112},
journal = {Expert systems with applications},
author = {Chatzis, Sotirios P and Siakoulis, Vassilis and Petropoulos, Anastasios and Stavroulakis, Evangelos and Vlachogiannakis, Nikos},
year = {2018},
note = {Publisher: Elsevier},
pages = {353--371},
file = {Chatzis et al. - 2018 - Forecasting stock market crisis events using deep .pdf:/home/opsxcq/Zotero/storage/BXBIEZAI/Chatzis et al. - 2018 - Forecasting stock market crisis events using deep .pdf:application/pdf},
}
@article{milgram_behavioral_1963,
title = {Behavioral study of obedience.},
volume = {67},
number = {4},
journal = {The Journal of abnormal and social psychology},
author = {Milgram, Stanley},
year = {1963},
note = {Publisher: American Psychological Association},
pages = {371},
file = {Milgram - 1963 - Behavioral study of obedience..pdf:/home/opsxcq/Zotero/storage/UV5ALPDX/Milgram - 1963 - Behavioral study of obedience..pdf:application/pdf},
}
@article{larsen_conformity_1974,
title = {Conformity in the {Asch} experiment},
volume = {94},
number = {2},
journal = {The Journal of Social Psychology},
author = {Larsen, Knud S},
year = {1974},
note = {Publisher: Taylor \& Francis},
pages = {303--304},
file = {Larsen - 1974 - Conformity in the Asch experiment.pdf:/home/opsxcq/Zotero/storage/9NUUL7HX/Larsen - 1974 - Conformity in the Asch experiment.pdf:application/pdf},
}
@article{bond_group_2005,
title = {Group size and conformity},
volume = {8},
number = {4},
journal = {Group processes \& intergroup relations},
author = {Bond, Rod},
year = {2005},
note = {Publisher: Sage Publications Sage CA: Thousand Oaks, CA},
pages = {331--354},
file = {Bond - 2005 - Group size and conformity.pdf:/home/opsxcq/Zotero/storage/S4MT6V2G/Bond - 2005 - Group size and conformity.pdf:application/pdf},
}
@article{asch_studies_1956,
title = {Studies of independence and conformity: {I}. {A} minority of one against a unanimous majority.},
volume = {70},
number = {9},
journal = {Psychological monographs: General and applied},
author = {Asch, Solomon E},
year = {1956},
note = {Publisher: American Psychological Association},
pages = {1},
file = {Asch - 1956 - Studies of independence and conformity I. A minor.pdf:/home/opsxcq/Zotero/storage/9UXMGWK9/Asch - 1956 - Studies of independence and conformity I. A minor.pdf:application/pdf},
}
@book{meerloo_rape_1956,