Author of the publication

EtherShield: Time-interval Analysis for Detection of Malicious Behavior on Ethereum.

, , and . ACM Trans. Internet Techn., 24 (1): 2:1-2:30 (February 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software fault tree and coloured Petri net-based specification, design and implementation of agent-based intrusion detection systems., , , , , , , and . Int. J. Inf. Comput. Secur., 1 (1/2): 109-142 (2007)Probing the Limits of Virtualized Software Protection., , , and . PPREW@ACSAC, page 5:1-5:11. ACM, (2014)Enriching reverse engineering through visual exploration of Android binaries., , and . PPREW@ACSAC, page 9:1-9:9. ACM, (2015)De-anonymizing Ethereum blockchain smart contracts through code attribution., , and . Int. J. Netw. Manag., (2021)On Evaluation of Response Cost for Intrusion Response Systems., , , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 390-391. Springer, (2008)Code Authorship Attribution: Methods and Challenges., , , , and . ACM Comput. Surv., 52 (1): 3:1-3:36 (2019)Data Provenance in Security and Privacy., , and . ACM Comput. Surv., 55 (14s): 323:1-323:35 (2023)Analysis and prediction of web proxies misbehavior., , and . ARES, page 61:1-61:11. ACM, (2022)DroidKin: Lightweight Detection of Android Apps Similarity., , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 436-453. Springer, (2014)Trust Framework for P2P Networks Using Peer-Profile Based Anomaly Technique., , , and . ICDCS Workshops, page 203-209. IEEE Computer Society, (2005)