Author of the publication

An Insecurity Study of Ethereum Smart Contracts.

, , , and . SPACE, volume 12586 of Lecture Notes in Computer Science, page 188-207. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A delay-bound efficient path design algorithm for mobile sink in wireless sensor networks., , and . RAIT, page 72-77. IEEE, (2016)RBMon: Real Time System Behavior Monitoring Tool., , and . AsiaCCS, page 1228-1230. ACM, (2022)ArkThor: Threat Categorization Based on Malware's C2 Communication., , , , and . ICISSP, page 203-210. SCITEPRESS, (2024)DFDA: A Distributed Fault Detection Algorithm in Two Tier Wireless Sensor Networks., and . FICTA (2), volume 328 of Advances in Intelligent Systems and Computing, page 739-746. Springer, (2014)AProctor - A practical on-device antidote for Android malware., , , and . ACSW, page 82-91. ACM, (2023)The Persistent Robot Charging Problem for Long-Duration Autonomy., , , , , and . IEEE Robotics Autom. Lett., 10 (3): 2191-2198 (March 2025)The Persistent Robot Charging Problem for Long-Duration Autonomy., , , , , and . CoRR, (2024)Volatility Custom Profiling for Automated Hybrid ELF Malware Detection., , , and . ICDF2C, volume 508 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 274-291. Springer, (2022)Adversarially robust and real-time DDoS detection and classification framework using AutoML., , , and . Inf. Secur. J. A Glob. Perspect., 33 (4): 425-442 (July 2024)Malware Classification Using Image Representation., , , and . CSCML, volume 11527 of Lecture Notes in Computer Science, page 75-92. Springer, (2019)