Author of the publication

An empirical study of attack-related events in DeFi projects development.

, , , , , , and . Empir. Softw. Eng., 29 (2): 49 (April 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A rigorous approach towards test case generation., , and . Inf. Sci., 178 (21): 4057-4079 (2008)Applying Ordinary Differential Equations to the Performance Analysis of Service Composition., , and . ICFEM, volume 6447 of Lecture Notes in Computer Science, page 155-170. Springer, (2010)Hypergraph Partitioning for the Parallel Computation of Continuous Petri Nets., , and . PaCT, volume 6873 of Lecture Notes in Computer Science, page 257-271. Springer, (2011)Behavior Analysis of Software Systems Based on Petri Net Slicing., , and . ICIC (1), volume 7389 of Lecture Notes in Computer Science, page 475-482. Springer, (2012)Accelerator Virtualization Framework Based on Inter-VM Exitless Communication., , , , , , and . Int. J. Softw. Informatics, 11 (2): 169-193 (2021)Fuzzy timed petri net definitions, properties, and applications., , , and . Math. Comput. Model., 41 (2-3): 345-360 (2005)Metamorphic Testing of Code Search Engines., , and . TASE, page 177-184. IEEE, (2020)Tracking a Ground Moving Target with UAV Based on Interval Type-2 Fuzzy Logic., , , and . TASE, page 65-72. IEEE, (2020)Test Case Generation of Concurrent Programs Based on Event Graph., , and . NCM, page 143-149. IEEE Computer Society, (2009)Wall-Following Navigation for Mobile Robot Based on Random Forest and Genetic Algorithm., , and . ICIC (2), volume 12837 of Lecture Notes in Computer Science, page 122-131. Springer, (2021)