Author of the publication

Empirical vulnerability analysis of automated smart contracts security testing on blockchains.

, , , and . CASCON, page 103-113. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining of High-Utility Patterns in Big IoT-based Databases., , , , , , and . Mob. Networks Appl., 26 (1): 216-233 (2021)Physical layer attack identification and localization in cyber-physical grid: An ensemble deep learning based approach., , , and . Phys. Commun., (2021)Blockchain Technology and Neural Networks for the Internet of Medical Things., , , and . INFOCOM Workshops, page 508-513. IEEE, (2020)Authentic Learning Secure Software Development (SSD) in Computing Education., , , , , and . FIE, page 1-9. IEEE, (2018)A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence., , , , and . Blockchain Cybersecurity, Trust and Privacy, volume 79 of Advances in Information Security, Springer, (2020)A Machine Learning-based SDN Controller Framework for Drone Management., , , , and . GLOBECOM (Workshops), page 1-6. IEEE, (2021)Empirical vulnerability analysis of automated smart contracts security testing on blockchains., , , and . CASCON, page 103-113. ACM, (2018)MVFCC: A Multi-View Fuzzy Consensus Clustering Model for Malware Threat Attribution., , , and . IEEE Access, (2020)Introduction to the Minitrack on Decentralized Federated Learning: Applications, Solutions, and Challenges., , , and . HICSS, page 1-3. ScholarSpace, (2021)A Blockchain-based Framework for Detecting Malicious Mobile Applications in App Stores., , , and . CCECE, page 1-4. IEEE, (2019)